2008 |
12 | EE | Tyler Moore,
Richard Clayton:
Evaluating the Wisdom of Crowds in Assessing Phishing Websites.
Financial Cryptography 2008: 16-30 |
11 | EE | Tyler Moore,
Maxim Raya,
Jolyon Clulow,
Panagiotis Papadimitratos,
Ross Anderson,
Jean-Pierre Hubaux:
Fast Exclusion of Errant Devices from Vehicular Networks.
SECON 2008: 135-143 |
2007 |
10 | | Frank Stajano,
Catherine Meadows,
Srdjan Capkun,
Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings
Springer 2007 |
9 | EE | Ross Anderson,
Tyler Moore:
Information Security Economics - and Beyond.
CRYPTO 2007: 68-91 |
8 | EE | Tyler Moore,
Jolyon Clulow,
Shishir Nagaraja,
Ross Anderson:
New Strategies for Revocation in Ad-Hoc Networks.
ESAS 2007: 232-246 |
7 | EE | Tyler Moore,
Jolyon Clulow:
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks.
SEC 2007: 157-168 |
6 | EE | Tyler Moore,
Richard Clayton:
Examining the impact of website take-down on phishing.
eCrime Researchers Summit 2007: 1-13 |
2006 |
5 | EE | Jolyon Clulow,
Gerhard P. Hancke,
Markus G. Kuhn,
Tyler Moore:
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks.
ESAS 2006: 83-97 |
4 | | Christopher Swenson,
Tyler Moore,
Sujeet Shenoi:
GSM Cell Site Forensics.
IFIP Int. Conf. Digital Forensics 2006: 259-272 |
3 | EE | Tyler Moore:
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks.
PerCom Workshops 2006: 251-255 |
2 | EE | Jolyon Clulow,
Tyler Moore:
Suicide for the common good: a new strategy for credential revocation in self-organizing systems.
Operating Systems Review 40(3): 18-21 (2006) |
2005 |
1 | | Tyler Moore,
Anthony Meehan,
Gavin Manes,
Sujeet Shenoi:
Using Signaling Information in Telecom Network Forensics.
IFIP Int. Conf. Digital Forensics 2005: 177-188 |