2007 |
10 | EE | Mike Bond:
Leaving Room for the Bad Guys.
Financial Cryptography 2007: 1 |
9 | EE | Christopher Thorpe,
Jessica Hammer,
Jean Camp,
Jon Callas,
Mike Bond:
Virtual Economies: Threats and Risks.
Financial Cryptography 2007: 239-244 |
2006 |
8 | EE | Mike Bond,
George Danezis:
A pact with the devil.
NSPW 2006: 77-82 |
2005 |
7 | EE | Mike Bond,
George Danezis:
The Dining Freemasons (Security Protocols for Secret Societies).
Security Protocols Workshop 2005: 258-265 |
6 | EE | Mike Bond:
The Dining Freemasons (Security Protocols for Secret Societies).
Security Protocols Workshop 2005: 266-275 |
5 | EE | Mike Bond,
Jolyon Clulow:
Extending Security Protocol Analysis: New Challenges.
Electr. Notes Theor. Comput. Sci. 125(1): 13-24 (2005) |
2004 |
4 | | Mike Bond,
Jolyon Clulow:
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure).
Cryptographic Algorithms and their Uses 2004: 140-151 |
2002 |
3 | EE | Richard Clayton,
Mike Bond:
Experience Using a Low-Cost FPGA Design to Crack DES Keys.
CHES 2002: 579-592 |
2001 |
2 | EE | Mike Bond:
Attacks on Cryptoprocessor Transaction Sets.
CHES 2001: 220-234 |
1 | EE | Mike Bond,
Ross J. Anderson:
API-Level Attacks on Embedded Systems.
IEEE Computer 34(10): 67-75 (2001) |