Ross Anderson
Ross Anderson
Dirección de correo verificada de cl.cam.ac.uk - Página principal
Título
Citado por
Citado por
Año
Security engineering: a guide to building dependable distributed systems
R Anderson
John Wiley & Sons, 2020
38992020
Information hiding-a survey
FAP Petitcolas, RJ Anderson, MG Kuhn
Proceedings of the IEEE 87 (7), 1062-1078, 1999
37841999
On the limits of steganography
RJ Anderson, FAP Petitcolas
IEEE Journal on selected areas in communications 16 (4), 474-481, 1998
18051998
The resurrecting duckling: Security issues for ad-hoc wireless networks
F Stajano, R Anderson
International workshop on security protocols, 172-182, 1999
17721999
Tamper resistance-a cautionary note
R Anderson, M Kuhn
Proceedings of the second Usenix workshop on electronic commerce 2, 1-11, 1996
15321996
Attacks on copyright marking systems
FAP Petitcolas, RJ Anderson, MG Kuhn
International workshop on information hiding, 218-238, 1998
14731998
Why information security is hard-an economic perspective
R Anderson
Seventeenth Annual Computer Security Applications Conference, 358-365, 2001
11392001
Optical fault induction attacks
SP Skorobogatov, RJ Anderson
International workshop on cryptographic hardware and embedded systems, 2-12, 2002
9752002
Low cost attacks on tamper resistant devices
R Anderson, M Kuhn
International Workshop on Security Protocols, 125-136, 1997
9271997
Why cryptosystems fail
R Anderson
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
9171993
Combining crypto with biometrics effectively
F Hao, R Anderson, J Daugman
IEEE transactions on computers 55 (9), 1081-1088, 2006
8392006
The economics of information security
R Anderson, T Moore
science 314 (5799), 610-613, 2006
8122006
Password memorability and security: Empirical results
J Yan, A Blackwell, R Anderson, A Grant
IEEE Security & privacy 2 (5), 25-31, 2004
7902004
Access denied: The practice and policy of global internet filtering
R Deibert, J Palfrey, R Rohozinski, J Zittrain
The MIT Press, 2008
6062008
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
6022013
Aurasium: Practical policy enforcement for android applications
R Xu, H Saïdi, R Anderson
21st {USENIX} Security Symposium ({USENIX} Security 12), 539-552, 2012
5772012
Serpent: A proposal for the advanced encryption standard
R Anderson, E Biham, L Knudsen
NIST AES Proposal 174, 1-23, 1998
5261998
Soft tempest: Hidden data transmission using electromagnetic emanations
MG Kuhn, RJ Anderson
International Workshop on Information Hiding, 124-142, 1998
4211998
The eternity service
R Anderson
Proceedings of PRAGOCRYPT 96, 242-252, 1996
3811996
Key infection: Smart trust for smart dust
R Anderson, H Chan, A Perrig
Proceedings of the 12th IEEE International Conference on Network Protocols …, 2004
3792004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20