Frank Stajano

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

34EEFrank Stajano, Daniel Cvrcek, Matt Lewis: Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. ACNS 2008: 460-478
33EEBogdan Roman, Frank Stajano, Ian J. Wassell, David N. Cottingham: Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks. WCNC 2008: 1667-1672
32EEFrank Stajano, Lucia Bianchi, Pietro Liò, Douwe Korff: Forensic genomics: kin privacy, driftnets and other open questions. WPES 2008: 15-22
31 Frank Stajano, Hyoung Joong Kim, Jong-Suk Chae, Seong-Dong Kim: Ubiquitous Convergence Technology, First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers Springer 2007
30 Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings Springer 2007
29EEFord-Long Wong, Min Lin, Shishir Nagaraja, Ian J. Wassell, Frank Stajano: Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern. CNSR 2007: 157-165
28EEKasim Rehman, Frank Stajano, George Coulouris: An Architecture for Interactive Context-Aware Applications. IEEE Pervasive Computing 6(1): 73-80 (2007)
27EEFord-Long Wong, Frank Stajano: Multichannel Security Protocols. IEEE Pervasive Computing 6(4): 31-39 (2007)
26EEJoonwoong Kim, Alastair R. Beresford, Frank Stajano: Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper). ICUCT 2006: 263-272
25EEFord-Long Wong, Frank Stajano: Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies. PerCom Workshops 2006: 246-250
24EEFord-Long Wong, Frank Stajano: Location Privacy in Bluetooth. ESAS 2005: 176-188
23EEFord-Long Wong, Frank Stajano: Multi-channel Protocols. Security Protocols Workshop 2005: 112-127
22EEMatthew Johnson, Frank Stajano: Implementing a Multi-hat PDA. Security Protocols Workshop 2005: 295-307
21EEFord-Long Wong, Frank Stajano, Jolyon Clulow: Repairing the Bluetooth Pairing Protocol. Security Protocols Workshop 2005: 31-45
20EEFrank Stajano: Repairing the Bluetooth Pairing Protocol. Security Protocols Workshop 2005: 46-50
19EEPablo Vidales, Glenford E. Mapp, Frank Stajano, Jon Crowcroft, Carlos Jesus Bernardos: A Practical Approach for 4G Systems: Deployment of Overlay Networks. TRIDENTCOM 2005: 172-181
18EEKasim Rehman, Frank Stajano, George Coulouris: Visually Interactive Location-Aware Computing. Ubicomp 2005: 177-194
17EEFrank Stajano: RFID is x-ray vision. Commun. ACM 48(9): 31-33 (2005)
16EEPablo Vidales, Javier Baliosian, Joan Serrat, Glenford E. Mapp, Frank Stajano, Andy Hopper: Autonomic system for mobility support in 4G networks. IEEE Journal on Selected Areas in Communications 23(12): 2288-2304 (2005)
15EEFrank Stajano: Security for Ubiquitous Computing. ICISC 2004: 2
14EEAlastair R. Beresford, Frank Stajano: Mix Zones: User Privacy in Location-aware Services. PerCom Workshops 2004: 127-131
13EEFrank Stajano: One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. Security Protocols Workshop 2004: 51-64
12EEFrank Stajano: One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion). Security Protocols Workshop 2004: 65-67
11EEFrank Stajano: Will your digital butlers betray you? WPES 2004: 37-38
10 Frank Stajano: The Security Challenges of Ubiquitous Computing. CHES 2003: 1
9EEFrank Stajano: Security in Pervasive Computing. SPC 2003: 6-8
8EEFrank Stajano: Security for Whom?: The Shifting Security Assumptions of Pervasive Computing. ISSS 2002: 16-27
7EEKasim Rehman, Frank Stajano, George Coulouris: Interfacing with the invisible computer. NordiCHI 2002: 213-216
6EETatsuo Nakajima, Hiro Ishikawa, Eiji Tokunaga, Frank Stajano: Technology Challenges for Building Internet-Scale Ubiquitous Computing. WORDS 2002: 171-179
5 Ross J. Anderson, Frank Stajano, Jong-Hyeon Lee: Security policies. Advances in Computers 55: 186-237 (2001)
4EEFrank Stajano: The Resurrecting Duckling - What Next? Security Protocols Workshop 2000: 204-214
3EEFrank Stajano: The Resurrecting Duckling - What Next? (Transcript of Discussion). Security Protocols Workshop 2000: 215-222
2 Frank Stajano, Ross J. Anderson: The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. Information Hiding 1999: 434-447
1 Frank Stajano, Ross J. Anderson: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. Security Protocols Workshop 1999: 172-194

Coauthor Index

1Ross J. Anderson [1] [2] [5]
2Javier Baliosian [16]
3Alastair R. Beresford [14] [26]
4Carlos Jesus Bernardos [19]
5Lucia Bianchi [32]
6Srdjan Capkun [30]
7Jong-Suk Chae [31]
8Jolyon Clulow [21]
9David N. Cottingham [33]
10George Coulouris [7] [18] [28]
11Jon Crowcroft [19]
12Daniel Cvrcek [34]
13Andy Hopper (Andrew Hopper) [16]
14Hiro Ishikawa [6]
15Matt Johnson (Matthew Johnson) [22]
16Hyoung Joong Kim [31]
17Joonwoong Kim [26]
18Seong-Dong Kim [31]
19Douwe Korff [32]
20Jong-Hyeon Lee [5]
21Matt Lewis [34]
22Min Lin [29]
23Pietro Liò [32]
24Glenford E. Mapp [16] [19]
25Catherine Meadows [30]
26Tyler Moore [30]
27Shishir Nagaraja [29]
28Tatsuo Nakajima [6]
29Kasim Rehman [7] [18] [28]
30Bogdan Roman [33]
31Joan Serrat [16]
32Eiji Tokunaga [6]
33Pablo Vidales [16] [19]
34Ian J. Wassell [29] [33]
35Ford-Long Wong [21] [23] [24] [25] [27] [29]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)