2005 |
62 | EE | George Danezis,
Chris Lesniewski-Laas,
M. Frans Kaashoek,
Ross J. Anderson:
Sybil-Resistant DHT Routing.
ESORICS 2005: 305-318 |
61 | EE | Ross J. Anderson,
Bruce Schneier:
Guest Editors' Introduction: Economics of Information Security.
IEEE Security & Privacy 3(1): 12-13 (2005) |
60 | EE | George Danezis,
Ross J. Anderson:
The Economics of Resisting Censorship.
IEEE Security & Privacy 3(1): 45-50 (2005) |
2004 |
59 | EE | Ross J. Anderson,
Haowen Chan,
Adrian Perrig:
Key Infection: Smart Trust for Smart Dust.
ICNP 2004: 206-215 |
58 | EE | Jeff Jianxin Yan,
Alan F. Blackwell,
Ross J. Anderson,
Alasdair Grant:
Password Memorability and Security: Empirical Results.
IEEE Security & Privacy 2(5): 25-31 (2004) |
2003 |
57 | EE | Ross J. Anderson:
Cryptography and competition policy: issues with 'trusted computing'.
PODC 2003: 3-10 |
56 | EE | Ross J. Anderson:
What We Can Learn from API Security.
Security Protocols Workshop 2003: 288-300 |
55 | EE | Simon W. Moore,
Ross J. Anderson,
Robert D. Mullins,
George S. Taylor,
Jacques J. A. Fournier:
Balanced self-checking asynchronous logic for smart card applications.
Microprocessors and Microsystems 27(9): 421-430 (2003) |
2002 |
54 | EE | Simon W. Moore,
Robert D. Mullins,
Paul A. Cunningham,
Ross J. Anderson,
George S. Taylor:
Improving Smart Card Security Using Self-Timed Circuits.
ASYNC 2002: 211- |
53 | EE | Sergei P. Skorobogatov,
Ross J. Anderson:
Optical Fault Induction Attacks.
CHES 2002: 2-12 |
52 | EE | David Samyde,
Sergei P. Skorobogatov,
Ross J. Anderson,
Jean-Jacques Quisquater:
On a New Way to Read Data from Memory.
IEEE Security in Storage Workshop 2002: 65-69 |
51 | EE | Ross J. Anderson:
Free speech online and offline.
Commun. ACM 45(6): 120 (2002) |
50 | EE | Ross J. Anderson:
Free Speech Online and Offline.
IEEE Computer 35(6): 28-30 (2002) |
2001 |
49 | EE | Ross J. Anderson:
Why Information Security is Hard-An Economic Perspective.
ACSAC 2001: 358-365 |
48 | EE | Ross J. Anderson:
Protecting Embedded Systems - The Next Ten Years.
CHES 2001: 1-2 |
47 | | Ross J. Anderson,
Frank Stajano,
Jong-Hyeon Lee:
Security policies.
Advances in Computers 55: 186-237 (2001) |
46 | EE | Mike Bond,
Ross J. Anderson:
API-Level Attacks on Embedded Systems.
IEEE Computer 34(10): 67-75 (2001) |
2000 |
45 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
The Case for Serpent.
AES Candidate Conference 2000: 349-354 |
44 | EE | Ross J. Anderson:
Privacy Technology Lessons from Healthcare.
IEEE Symposium on Security and Privacy 2000: 78-79 |
43 | EE | Ross J. Anderson:
The Correctness of Crypto Transaction Sets.
Security Protocols Workshop 2000: 125-127 |
42 | EE | Ross J. Anderson:
The Correctness of Crypto Transaction Sets (Discussion).
Security Protocols Workshop 2000: 128-141 |
41 | EE | Michael Roe,
Ross J. Anderson,
William S. Harbison,
T. Mark A. Lomas:
Government Access to Keys - Panel Discussion.
Security Protocols Workshop 2000: 62-73 |
40 | EE | Ross J. Anderson,
Jong-Hyeon Lee:
Jikzi - a new framework for security policy, trusted publishing and electronic commerce.
Computer Communications 23(17): 1621-1626 (2000) |
39 | EE | Ross J. Anderson,
Terry Bollinger,
Doug Brown,
Enrique Draier,
Philip Machanick,
Gary McGraw,
Nancy R. Mead,
Arthur B. Pyster,
Howard Schmidt,
Timothy J. Shimeall:
Roundtable on Information Security Policy.
IEEE Software 17(5): (2000) |
1999 |
38 | EE | Ross J. Anderson:
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering).
ACSAC 1999: 1- |
37 | EE | Fabien A. P. Petitcolas,
Ross J. Anderson:
Evaluation of Copyright Marking Systems.
ICMCS, Vol. 1 1999: 574-579 |
36 | | Frank Stajano,
Ross J. Anderson:
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.
Information Hiding 1999: 434-447 |
35 | | Frank Stajano,
Ross J. Anderson:
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.
Security Protocols Workshop 1999: 172-194 |
34 | | Ross J. Anderson,
Jong-Hyeon Lee:
Jikzi: A New Framework for Secure Publishing.
Security Protocols Workshop 1999: 21-47 |
1998 |
33 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
Serpent and Smartcards.
CARDIS 1998: 246-253 |
32 | EE | Ross J. Anderson:
On the Security of Digital Tachographs.
ESORICS 1998: 111-125 |
31 | EE | Eli Biham,
Ross J. Anderson,
Lars R. Knudsen:
Serpent: A New Block Cipher Proposal.
FSE 1998: 222-238 |
30 | EE | Markus G. Kuhn,
Ross J. Anderson:
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.
Information Hiding 1998: 124-142 |
29 | EE | Fabien A. P. Petitcolas,
Ross J. Anderson,
Markus G. Kuhn:
Attacks on Copyright Marking Systems.
Information Hiding 1998: 218-238 |
28 | EE | Ross J. Anderson,
Roger M. Needham,
Adi Shamir:
The Steganographic File System.
Information Hiding 1998: 73-82 |
27 | | Ross J. Anderson,
Cunsheng Ding,
Tor Helleseth,
Torleiv Kløve:
How to Build Robust Shared Control Systems.
Des. Codes Cryptography 15(2): 111-124 (1998) |
26 | | Ross J. Anderson,
Francesco Bergadano,
Bruno Crispo,
Jong-Hyeon Lee,
Charalampos Manifavas,
Roger M. Needham:
A New Family of Authentication Protocols.
Operating Systems Review 32(4): 9-20 (1998) |
1997 |
25 | EE | Ross J. Anderson,
Michael Roe:
The GCHQ Protocol and Its Problems.
EUROCRYPT 1997: 134-148 |
24 | EE | Ross J. Anderson,
Charalampos Manifavas:
Chameleon - A New Kind of Stream Cipher.
FSE 1997: 107-113 |
23 | | Ross J. Anderson,
Václav Matyás Jr.,
Fabien A. P. Petitcolas,
Iain E. Buchan,
Rudolf Hanka:
Secure Books: Protecting the Distribution of Knowledge.
Security Protocols Workshop 1997: 1-11 |
22 | | Ross J. Anderson,
Markus G. Kuhn:
Low Cost Attacks on Tamper Resistant Devices.
Security Protocols Workshop 1997: 125-136 |
1996 |
21 | | Ross J. Anderson:
Information Hiding, First International Workshop, Cambridge, U.K., May 30 - June 1, 1996, Proceedings
Springer 1996 |
20 | | Ross J. Anderson,
Serge Vaudenay:
Minding your p's and q`s.
ASIACRYPT 1996: 26-35 |
19 | | Ross J. Anderson,
Eli Biham:
Two Practical and Provably Secure Block Ciphers: BEARS and LION.
FSE 1996: 113-120 |
18 | | Ross J. Anderson,
Eli Biham:
TIGER: A Fast New Hash Function.
FSE 1996: 89-97 |
17 | EE | Ross J. Anderson:
A Security Policy Model for Clinical Information Systems.
IEEE Symposium on Security and Privacy 1996: 30-43 |
16 | | Ross J. Anderson,
Serge Vaudenay,
Bart Preneel,
Kaisa Nyberg:
The Newton Channel.
Information Hiding 1996: 151-156 |
15 | | Ross J. Anderson:
Stretching the Limits of Steganography.
Information Hiding 1996: 39-48 |
14 | | Ross J. Anderson,
Charalampos Manifavas,
Chris Sutherland:
NetCard - A Practical Electronic-Cash System.
Security Protocols Workshop 1996: 49-57 |
13 | EE | Ross J. Anderson,
S. Johann Bezuidenhoudt:
On the Reliability of Electronic Payment Systems.
IEEE Trans. Software Eng. 22(5): 294-301 (1996) |
1995 |
12 | EE | Ross J. Anderson,
Roger M. Needham:
Robustness Principles for Public Key Protocols.
CRYPTO 1995: 236-247 |
11 | | Ross J. Anderson:
Crypto in Europe - Markets, Law and Policy.
Cryptography: Policy and Algorithms 1995: 75-89 |
10 | | Ross J. Anderson,
Roger M. Needham:
Programming Satan's Computer.
Computer Science Today 1995: 426-440 |
1994 |
9 | | Ross J. Anderson:
Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings
Springer 1994 |
8 | EE | Ross J. Anderson:
Liability and Computer Security: Nine Principles.
ESORICS 1994: 231-245 |
7 | | Ross J. Anderson:
Searching for the Optimum Correlation Attack.
FSE 1994: 137-143 |
6 | | Ross J. Anderson:
On Fibonacci Keystream Generators.
FSE 1994: 346-352 |
5 | | Ross J. Anderson:
Why Cryptosystems Fail.
Commun. ACM 37(11): 32-40 (1994) |
4 | EE | Ross J. Anderson:
Whither Cryptography.
Inf. Manag. Comput. Security 2(5): 13-20 (1994) |
1993 |
3 | EE | Ross J. Anderson:
Why Cryptosystems Fail.
ACM Conference on Computer and Communications Security 1993: 215-227 |
2 | | Ross J. Anderson:
A Modern Rotor Machine.
FSE 1993: 47-50 |
1992 |
1 | EE | Ross J. Anderson:
UEPS - A Second Generation Electronic Wallet.
ESORICS 1992: 411-418 |