Tom Chothia
Tom Chothia
Verified email at
Cited by
Cited by
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE Computer Security Foundations Symposium, 107-121, 2010
GAZE: a generic framework for the integration of gene-prediction data by dynamic programming
KL Howe, T Chothia, R Durbin
Genome research 12 (9), 1418-1427, 2002
A traceability attack against e-passports
T Chothia, V Smirnov
International Conference on Financial Cryptography and Data Security, 20-34, 2010
Statistical measurement of information leakage
K Chatzikokolakis, T Chothia, A Guha
International Conference on Tools and Algorithms for the Construction and …, 2010
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
A survey of anonymous peer-to-peer file-sharing
T Chothia, K Chatzikokolakis
International Conference on Embedded and Ubiquitous Computing, 744-755, 2005
Component connectors with QoS guarantees
F Arbab, T Chothia, S Meng, YJ Moon
International Conference on Coordination Languages and Models, 286-304, 2007
From coordination to stochastic models of QoS
F Arbab, T Chothia, R Van Der Mei, S Meng, YJ Moon, C Verhoef
International Conference on Coordination Languages and Models, 268-287, 2009
Schedulability of asynchronous real-time concurrent objects
MM Jaghoori, FS de Boer, T Chothia, M Sirjani
The Journal of Logic and Algebraic Programming 78 (5), 402-416, 2009
A framework for automatically checking anonymity with μCRL
T Chothia, S Orzan, J Pang, MT Dashti
International Symposium on Trustworthy Global Computing, 301-318, 2006
A statistical test for information leaks using continuous mutual information
T Chothia, A Guha
2011 IEEE 24th Computer Security Foundations Symposium, 177-190, 2011
Type-based distributed access control
T Chothia, D Duggan, J Vitek
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 170-184, 2003
Leakwatch: Estimating information leakage from java programs
T Chothia, Y Kawamoto, C Novakovic
European Symposium on Research in Computer Security, 219-236, 2014
Q-automata: Modelling the resource usage of concurrent components
T Chothia, J Kleijn
Electronic Notes in Theoretical Computer Science 175 (2), 153-167, 2007
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them
E Marin, D Singelée, FD Garcia, T Chothia, R Willems, B Preneel
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Relay cost bounding for contactless EMV payments
T Chothia, FD Garcia, J De Ruiter, J Van Den Breekel, M Thompson
International Conference on Financial Cryptography and Data Security, 189-206, 2015
A tool for estimating information leakage
T Chothia, Y Kawamoto, C Novakovic
International Conference on Computer Aided Verification, 690-695, 2013
Analysing the MUTE anonymous file-sharing system using the pi-calculus
T Chothia
International Conference on Formal Techniques for Networked and Distributed …, 2006
Probabilistic point-to-point information leakage
T Chothia, Y Kawamoto, C Novakovic, D Parker
2013 IEEE 26th Computer Security Foundations Symposium, 193-205, 2013
An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education
T Chothia, C Novakovic
2015 {USENIX} Summit on Gaming, Games, and Gamification in Security …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20