Richard Clayton

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

21EETyler Moore, Richard Clayton: Evaluating the Wisdom of Crowds in Assessing Phishing Websites. Financial Cryptography 2008: 16-30
20EETyler Moore, Richard Clayton: Examining the impact of website take-down on phishing. eCrime Researchers Summit 2007: 1-13
19EEGeorge Danezis, Richard Clayton: Route Fingerprinting in Anonymous Communications. Peer-to-Peer Computing 2006: 69-72
18EERichard Clayton, Steven J. Murdoch, Robert N. M. Watson: Ignoring the Great Firewall of China. Privacy Enhancing Technologies 2006: 20-35
17EERichard Clayton: Stopping Outgoing Spam by Examining Incoming Server Logs. CEAS 2005
16EEEkaterina Zhuchkova, Richard Clayton: Methods for Identifying and Tracking Phase Singularities in Computational Models of Re-entrant Fibrillation. FIMH 2005: 246-255
15EERichard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo: A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88
14EERichard Clayton: Who'd Phish from the Summit of Kilimanjaro?. Financial Cryptography 2005: 91-92
13EERichard Clayton: Failures in a Hybrid Content Blocking System. Privacy Enhancing Technologies 2005: 78-92
12EERichard Clayton: Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). Security Protocols Workshop 2005: 82-88
11EERichard Clayton: Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). Security Protocols Workshop 2005: 89-96
10EERichard Clayton: Stopping Spam by Extrusion Detection. CEAS 2004
9EERichard Clayton: Improving Onion Notation. Privacy Enhancing Technologies 2003: 81-87
8EERichard Clayton, Mike Bond: Experience Using a Low-Cost FPGA Design to Crack DES Keys. CHES 2002: 579-592
7EERichard Clayton: Workshop Report for IPTPS'02: 1st International Workshop on Peer-to-Peer Systems. IPTPS 2002: 1-21
6EERichard Clayton, George Danezis: Chaffinch: Confidentiality in the Face of Legal Threats. Information Hiding 2002: 70-86
5EERichard Clayton, George Danezis, Markus G. Kuhn: Real World Patterns of Failure in Anonymity Systems. Information Hiding 2001: 230-244
4EERichard Clayton, Spencer Rugaber, Linda M. Wills: Dowsing: A Tool Framework for Domain-Oriented Browsing of Software Artifacts. ASE 1998: 204-
3 Richard Clayton, Spencer Rugaber, Linda M. Wills: On the Knowledge Required to Understand a Program. WCRE 1998: 69-78
2EERichard Clayton, Spencer Rugaber, Lyman Taylor, Linda M. Wills: A Case Study of Domain-based Program Understanding. WPC 1997: 102-110
1EERichard Clayton: On twofold triple systems and their automorphism groups. J. Comb. Theory, Ser. A 46(2): 306-313 (1987)

Coauthor Index

1Mike Bond [8]
2George Danezis [5] [6] [19]
3Drew Dean [15]
4Markus Jakobsson [15]
5Markus G. Kuhn [5]
6Tyler Moore [20] [21]
7Steven J. Murdoch [18]
8Steven Myers [15]
9Spencer Rugaber [2] [3] [4]
10Stuart G. Stubblebine [15]
11Michael Szydlo [15]
12Lyman Taylor [2]
13Robert N. M. Watson [18]
14Linda M. Wills [2] [3] [4]
15Ekaterina Zhuchkova [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)