2008 |
34 | EE | Frank Stajano,
Daniel Cvrcek,
Matt Lewis:
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks.
ACNS 2008: 460-478 |
33 | EE | Bogdan Roman,
Frank Stajano,
Ian J. Wassell,
David N. Cottingham:
Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks.
WCNC 2008: 1667-1672 |
32 | EE | Frank Stajano,
Lucia Bianchi,
Pietro Liò,
Douwe Korff:
Forensic genomics: kin privacy, driftnets and other open questions.
WPES 2008: 15-22 |
2007 |
31 | | Frank Stajano,
Hyoung Joong Kim,
Jong-Suk Chae,
Seong-Dong Kim:
Ubiquitous Convergence Technology, First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers
Springer 2007 |
30 | | Frank Stajano,
Catherine Meadows,
Srdjan Capkun,
Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings
Springer 2007 |
29 | EE | Ford-Long Wong,
Min Lin,
Shishir Nagaraja,
Ian J. Wassell,
Frank Stajano:
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern.
CNSR 2007: 157-165 |
28 | EE | Kasim Rehman,
Frank Stajano,
George Coulouris:
An Architecture for Interactive Context-Aware Applications.
IEEE Pervasive Computing 6(1): 73-80 (2007) |
27 | EE | Ford-Long Wong,
Frank Stajano:
Multichannel Security Protocols.
IEEE Pervasive Computing 6(4): 31-39 (2007) |
2006 |
26 | EE | Joonwoong Kim,
Alastair R. Beresford,
Frank Stajano:
Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper).
ICUCT 2006: 263-272 |
25 | EE | Ford-Long Wong,
Frank Stajano:
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies.
PerCom Workshops 2006: 246-250 |
2005 |
24 | EE | Ford-Long Wong,
Frank Stajano:
Location Privacy in Bluetooth.
ESAS 2005: 176-188 |
23 | EE | Ford-Long Wong,
Frank Stajano:
Multi-channel Protocols.
Security Protocols Workshop 2005: 112-127 |
22 | EE | Matthew Johnson,
Frank Stajano:
Implementing a Multi-hat PDA.
Security Protocols Workshop 2005: 295-307 |
21 | EE | Ford-Long Wong,
Frank Stajano,
Jolyon Clulow:
Repairing the Bluetooth Pairing Protocol.
Security Protocols Workshop 2005: 31-45 |
20 | EE | Frank Stajano:
Repairing the Bluetooth Pairing Protocol.
Security Protocols Workshop 2005: 46-50 |
19 | EE | Pablo Vidales,
Glenford E. Mapp,
Frank Stajano,
Jon Crowcroft,
Carlos Jesus Bernardos:
A Practical Approach for 4G Systems: Deployment of Overlay Networks.
TRIDENTCOM 2005: 172-181 |
18 | EE | Kasim Rehman,
Frank Stajano,
George Coulouris:
Visually Interactive Location-Aware Computing.
Ubicomp 2005: 177-194 |
17 | EE | Frank Stajano:
RFID is x-ray vision.
Commun. ACM 48(9): 31-33 (2005) |
16 | EE | Pablo Vidales,
Javier Baliosian,
Joan Serrat,
Glenford E. Mapp,
Frank Stajano,
Andy Hopper:
Autonomic system for mobility support in 4G networks.
IEEE Journal on Selected Areas in Communications 23(12): 2288-2304 (2005) |
2004 |
15 | EE | Frank Stajano:
Security for Ubiquitous Computing.
ICISC 2004: 2 |
14 | EE | Alastair R. Beresford,
Frank Stajano:
Mix Zones: User Privacy in Location-aware Services.
PerCom Workshops 2004: 127-131 |
13 | EE | Frank Stajano:
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA.
Security Protocols Workshop 2004: 51-64 |
12 | EE | Frank Stajano:
One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion).
Security Protocols Workshop 2004: 65-67 |
11 | EE | Frank Stajano:
Will your digital butlers betray you?
WPES 2004: 37-38 |
2003 |
10 | | Frank Stajano:
The Security Challenges of Ubiquitous Computing.
CHES 2003: 1 |
9 | EE | Frank Stajano:
Security in Pervasive Computing.
SPC 2003: 6-8 |
2002 |
8 | EE | Frank Stajano:
Security for Whom?: The Shifting Security Assumptions of Pervasive Computing.
ISSS 2002: 16-27 |
7 | EE | Kasim Rehman,
Frank Stajano,
George Coulouris:
Interfacing with the invisible computer.
NordiCHI 2002: 213-216 |
6 | EE | Tatsuo Nakajima,
Hiro Ishikawa,
Eiji Tokunaga,
Frank Stajano:
Technology Challenges for Building Internet-Scale Ubiquitous Computing.
WORDS 2002: 171-179 |
2001 |
5 | | Ross J. Anderson,
Frank Stajano,
Jong-Hyeon Lee:
Security policies.
Advances in Computers 55: 186-237 (2001) |
2000 |
4 | EE | Frank Stajano:
The Resurrecting Duckling - What Next?
Security Protocols Workshop 2000: 204-214 |
3 | EE | Frank Stajano:
The Resurrecting Duckling - What Next? (Transcript of Discussion).
Security Protocols Workshop 2000: 215-222 |
1999 |
2 | | Frank Stajano,
Ross J. Anderson:
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.
Information Hiding 1999: 434-447 |
1 | | Frank Stajano,
Ross J. Anderson:
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.
Security Protocols Workshop 1999: 172-194 |