Ross Anderson
TitleCited byYear
Security engineering
R Anderson
John Wiley & Sons, 2008
Information hiding-a survey
FAP Petitcolas, RJ Anderson, MG Kuhn
Proceedings of the IEEE 87 (7), 1062-1078, 1999
The resurrecting duckling: Security issues for ad-hoc wireless networks
F Stajano, R Anderson
International workshop on security protocols, 172-182, 1999
On the limits of steganography
RJ Anderson, FAP Petitcolas
IEEE Journal on selected areas in communications 16 (4), 474-481, 1998
Tamper resistance-a cautionary note
R Anderson, M Kuhn
Proceedings of the second Usenix workshop on electronic commerce 2, 1-11, 1996
Attacks on copyright marking systems
FAP Petitcolas, RJ Anderson, MG Kuhn
International workshop on information hiding, 218-238, 1998
Why information security is hard-an economic perspective
R Anderson
Seventeenth Annual Computer Security Applications Conference, 358-365, 2001
Low cost attacks on tamper resistant devices
R Anderson, M Kuhn
International Workshop on Security Protocols, 125-136, 1997
Why cryptosystems fail
R Anderson
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
Optical fault induction attacks
SP Skorobogatov, RJ Anderson
International workshop on cryptographic hardware and embedded systems, 2-12, 2002
Combining crypto with biometrics effectively
F Hao, R Anderson, J Daugman
IEEE transactions on computers 55 (9), 1081-1088, 2006
Password memorability and security: Empirical results
J Yan, A Blackwell, R Anderson, A Grant
IEEE Security & privacy 2 (5), 25-31, 2004
The economics of information security
R Anderson, T Moore
science 314 (5799), 610-613, 2006
The anemia of chronic renal failure: pathophysiology and the effects of recombinant erythropoietin
JW Eschbach
Kidney international 35 (1), 134-148, 1989
Serpent: A proposal for the advanced encryption standard
RAEBL Knudsen
First Advanced Encryption Standard (AES) Conference, Ventura, CA, 1998
Aurasium: Practical policy enforcement for android applications
R Xu, H Saïdi, R Anderson
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
Two remarks on public key cryptology
R Anderson
Unpublished. Available from http://www. cl. cam. ac. uk/users/rja14, 1997
Key infection: Smart trust for smart dust
R Anderson, H Chan, A Perrig
Proceedings of the 12th IEEE International Conference on Network Protocols …, 2004
Soft tempest: Hidden data transmission using electromagnetic emanations
MG Kuhn, RJ Anderson
International Workshop on Information Hiding, 124-142, 1998
The system can't perform the operation now. Try again later.
Articles 1–20