dblp.uni-trier.dewww.uni-trier.de

Ross J. Anderson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2005
62EEGeorge Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson: Sybil-Resistant DHT Routing. ESORICS 2005: 305-318
61EERoss J. Anderson, Bruce Schneier: Guest Editors' Introduction: Economics of Information Security. IEEE Security & Privacy 3(1): 12-13 (2005)
60EEGeorge Danezis, Ross J. Anderson: The Economics of Resisting Censorship. IEEE Security & Privacy 3(1): 45-50 (2005)
2004
59EERoss J. Anderson, Haowen Chan, Adrian Perrig: Key Infection: Smart Trust for Smart Dust. ICNP 2004: 206-215
58EEJeff Jianxin Yan, Alan F. Blackwell, Ross J. Anderson, Alasdair Grant: Password Memorability and Security: Empirical Results. IEEE Security & Privacy 2(5): 25-31 (2004)
2003
57EERoss J. Anderson: Cryptography and competition policy: issues with 'trusted computing'. PODC 2003: 3-10
56EERoss J. Anderson: What We Can Learn from API Security. Security Protocols Workshop 2003: 288-300
55EESimon W. Moore, Ross J. Anderson, Robert D. Mullins, George S. Taylor, Jacques J. A. Fournier: Balanced self-checking asynchronous logic for smart card applications. Microprocessors and Microsystems 27(9): 421-430 (2003)
2002
54EESimon W. Moore, Robert D. Mullins, Paul A. Cunningham, Ross J. Anderson, George S. Taylor: Improving Smart Card Security Using Self-Timed Circuits. ASYNC 2002: 211-
53EESergei P. Skorobogatov, Ross J. Anderson: Optical Fault Induction Attacks. CHES 2002: 2-12
52EEDavid Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater: On a New Way to Read Data from Memory. IEEE Security in Storage Workshop 2002: 65-69
51EERoss J. Anderson: Free speech online and offline. Commun. ACM 45(6): 120 (2002)
50EERoss J. Anderson: Free Speech Online and Offline. IEEE Computer 35(6): 28-30 (2002)
2001
49EERoss J. Anderson: Why Information Security is Hard-An Economic Perspective. ACSAC 2001: 358-365
48EERoss J. Anderson: Protecting Embedded Systems - The Next Ten Years. CHES 2001: 1-2
47 Ross J. Anderson, Frank Stajano, Jong-Hyeon Lee: Security policies. Advances in Computers 55: 186-237 (2001)
46EEMike Bond, Ross J. Anderson: API-Level Attacks on Embedded Systems. IEEE Computer 34(10): 67-75 (2001)
2000
45 Ross J. Anderson, Eli Biham, Lars R. Knudsen: The Case for Serpent. AES Candidate Conference 2000: 349-354
44EERoss J. Anderson: Privacy Technology Lessons from Healthcare. IEEE Symposium on Security and Privacy 2000: 78-79
43EERoss J. Anderson: The Correctness of Crypto Transaction Sets. Security Protocols Workshop 2000: 125-127
42EERoss J. Anderson: The Correctness of Crypto Transaction Sets (Discussion). Security Protocols Workshop 2000: 128-141
41EEMichael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas: Government Access to Keys - Panel Discussion. Security Protocols Workshop 2000: 62-73
40EERoss J. Anderson, Jong-Hyeon Lee: Jikzi - a new framework for security policy, trusted publishing and electronic commerce. Computer Communications 23(17): 1621-1626 (2000)
39EERoss J. Anderson, Terry Bollinger, Doug Brown, Enrique Draier, Philip Machanick, Gary McGraw, Nancy R. Mead, Arthur B. Pyster, Howard Schmidt, Timothy J. Shimeall: Roundtable on Information Security Policy. IEEE Software 17(5): (2000)
1999
38EERoss J. Anderson: How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). ACSAC 1999: 1-
37EEFabien A. P. Petitcolas, Ross J. Anderson: Evaluation of Copyright Marking Systems. ICMCS, Vol. 1 1999: 574-579
36 Frank Stajano, Ross J. Anderson: The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. Information Hiding 1999: 434-447
35 Frank Stajano, Ross J. Anderson: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. Security Protocols Workshop 1999: 172-194
34 Ross J. Anderson, Jong-Hyeon Lee: Jikzi: A New Framework for Secure Publishing. Security Protocols Workshop 1999: 21-47
1998
33 Ross J. Anderson, Eli Biham, Lars R. Knudsen: Serpent and Smartcards. CARDIS 1998: 246-253
32EERoss J. Anderson: On the Security of Digital Tachographs. ESORICS 1998: 111-125
31EEEli Biham, Ross J. Anderson, Lars R. Knudsen: Serpent: A New Block Cipher Proposal. FSE 1998: 222-238
30EEMarkus G. Kuhn, Ross J. Anderson: Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. Information Hiding 1998: 124-142
29EEFabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn: Attacks on Copyright Marking Systems. Information Hiding 1998: 218-238
28EERoss J. Anderson, Roger M. Needham, Adi Shamir: The Steganographic File System. Information Hiding 1998: 73-82
27 Ross J. Anderson, Cunsheng Ding, Tor Helleseth, Torleiv Kløve: How to Build Robust Shared Control Systems. Des. Codes Cryptography 15(2): 111-124 (1998)
26 Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham: A New Family of Authentication Protocols. Operating Systems Review 32(4): 9-20 (1998)
1997
25EERoss J. Anderson, Michael Roe: The GCHQ Protocol and Its Problems. EUROCRYPT 1997: 134-148
24EERoss J. Anderson, Charalampos Manifavas: Chameleon - A New Kind of Stream Cipher. FSE 1997: 107-113
23 Ross J. Anderson, Václav Matyás Jr., Fabien A. P. Petitcolas, Iain E. Buchan, Rudolf Hanka: Secure Books: Protecting the Distribution of Knowledge. Security Protocols Workshop 1997: 1-11
22 Ross J. Anderson, Markus G. Kuhn: Low Cost Attacks on Tamper Resistant Devices. Security Protocols Workshop 1997: 125-136
1996
21 Ross J. Anderson: Information Hiding, First International Workshop, Cambridge, U.K., May 30 - June 1, 1996, Proceedings Springer 1996
20 Ross J. Anderson, Serge Vaudenay: Minding your p's and q`s. ASIACRYPT 1996: 26-35
19 Ross J. Anderson, Eli Biham: Two Practical and Provably Secure Block Ciphers: BEARS and LION. FSE 1996: 113-120
18 Ross J. Anderson, Eli Biham: TIGER: A Fast New Hash Function. FSE 1996: 89-97
17EERoss J. Anderson: A Security Policy Model for Clinical Information Systems. IEEE Symposium on Security and Privacy 1996: 30-43
16 Ross J. Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg: The Newton Channel. Information Hiding 1996: 151-156
15 Ross J. Anderson: Stretching the Limits of Steganography. Information Hiding 1996: 39-48
14 Ross J. Anderson, Charalampos Manifavas, Chris Sutherland: NetCard - A Practical Electronic-Cash System. Security Protocols Workshop 1996: 49-57
13EERoss J. Anderson, S. Johann Bezuidenhoudt: On the Reliability of Electronic Payment Systems. IEEE Trans. Software Eng. 22(5): 294-301 (1996)
1995
12EERoss J. Anderson, Roger M. Needham: Robustness Principles for Public Key Protocols. CRYPTO 1995: 236-247
11 Ross J. Anderson: Crypto in Europe - Markets, Law and Policy. Cryptography: Policy and Algorithms 1995: 75-89
10 Ross J. Anderson, Roger M. Needham: Programming Satan's Computer. Computer Science Today 1995: 426-440
1994
9 Ross J. Anderson: Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings Springer 1994
8EERoss J. Anderson: Liability and Computer Security: Nine Principles. ESORICS 1994: 231-245
7 Ross J. Anderson: Searching for the Optimum Correlation Attack. FSE 1994: 137-143
6 Ross J. Anderson: On Fibonacci Keystream Generators. FSE 1994: 346-352
5 Ross J. Anderson: Why Cryptosystems Fail. Commun. ACM 37(11): 32-40 (1994)
4EERoss J. Anderson: Whither Cryptography. Inf. Manag. Comput. Security 2(5): 13-20 (1994)
1993
3EERoss J. Anderson: Why Cryptosystems Fail. ACM Conference on Computer and Communications Security 1993: 215-227
2 Ross J. Anderson: A Modern Rotor Machine. FSE 1993: 47-50
1992
1EERoss J. Anderson: UEPS - A Second Generation Electronic Wallet. ESORICS 1992: 411-418

Coauthor Index

1Francesco Bergadano [26]
2S. Johann Bezuidenhoudt [13]
3Eli Biham [18] [19] [31] [33] [45]
4Alan F. Blackwell [58]
5Terry Bollinger [39]
6Mike Bond [46]
7Doug Brown [39]
8Iain E. Buchan [23]
9Haowen Chan [59]
10Bruno Crispo [26]
11Paul A. Cunningham [54]
12George Danezis [60] [62]
13Cunsheng Ding [27]
14Enrique Draier [39]
15Jacques J. A. Fournier [55]
16Alasdair Grant [58]
17Rudolf Hanka [23]
18William S. Harbison [41]
19Tor Helleseth [27]
20M. Frans Kaashoek [62]
21Torleiv Kløve [27]
22Lars R. Knudsen [31] [33] [45]
23Markus G. Kuhn [22] [29] [30]
24Jong-Hyeon Lee [26] [34] [40] [47]
25Chris Lesniewski-Laas [62]
26T. Mark A. Lomas [41]
27Philip Machanick [39]
28Charalampos Manifavas [14] [24] [26]
29Václav Matyás Jr. [23]
30Gary McGraw [39]
31Nancy R. Mead [39]
32Simon W. Moore [54] [55]
33Robert D. Mullins [54] [55]
34Roger M. Needham [10] [12] [26] [28]
35Kaisa Nyberg [16]
36Adrian Perrig [59]
37Fabien A. P. Petitcolas [23] [29] [37]
38Bart Preneel [16]
39Arthur B. Pyster [39]
40Jean-Jacques Quisquater [52]
41Michael Roe [25] [41]
42David Samyde [52]
43Howard Schmidt [39]
44Bruce Schneier [61]
45Adi Shamir [28]
46Timothy J. Shimeall [39]
47Sergei P. Skorobogatov [52] [53]
48Frank Stajano [35] [36] [47]
49Chris Sutherland [14]
50George S. Taylor [54] [55]
51Serge Vaudenay [16] [20]
52Jeff Jianxin Yan [58]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)