default search action
Ross J. Anderson
Ross Anderson 0001
Person information
- affiliation: University of Cambridge, UK
Other persons with the same name
- Ross Anderson — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j41]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [j40]Ilia Shumailov, Zakhar Shumaylov, Yiren Zhao, Nicolas Papernot, Ross J. Anderson, Yarin Gal:
AI models collapse when trained on recursively generated data. Nat. 631(8022): 755-759 (2024) - [c141]Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross J. Anderson, Robert D. Mullins:
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks. SaTML 2024: 344-357 - [c140]Anh V. Vu, Alice Hutchings, Ross J. Anderson:
No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. SP 2024: 717-734 - [c139]Pranav Dahiya, Ilia Shumailov, Ross Anderson:
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks. USENIX Security Symposium 2024 - [c138]Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross J. Anderson:
Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict. WWW 2024: 1596-1607 - [i37]Jenny Blessing, Daniel Hugenroth, Ross J. Anderson, Alastair R. Beresford:
SoK: Web Authentication in the Age of End-to-End Encryption. CoRR abs/2406.18226 (2024) - 2023
- [c137]Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. RAID 2023: 700-713 - [c136]Jenny Blessing, Ross Anderson:
One Protocol to Rule Them All? On Securing Interoperable Messaging. Security Protocols Workshop 2023: 174-192 - [c135]Ross J. Anderson, Nicholas Boucher:
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard. Security Protocols Workshop 2023: 199-204 - [c134]Ross J. Anderson, Nicholas Boucher:
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion). Security Protocols Workshop 2023: 205-210 - [c133]Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid:
Towards Human-Centric Endpoint Security. Security Protocols Workshop 2023: 211-219 - [c132]Nicholas Boucher, Ross Anderson:
Trojan Source: Invisible Vulnerabilities. USENIX Security Symposium 2023: 6507-6524 - [i36]Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross J. Anderson, Awais Rashid:
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications. CoRR abs/2301.05653 (2023) - [i35]Jenny Blessing, Ross J. Anderson:
One Protocol to Rule Them All? On Securing Interoperable Messaging. CoRR abs/2303.14178 (2023) - [i34]Anh V. Vu, Alice Hutchings, Ross J. Anderson:
No Easy Way Out: The Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. CoRR abs/2304.07037 (2023) - [i33]Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. CoRR abs/2304.14031 (2023) - [i32]Ross J. Anderson, Nicholas Boucher:
If it's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard. CoRR abs/2305.04755 (2023) - [i31]Ilia Shumailov, Zakhar Shumaylov, Yiren Zhao, Yarin Gal, Nicolas Papernot, Ross J. Anderson:
The Curse of Recursion: Training on Generated Data Makes Models Forget. CoRR abs/2305.17493 (2023) - [i30]Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot:
When Vision Fails: Text Attacks Against ViT and OCR. CoRR abs/2306.07033 (2023) - [i29]Pranav Dahiya, Ilia Shumailov, Ross J. Anderson:
Machine Learning needs its own Randomness Standard: Randomised Smoothing and PRNG-based attacks. CoRR abs/2306.14043 (2023) - [i28]David Khachaturov, Yue Gao, Ilia Shumailov, Robert D. Mullins, Ross J. Anderson, Kassem Fawaz:
Human-Producible Adversarial Examples. CoRR abs/2310.00438 (2023) - [i27]Nicholas Boucher, Ross J. Anderson:
Automatic Bill of Materials. CoRR abs/2310.09742 (2023) - 2022
- [j39]Mansoor Ahmed-Rengers, Diana A. Vasile, Daniel Hugenroth, Alastair R. Beresford, Ross Anderson:
CoverDrop: Blowing the Whistle Through A News App. Proc. Priv. Enhancing Technol. 2022(2): 47-67 (2022) - [c131]Ildiko Pete, Jack Hughes, Andrew Caines, Anh V. Vu, Harshad Gupta, Alice Hutchings, Ross J. Anderson, Paula Buttery:
PostCog: A tool for interdisciplinary research into underground forums at scale. EuroS&P Workshops 2022: 93-104 - [c130]Nicholas Boucher, Ross Anderson:
Talking Trojan: Analyzing an Industry-Wide Disclosure. SCORED@CCS 2022: 83-92 - [c129]Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot:
Bad Characters: Imperceptible NLP Attacks. SP 2022: 1987-2004 - [i26]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - [i25]Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross J. Anderson:
Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict. CoRR abs/2208.10629 (2022) - [i24]Nicholas Boucher, Ross J. Anderson:
Talking Trojan: Analyzing an Industry-Wide Disclosure. CoRR abs/2209.10717 (2022) - [i23]Tim Clifford, Ilia Shumailov, Yiren Zhao, Ross J. Anderson, Robert D. Mullins:
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks. CoRR abs/2210.00108 (2022) - 2021
- [c128]Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert D. Mullins, Ross Anderson:
Sponge Examples: Energy-Latency Attacks on Neural Networks. EuroS&P 2021: 212-231 - [c127]David Khachaturov, Ilia Shumailov, Yiren Zhao, Nicolas Papernot, Ross J. Anderson:
Markpainting: Adversarial Machine Learning meets Inpainting. ICML 2021: 5409-5419 - [c126]Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A. Erdogdu, Ross J. Anderson:
Manipulating SGD with Data Ordering Attacks. NeurIPS 2021: 18021-18032 - [i22]Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A. Erdogdu, Ross J. Anderson:
Manipulating SGD with Data Ordering Attacks. CoRR abs/2104.09667 (2021) - [i21]David Khachaturov, Ilia Shumailov, Yiren Zhao, Nicolas Papernot, Ross J. Anderson:
Markpainting: Adversarial Machine Learning meets Inpainting. CoRR abs/2106.00660 (2021) - [i20]Nicholas Boucher, Ilia Shumailov, Ross J. Anderson, Nicolas Papernot:
Bad Characters: Imperceptible NLP Attacks. CoRR abs/2106.09898 (2021) - [i19]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - [i18]Nicholas Boucher, Ross J. Anderson:
Trojan Source: Invisible Vulnerabilities. CoRR abs/2111.00169 (2021) - [i17]Anh V. Vu, Lydia Wilson, Yi Ting Chua, Ilia Shumailov, Ross J. Anderson:
ExtremeBB: Enabling Large-Scale Research into Extremism, the Manosphere and Their Correlation by Online Forum Data. CoRR abs/2111.04479 (2021) - 2020
- [c125]Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Ross J. Anderson:
Towards Certifiable Adversarial Sample Detection. AISec@CCS 2020: 13-24 - [c124]Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert D. Mullins, Ross J. Anderson:
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information. DSN Workshops 2020: 16-24 - [i16]Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Ross J. Anderson:
Towards Certifiable Adversarial Sample Detection. CoRR abs/2002.08740 (2020) - [i15]Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert D. Mullins, Ross J. Anderson:
Sponge Examples: Energy-Latency Attacks on Neural Networks. CoRR abs/2006.03463 (2020) - [i14]Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On The Difficulty of Whistleblowing. CoRR abs/2006.14407 (2020) - [i13]Almos Zarandy, Ilia Shumailov, Ross J. Anderson:
BatNet: Data transmission between smartphones over ultrasound. CoRR abs/2008.00136 (2020) - [i12]Yiren Zhao, Ilia Shumailov, Robert D. Mullins, Ross J. Anderson:
Nudge Attacks on Point-Cloud DNNs. CoRR abs/2011.11637 (2020) - [i11]Almos Zarandy, Ilia Shumailov, Ross J. Anderson:
Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant. CoRR abs/2012.00687 (2020)
2010 – 2019
- 2019
- [c123]Yiren Zhao, Ilia Shumailov, Robert D. Mullins, Ross Anderson:
To Compress Or Not To Compress: Understanding The Interactions Between Adversarial Attacks And Neural Network Compression. SysML 2019 - [c122]Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On the Difficulty of Whistleblowing. Security Protocols Workshop 2019: 289-303 - [c121]Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion). Security Protocols Workshop 2019: 304-312 - [i10]Mansoor Ahmed-Rengers, Ilia Shumailov, Ross Anderson:
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins. CoRR abs/1901.01769 (2019) - [i9]Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert D. Mullins, Ross Anderson, Cheng-Zhong Xu:
Sitatapatra: Blocking the Transfer of Adversarial Samples. CoRR abs/1901.08121 (2019) - [i8]Ilia Shumailov, Laurent Simon, Jeff Yan, Ross Anderson:
Hearing your touch: A new acoustic side channel on smartphones. CoRR abs/1903.11137 (2019) - [i7]Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert D. Mullins, Ross J. Anderson:
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information. CoRR abs/1909.02918 (2019) - [i6]Sophie van der Zee, Richard Clayton, Ross J. Anderson:
The gift of the gab: Are rental scammers skilled at the art of persuasion? CoRR abs/1911.08253 (2019) - 2018
- [j38]Ross Anderson:
Making security sustainable. Commun. ACM 61(3): 24-26 (2018) - [c120]Laurent Simon, David Chisnall, Ross J. Anderson:
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers. EuroS&P 2018: 1-15 - [c119]Mansoor Ahmed-Rengers, Ilia Shumailov, Ross Anderson:
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins. GraMSec@FLoC 2018: 1-12 - [c118]Ross Anderson:
Sustainable Security - an Internet of Durable Goods. ICISSP 2018: 7 - [c117]Ross Anderson:
Covert and Deniable Communications. IH&MMSec 2018: 1 - [c116]Ross Anderson, Ilia Shumailov, Mansoor Ahmed-Rengers:
Making Bitcoin Legal. Security Protocols Workshop 2018: 243-253 - [c115]Ross Anderson:
Making Bitcoin Legal (Transcript of Discussion). Security Protocols Workshop 2018: 254-265 - [i5]Yiren Zhao, Ilia Shumailov, Robert D. Mullins, Ross Anderson:
To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression. CoRR abs/1810.00208 (2018) - [i4]Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Ross Anderson:
The Taboo Trap: Behavioural Detection of Adversarial Samples. CoRR abs/1811.07375 (2018) - 2017
- [j37]Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. J. Cybersecur. 3(2): 109-125 (2017) - [c114]Khaled Baqer, Ross J. Anderson, Lorna Mutegi, Jeunese A. Payne, Joseph Sevilla:
DigiTally: Piloting Offline Payments for Phones. SOUPS 2017: 131-143 - [c113]Ross J. Anderson, Khaled Baqer:
Reconciling Multiple Objectives - Politics or Markets? Security Protocols Workshop 2017: 144-156 - [c112]Ross Anderson:
Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion). Security Protocols Workshop 2017: 157-170 - 2016
- [j36]Laurent Simon, Wenduan Xu, Ross J. Anderson:
Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards. Proc. Priv. Enhancing Technol. 2016(3): 136-154 (2016) - [c111]Ross J. Anderson:
Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only). CSF 2016: 16 - [c110]Alice Hutchings, Richard Clayton, Ross J. Anderson:
Taking down websites to prevent crime. eCrime 2016: 102-111 - [c109]Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - [c108]Khaled Baqer, S. Johann Bezuidenhoudt, Ross J. Anderson, Markus G. Kuhn:
SMAPs: Short Message Authentication Protocols. Security Protocols Workshop 2016: 119-132 - [c107]Khaled Baqer, Ross J. Anderson:
SMAPs: Short Message Authentication Protocols (Transcript of Discussion). Security Protocols Workshop 2016: 133-140 - 2015
- [j35]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j34]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [j33]Mike Bond, Marios O. Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Be Prepared: The EMV Preplay Attack. IEEE Secur. Priv. 13(2): 56-64 (2015) - [j32]David Modic, Ross J. Anderson:
It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud. IEEE Secur. Priv. 13(5): 99-103 (2015) - [c106]Khaled Baqer, Ross J. Anderson:
Do You Believe in Tinker Bell? The Social Externalities of Trust. Security Protocols Workshop 2015: 224-236 - [c105]Khaled Baqer, Ross J. Anderson:
Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion). Security Protocols Workshop 2015: 237-246 - 2014
- [j31]Ross J. Anderson, Steven J. Murdoch:
EMV: why payment systems fail. Commun. ACM 57(6): 24-28 (2014) - [j30]David Modic, Ross J. Anderson:
Reading this may harm your computer: The psychology of malware warnings. Comput. Hum. Behav. 41: 71-79 (2014) - [c104]Steven J. Murdoch, Ross J. Anderson:
Security Protocols and Evidence: Where Many Payment Systems Fail. Financial Cryptography 2014: 21-32 - [c103]Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: Cloning EMV Cards with the Pre-play Attack. IEEE Symposium on Security and Privacy 2014: 49-64 - [c102]Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore, L. Jean Camp, Kevin Benton, Ross J. Anderson:
Collaborating with the Enemy on Network Management. Security Protocols Workshop 2014: 154-162 - [c101]Ross J. Anderson, Chris Hall:
Collaborating with the Enemy on Network Management (Transcript of Discussion). Security Protocols Workshop 2014: 163-171 - 2013
- [j29]Hyoungshick Kim, Ross J. Anderson:
An Experimental Evaluation of Robustness of Networks. IEEE Syst. J. 7(2): 179-188 (2013) - [c100]Laurent Simon, Ross J. Anderson:
PIN skimmer: inferring PINs through the camera and microphone. SPSM@CCS 2013: 67-78 - [c99]Wei Ming Khoo, Alan Mycroft, Ross J. Anderson:
Rendezvous: a search engine for binary code. MSR 2013: 329-338 - [c98]Dongting Yu, Andrew W. Moore, Chris Hall, Ross J. Anderson:
Authentication for Resilience: The Case of SDN. Security Protocols Workshop 2013: 39-44 - [p5]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - [i3]Ross J. Anderson, Robert Brady:
Why quantum computing is hard - and quantum cryptography is not provably secure. CoRR abs/1301.7351 (2013) - 2012
- [j28]Hyoungshick Kim, John Kit Tang, Ross J. Anderson, Cecilia Mascolo:
Centrality prediction in dynamic human contact networks. Comput. Networks 56(3): 983-996 (2012) - [j27]Steven J. Murdoch, Mike Bond, Ross J. Anderson:
How Certification Systems Fail: Lessons from the Ware Report. IEEE Secur. Priv. 10(6): 40-44 (2012) - [c97]Ross J. Anderson:
Security economics: a personal perspective. ACSAC 2012: 139-144 - [c96]Hyoungshick Kim, John Kit Tang, Ross J. Anderson:
Social Authentication: Harder Than It Looks. Financial Cryptography 2012: 1-15 - [c95]Joseph Bonneau, Sören Preibusch, Ross J. Anderson:
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. Financial Cryptography 2012: 25-40 - [c94]Ross J. Anderson:
Ethics Committees and IRBs: Boon, or Bane, or More Research Needed? Financial Cryptography Workshops 2012: 133-135 - [c93]Ross J. Anderson:
Protocol Governance: The Elite, or the Mob? Security Protocols Workshop 2012: 145 - [c92]Ross J. Anderson:
Protocol Governance: The Elite, or the Mob? (Transcript of Discussion). Security Protocols Workshop 2012: 146-160 - [c91]Rubin Xu, Hassen Saïdi, Ross J. Anderson:
Aurasium: Practical Policy Enforcement for Android Applications. USENIX Security Symposium 2012: 539-552 - [c90]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - [i2]Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: cloning EMV cards with the pre-play attack. CoRR abs/1209.2531 (2012) - 2011
- [c89]Ross J. Anderson:
The Dependability of Complex Socio-technical Systems. FASE 2011: 1 - [c88]Ross J. Anderson, Mike Bond, Omar Choudary, Steven J. Murdoch, Frank Stajano:
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. Financial Cryptography 2011: 220-234 - [c87]Ross J. Anderson:
Cryptology: Where Is the New Frontier? INDOCRYPT 2011: 160 - [c86]Shailendra Fuloria, Ross J. Anderson:
Towards a security architecture for substations. ISGT Europe 2011: 1-6 - [c85]Ross J. Anderson:
Can We Fix the Security Economics of Federated Authentication? Security Protocols Workshop 2011: 25-32 - [c84]Ross J. Anderson:
Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion). Security Protocols Workshop 2011: 33-48 - [c83]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS 2011 - [c82]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS (Springer Volume) 2011: 119-148 - 2010
- [c81]Steven J. Murdoch, Ross J. Anderson:
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. Financial Cryptography 2010: 336-342 - [c80]Steven J. Murdoch, Saar Drimer, Ross J. Anderson, Mike Bond:
Chip and PIN is Broken. IEEE Symposium on Security and Privacy 2010: 433-446 - [c79]Ross J. Anderson, Frank Stajano:
It's the Anthropology, Stupid! Security Protocols Workshop 2010: 127-130 - [c78]Ross J. Anderson:
It's the Anthropology, Stupid! (Transcript of Discussion). Security Protocols Workshop 2010: 131-141 - [c77]Ross J. Anderson, Shailendra Fuloria:
On the Security Economics of Electricity Metering. WEIS 2010
2000 – 2009
- 2009
- [j26]