2008 |
21 | EE | Tyler Moore,
Richard Clayton:
Evaluating the Wisdom of Crowds in Assessing Phishing Websites.
Financial Cryptography 2008: 16-30 |
2007 |
20 | EE | Tyler Moore,
Richard Clayton:
Examining the impact of website take-down on phishing.
eCrime Researchers Summit 2007: 1-13 |
2006 |
19 | EE | George Danezis,
Richard Clayton:
Route Fingerprinting in Anonymous Communications.
Peer-to-Peer Computing 2006: 69-72 |
18 | EE | Richard Clayton,
Steven J. Murdoch,
Robert N. M. Watson:
Ignoring the Great Firewall of China.
Privacy Enhancing Technologies 2006: 20-35 |
2005 |
17 | EE | Richard Clayton:
Stopping Outgoing Spam by Examining Incoming Server Logs.
CEAS 2005 |
16 | EE | Ekaterina Zhuchkova,
Richard Clayton:
Methods for Identifying and Tracking Phase Singularities in Computational Models of Re-entrant Fibrillation.
FIMH 2005: 246-255 |
15 | EE | Richard Clayton,
Drew Dean,
Markus Jakobsson,
Steven Myers,
Stuart G. Stubblebine,
Michael Szydlo:
A Chat at the Old Phishin' Hole.
Financial Cryptography 2005: 88 |
14 | EE | Richard Clayton:
Who'd Phish from the Summit of Kilimanjaro?.
Financial Cryptography 2005: 91-92 |
13 | EE | Richard Clayton:
Failures in a Hybrid Content Blocking System.
Privacy Enhancing Technologies 2005: 78-92 |
12 | EE | Richard Clayton:
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).
Security Protocols Workshop 2005: 82-88 |
11 | EE | Richard Clayton:
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).
Security Protocols Workshop 2005: 89-96 |
2004 |
10 | EE | Richard Clayton:
Stopping Spam by Extrusion Detection.
CEAS 2004 |
2003 |
9 | EE | Richard Clayton:
Improving Onion Notation.
Privacy Enhancing Technologies 2003: 81-87 |
2002 |
8 | EE | Richard Clayton,
Mike Bond:
Experience Using a Low-Cost FPGA Design to Crack DES Keys.
CHES 2002: 579-592 |
7 | EE | Richard Clayton:
Workshop Report for IPTPS'02: 1st International Workshop on Peer-to-Peer Systems.
IPTPS 2002: 1-21 |
6 | EE | Richard Clayton,
George Danezis:
Chaffinch: Confidentiality in the Face of Legal Threats.
Information Hiding 2002: 70-86 |
2001 |
5 | EE | Richard Clayton,
George Danezis,
Markus G. Kuhn:
Real World Patterns of Failure in Anonymity Systems.
Information Hiding 2001: 230-244 |
1998 |
4 | EE | Richard Clayton,
Spencer Rugaber,
Linda M. Wills:
Dowsing: A Tool Framework for Domain-Oriented Browsing of Software Artifacts.
ASE 1998: 204- |
3 | | Richard Clayton,
Spencer Rugaber,
Linda M. Wills:
On the Knowledge Required to Understand a Program.
WCRE 1998: 69-78 |
1997 |
2 | EE | Richard Clayton,
Spencer Rugaber,
Lyman Taylor,
Linda M. Wills:
A Case Study of Domain-based Program Understanding.
WPC 1997: 102-110 |
1987 |
1 | EE | Richard Clayton:
On twofold triple systems and their automorphism groups.
J. Comb. Theory, Ser. A 46(2): 306-313 (1987) |