F Stajano
F Stajano
Professor of Security and Privacy, University of Cambridge Computer Lab
Verifierad e-postadress på cl.cam.ac.uk - Startsida
Citeras av
Citeras av
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
The resurrecting duckling: Security issues for ad-hoc wireless networks
F Stajano, R Anderson
International workshop on security protocols, 172-182, 1999
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE Symposium on Security and Privacy, 553-567, 2012
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual conference on pervasive computing and communications workshops …, 2004
Security for Ubiquitous Computing
F Stajano
Security for Ubiquitous Computing, 2002
Evolutionary robotics
JC Bongard
Communications of the ACM 56 (8), 74-83, 2013
The resurrecting duckling—what next?
F Stajano
International Workshop on Security Protocols, 204-214, 2000
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
The resurrecting duckling: security issues for ubiquitous computing
F Stajano, R Anderson
Computer 35 (4), supl22-supl26, 2002
Understanding scam victims: seven principles for systems security
F Stajano, P Wilson
Communications of the ACM 54 (3), 70-75, 2011
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure
F Stajano, N Hoult, I Wassell, P Bennett, C Middleton, K Soga
Ad Hoc Networks 8 (8), 872-888, 2010
Pico: No more passwords!
F Stajano
International Workshop on Security Protocols, 49-81, 2011
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
D Ünay, Z Çataltepe, S Aksoy
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2010
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Proceedings of the 2nd ACM workshop on Online social networks, 1-6, 2009
Autonomic system for mobility support in 4G networks
P Vidales, J Baliosian, J Serrat, G Mapp, F Stajano, A Hopper
IEEE Journal on Selected Areas in Communications 23 (12), 2288-2304, 2005
The cocaine auction protocol: On the power of anonymous broadcast
F Stajano, R Anderson
International Workshop on Information Hiding, 434-447, 1999
Quantitatively assessing and visualising industrial system attack surfaces
EP Leverett
University of Cambridge, Darwin College 7, 21, 2011
The resurrecting duckling
F Stajano
International workshop on security protocols, 183-194, 1999
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
PJ Denning
Communications of the ACM 55 (12), 33-35, 2012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20