default search action
Ross J. Anderson
Person information
- affiliation: University of Cambridge, UK
Other persons with the same name
- Ross Anderson — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [j40]Ilia Shumailov, Zakhar Shumaylov, Yiren Zhao, Nicolas Papernot, Ross J. Anderson, Yarin Gal:
AI models collapse when trained on recursively generated data. Nat. 631(8022): 755-759 (2024) - [c141]Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross J. Anderson, Robert D. Mullins:
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks. SaTML 2024: 344-357 - [c140]Anh V. Vu, Alice Hutchings, Ross J. Anderson:
No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. SP 2024: 717-734 - [c139]Pranav Dahiya, Ilia Shumailov, Ross Anderson:
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks. USENIX Security Symposium 2024 - [c138]Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross J. Anderson:
Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict. WWW 2024: 1596-1607 - [i37]Jenny Blessing, Daniel Hugenroth, Ross J. Anderson, Alastair R. Beresford:
SoK: Web Authentication in the Age of End-to-End Encryption. CoRR abs/2406.18226 (2024) - 2023
- [c137]Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. RAID 2023: 700-713 - [c136]Jenny Blessing, Ross Anderson:
One Protocol to Rule Them All? On Securing Interoperable Messaging. Security Protocols Workshop 2023: 174-192 - [c135]Ross J. Anderson, Nicholas Boucher:
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard. Security Protocols Workshop 2023: 199-204 - [c134]Ross J. Anderson, Nicholas Boucher:
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion). Security Protocols Workshop 2023: 205-210 - [c133]Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid:
Towards Human-Centric Endpoint Security. Security Protocols Workshop 2023: 211-219 - [c132]Nicholas Boucher, Ross Anderson:
Trojan Source: Invisible Vulnerabilities. USENIX Security Symposium 2023: 6507-6524 - [i36]Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross J. Anderson, Awais Rashid:
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications. CoRR abs/2301.05653 (2023) - [i35]Jenny Blessing, Ross J. Anderson:
One Protocol to Rule Them All? On Securing Interoperable Messaging. CoRR abs/2303.14178 (2023) - [i34]Anh V. Vu, Alice Hutchings, Ross J. Anderson:
No Easy Way Out: The Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. CoRR abs/2304.07037 (2023) - [i33]Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. CoRR abs/2304.14031 (2023) - [i32]Ross J. Anderson, Nicholas Boucher:
If it's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard. CoRR abs/2305.04755 (2023) - [i31]Ilia Shumailov, Zakhar Shumaylov, Yiren Zhao, Yarin Gal, Nicolas Papernot, Ross J. Anderson:
The Curse of Recursion: Training on Generated Data Makes Models Forget. CoRR abs/2305.17493 (2023) - [i30]Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot:
When Vision Fails: Text Attacks Against ViT and OCR. CoRR abs/2306.07033 (2023) - [i29]Pranav Dahiya, Ilia Shumailov, Ross J. Anderson:
Machine Learning needs its own Randomness Standard: Randomised Smoothing and PRNG-based attacks. CoRR abs/2306.14043 (2023) - [i28]David Khachaturov, Yue Gao, Ilia Shumailov, Robert D. Mullins, Ross J. Anderson, Kassem Fawaz:
Human-Producible Adversarial Examples. CoRR abs/2310.00438 (2023) - [i27]Nicholas Boucher, Ross J. Anderson:
Automatic Bill of Materials. CoRR abs/2310.09742 (2023) - 2022
- [j39]Mansoor Ahmed-Rengers, Diana A. Vasile, Daniel Hugenroth, Alastair R. Beresford, Ross Anderson:
CoverDrop: Blowing the Whistle Through A News App. Proc. Priv. Enhancing Technol. 2022(2): 47-67 (2022) - [c131]Ildiko Pete, Jack Hughes, Andrew Caines, Anh V. Vu, Harshad Gupta, Alice Hutchings, Ross J. Anderson, Paula Buttery:
PostCog: A tool for interdisciplinary research into underground forums at scale. EuroS&P Workshops 2022: 93-104 - [c130]Nicholas Boucher, Ross Anderson:
Talking Trojan: Analyzing an Industry-Wide Disclosure. SCORED@CCS 2022: 83-92 - [c129]Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot:
Bad Characters: Imperceptible NLP Attacks. SP 2022: 1987-2004 - [i26]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - [i25]Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross J. Anderson:
Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict. CoRR abs/2208.10629 (2022) - [i24]Nicholas Boucher, Ross J. Anderson:
Talking Trojan: Analyzing an Industry-Wide Disclosure. CoRR abs/2209.10717 (2022) - [i23]Tim Clifford, Ilia Shumailov, Yiren Zhao, Ross J. Anderson, Robert D. Mullins:
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks. CoRR abs/2210.00108 (2022) - 2021
- [c128]Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert D. Mullins, Ross Anderson:
Sponge Examples: Energy-Latency Attacks on Neural Networks. EuroS&P 2021: 212-231 - [c127]David Khachaturov, Ilia Shumailov, Yiren Zhao, Nicolas Papernot, Ross J. Anderson:
Markpainting: Adversarial Machine Learning meets Inpainting. ICML 2021: 5409-5419 - [c126]Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A. Erdogdu, Ross J. Anderson:
Manipulating SGD with Data Ordering Attacks. NeurIPS 2021: 18021-18032 - [i22]Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A. Erdogdu, Ross J. Anderson:
Manipulating SGD with Data Ordering Attacks. CoRR abs/2104.09667 (2021) - [i21]David Khachaturov, Ilia Shumailov, Yiren Zhao, Nicolas Papernot, Ross J. Anderson:
Markpainting: Adversarial Machine Learning meets Inpainting. CoRR abs/2106.00660 (2021) - [i20]Nicholas Boucher, Ilia Shumailov, Ross J. Anderson, Nicolas Papernot:
Bad Characters: Imperceptible NLP Attacks. CoRR abs/2106.09898 (2021) - [i19]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - [i18]Nicholas Boucher, Ross J. Anderson:
Trojan Source: Invisible Vulnerabilities. CoRR abs/2111.00169 (2021) - [i17]Anh V. Vu, Lydia Wilson, Yi Ting Chua, Ilia Shumailov, Ross J. Anderson:
ExtremeBB: Enabling Large-Scale Research into Extremism, the Manosphere and Their Correlation by Online Forum Data. CoRR abs/2111.04479 (2021) - 2020
- [c125]Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Ross J. Anderson:
Towards Certifiable Adversarial Sample Detection. AISec@CCS 2020: 13-24 - [c124]Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert D. Mullins, Ross J. Anderson:
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information. DSN Workshops 2020: 16-24 - [i16]Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Ross J. Anderson:
Towards Certifiable Adversarial Sample Detection. CoRR abs/2002.08740 (2020) - [i15]Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert D. Mullins, Ross J. Anderson:
Sponge Examples: Energy-Latency Attacks on Neural Networks. CoRR abs/2006.03463 (2020) - [i14]Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On The Difficulty of Whistleblowing. CoRR abs/2006.14407 (2020) - [i13]Almos Zarandy, Ilia Shumailov, Ross J. Anderson:
BatNet: Data transmission between smartphones over ultrasound. CoRR abs/2008.00136 (2020) - [i12]Yiren Zhao, Ilia Shumailov, Robert D. Mullins, Ross J. Anderson:
Nudge Attacks on Point-Cloud DNNs. CoRR abs/2011.11637 (2020) - [i11]Almos Zarandy, Ilia Shumailov, Ross J. Anderson:
Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant. CoRR abs/2012.00687 (2020)
2010 – 2019
- 2019
- [c123]Yiren Zhao, Ilia Shumailov, Robert D. Mullins, Ross Anderson:
To Compress Or Not To Compress: Understanding The Interactions Between Adversarial Attacks And Neural Network Compression. SysML 2019 - [c122]Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On the Difficulty of Whistleblowing. Security Protocols Workshop 2019: 289-303 - [c121]Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion). Security Protocols Workshop 2019: 304-312 - [i10]Mansoor Ahmed-Rengers, Ilia Shumailov, Ross Anderson:
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins. CoRR abs/1901.01769 (2019) - [i9]Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert D. Mullins, Ross Anderson, Cheng-Zhong Xu:
Sitatapatra: Blocking the Transfer of Adversarial Samples. CoRR abs/1901.08121 (2019) - [i8]Ilia Shumailov, Laurent Simon, Jeff Yan, Ross Anderson:
Hearing your touch: A new acoustic side channel on smartphones. CoRR abs/1903.11137 (2019) - [i7]Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert D. Mullins, Ross J. Anderson:
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information. CoRR abs/1909.02918 (2019) - [i6]Sophie van der Zee, Richard Clayton, Ross J. Anderson:
The gift of the gab: Are rental scammers skilled at the art of persuasion? CoRR abs/1911.08253 (2019) - 2018
- [j38]Ross Anderson:
Making security sustainable. Commun. ACM 61(3): 24-26 (2018) - [c120]Laurent Simon, David Chisnall, Ross J. Anderson:
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers. EuroS&P 2018: 1-15 - [c119]Mansoor Ahmed-Rengers, Ilia Shumailov, Ross Anderson:
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins. GraMSec@FLoC 2018: 1-12 - [c118]Ross Anderson:
Sustainable Security - an Internet of Durable Goods. ICISSP 2018: 7 - [c117]Ross Anderson:
Covert and Deniable Communications. IH&MMSec 2018: 1 - [c116]Ross Anderson, Ilia Shumailov, Mansoor Ahmed-Rengers:
Making Bitcoin Legal. Security Protocols Workshop 2018: 243-253 - [c115]Ross Anderson:
Making Bitcoin Legal (Transcript of Discussion). Security Protocols Workshop 2018: 254-265 - [i5]Yiren Zhao, Ilia Shumailov, Robert D. Mullins, Ross Anderson:
To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression. CoRR abs/1810.00208 (2018) - [i4]Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Ross Anderson:
The Taboo Trap: Behavioural Detection of Adversarial Samples. CoRR abs/1811.07375 (2018) - 2017
- [j37]Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. J. Cybersecur. 3(2): 109-125 (2017) - [c114]Khaled Baqer, Ross J. Anderson, Lorna Mutegi, Jeunese A. Payne, Joseph Sevilla:
DigiTally: Piloting Offline Payments for Phones. SOUPS 2017: 131-143 - [c113]Ross J. Anderson, Khaled Baqer:
Reconciling Multiple Objectives - Politics or Markets? Security Protocols Workshop 2017: 144-156 - [c112]Ross Anderson:
Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion). Security Protocols Workshop 2017: 157-170 - 2016
- [j36]Laurent Simon, Wenduan Xu, Ross J. Anderson:
Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards. Proc. Priv. Enhancing Technol. 2016(3): 136-154 (2016) - [c111]Ross J. Anderson:
Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only). CSF 2016: 16 - [c110]Alice Hutchings, Richard Clayton, Ross J. Anderson:
Taking down websites to prevent crime. eCrime 2016: 102-111 - [c109]Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - [c108]Khaled Baqer, S. Johann Bezuidenhoudt, Ross J. Anderson, Markus G. Kuhn:
SMAPs: Short Message Authentication Protocols. Security Protocols Workshop 2016: 119-132 - [c107]Khaled Baqer, Ross J. Anderson:
SMAPs: Short Message Authentication Protocols (Transcript of Discussion). Security Protocols Workshop 2016: 133-140 - 2015
- [j35]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j34]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [j33]Mike Bond, Marios O. Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Be Prepared: The EMV Preplay Attack. IEEE Secur. Priv. 13(2): 56-64 (2015) - [j32]David Modic, Ross J. Anderson:
It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud. IEEE Secur. Priv. 13(5): 99-103 (2015) - [c106]Khaled Baqer, Ross J. Anderson:
Do You Believe in Tinker Bell? The Social Externalities of Trust. Security Protocols Workshop 2015: 224-236 - [c105]Khaled Baqer, Ross J. Anderson:
Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion). Security Protocols Workshop 2015: 237-246 - 2014
- [j31]Ross J. Anderson, Steven J. Murdoch:
EMV: why payment systems fail. Commun. ACM 57(6): 24-28 (2014) - [j30]David Modic, Ross J. Anderson:
Reading this may harm your computer: The psychology of malware warnings. Comput. Hum. Behav. 41: 71-79 (2014) - [c104]Steven J. Murdoch, Ross J. Anderson:
Security Protocols and Evidence: Where Many Payment Systems Fail. Financial Cryptography 2014: 21-32 - [c103]Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: Cloning EMV Cards with the Pre-play Attack. IEEE Symposium on Security and Privacy 2014: 49-64 - [c102]Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore, L. Jean Camp, Kevin Benton, Ross J. Anderson:
Collaborating with the Enemy on Network Management. Security Protocols Workshop 2014: 154-162 - [c101]Ross J. Anderson, Chris Hall:
Collaborating with the Enemy on Network Management (Transcript of Discussion). Security Protocols Workshop 2014: 163-171 - 2013
- [j29]Hyoungshick Kim, Ross J. Anderson:
An Experimental Evaluation of Robustness of Networks. IEEE Syst. J. 7(2): 179-188 (2013) - [c100]Laurent Simon, Ross J. Anderson:
PIN skimmer: inferring PINs through the camera and microphone. SPSM@CCS 2013: 67-78 - [c99]Wei Ming Khoo, Alan Mycroft, Ross J. Anderson:
Rendezvous: a search engine for binary code. MSR 2013: 329-338 - [c98]Dongting Yu, Andrew W. Moore, Chris Hall, Ross J. Anderson:
Authentication for Resilience: The Case of SDN. Security Protocols Workshop 2013: 39-44 - [p5]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - [i3]Ross J. Anderson, Robert Brady:
Why quantum computing is hard - and quantum cryptography is not provably secure. CoRR abs/1301.7351 (2013) - 2012
- [j28]Hyoungshick Kim, John Kit Tang, Ross J. Anderson, Cecilia Mascolo:
Centrality prediction in dynamic human contact networks. Comput. Networks 56(3): 983-996 (2012) - [j27]Steven J. Murdoch, Mike Bond, Ross J. Anderson:
How Certification Systems Fail: Lessons from the Ware Report. IEEE Secur. Priv. 10(6): 40-44 (2012) - [c97]Ross J. Anderson:
Security economics: a personal perspective. ACSAC 2012: 139-144 - [c96]Hyoungshick Kim, John Kit Tang, Ross J. Anderson:
Social Authentication: Harder Than It Looks. Financial Cryptography 2012: 1-15 - [c95]Joseph Bonneau, Sören Preibusch, Ross J. Anderson:
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. Financial Cryptography 2012: 25-40 - [c94]Ross J. Anderson:
Ethics Committees and IRBs: Boon, or Bane, or More Research Needed? Financial Cryptography Workshops 2012: 133-135 - [c93]Ross J. Anderson:
Protocol Governance: The Elite, or the Mob? Security Protocols Workshop 2012: 145 - [c92]Ross J. Anderson:
Protocol Governance: The Elite, or the Mob? (Transcript of Discussion). Security Protocols Workshop 2012: 146-160 - [c91]Rubin Xu, Hassen Saïdi, Ross J. Anderson:
Aurasium: Practical Policy Enforcement for Android Applications. USENIX Security Symposium 2012: 539-552 - [c90]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - [i2]Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: cloning EMV cards with the pre-play attack. CoRR abs/1209.2531 (2012) - 2011
- [c89]Ross J. Anderson:
The Dependability of Complex Socio-technical Systems. FASE 2011: 1 - [c88]Ross J. Anderson, Mike Bond, Omar Choudary, Steven J. Murdoch, Frank Stajano:
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. Financial Cryptography 2011: 220-234 - [c87]Ross J. Anderson:
Cryptology: Where Is the New Frontier? INDOCRYPT 2011: 160 - [c86]Shailendra Fuloria, Ross J. Anderson:
Towards a security architecture for substations. ISGT Europe 2011: 1-6 - [c85]Ross J. Anderson:
Can We Fix the Security Economics of Federated Authentication? Security Protocols Workshop 2011: 25-32 - [c84]Ross J. Anderson:
Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion). Security Protocols Workshop 2011: 33-48 - [c83]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS 2011 - [c82]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS (Springer Volume) 2011: 119-148 - 2010
- [c81]Steven J. Murdoch, Ross J. Anderson:
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. Financial Cryptography 2010: 336-342 - [c80]Steven J. Murdoch, Saar Drimer, Ross J. Anderson, Mike Bond:
Chip and PIN is Broken. IEEE Symposium on Security and Privacy 2010: 433-446 - [c79]Ross J. Anderson, Frank Stajano:
It's the Anthropology, Stupid! Security Protocols Workshop 2010: 127-130 - [c78]Ross J. Anderson:
It's the Anthropology, Stupid! (Transcript of Discussion). Security Protocols Workshop 2010: 131-141 - [c77]Ross J. Anderson, Shailendra Fuloria:
On the Security Economics of Electricity Metering. WEIS 2010
2000 – 2009
- 2009
- [j26]Ross J. Anderson:
Technical perspective - A chilly sense of security. Commun. ACM 52(5): 90 (2009) - [j25]Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Failures of Tamper-Proofing in PIN Entry Devices. IEEE Secur. Priv. 7(6): 39-45 (2009) - [c76]Ross J. Anderson, Shailendra Fuloria:
Certification and Evaluation: A Security Economics Perspective. ETFA 2009: 1-7 - [c75]Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Optimised to Fail: Card Readers for Online Banking. Financial Cryptography 2009: 184-200 - [c74]Joseph Bonneau, Jonathan Anderson, Ross J. Anderson, Frank Stajano:
Eight friends are enough: social graph approximation via public listings. SNS 2009: 13-18 - [c73]Ross J. Anderson:
The Trust Economy of Brief Encounters. Security Protocols Workshop 2009: 282-284 - [c72]Ross J. Anderson:
The Trust Economy of Brief Encounters. Security Protocols Workshop 2009: 285-297 - [c71]Ross J. Anderson, Shailendra Fuloria:
Security Economics and Critical National Infrastructure. WEIS 2009 - [p4]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. Managing Information Risk and the Economics of Security 2009: 55-80 - 2008
- [b2]Ross J. Anderson:
Security engineering - a guide to building dependable distributed systems (2. ed.). Wiley 2008, ISBN 978-0-470-06852-6, pp. I-XL, 1-1040 - [c70]Ross J. Anderson:
Security, Functionality and Scale? DBSec 2008: 64 - [c69]Ross J. Anderson:
Information Security Economics - and Beyond. DEON 2008: 49 - [c68]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. ISSE 2008: 57-76 - [c67]Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos, Ross J. Anderson, Jean-Pierre Hubaux:
Fast Exclusion of Errant Devices from Vehicular Networks. SECON 2008: 135-143 - [c66]Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Thinking Inside the Box: System-Level Failures of Tamper Proofing. SP 2008: 281-295 - [c65]Ross J. Anderson, Steven J. Murdoch:
What Next after Anonymity? Security Protocols Workshop 2008: 220-222 - [c64]Ross J. Anderson:
What Next After Anonymity? (Transcript of Discussion). Security Protocols Workshop 2008: 223-231 - [c63]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. WEIS 2008 - 2007
- [j24]Ross J. Anderson:
Software Security: State of the Art. IEEE Secur. Priv. 5(1): 8 (2007) - [j23]Gary McGraw, Ross J. Anderson:
Silver Bullet Talks with Ross Anderson. IEEE Secur. Priv. 5(4): 10-13 (2007) - [c62]Shishir Nagaraja, Ross J. Anderson:
Dynamic Topologies for Robust Scale-Free Networks. BIOWIRE 2007: 411-426 - [c61]Ross J. Anderson, Tyler Moore:
Information Security Economics - and Beyond. CRYPTO 2007: 68-91 - [c60]Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson:
New Strategies for Revocation in Ad-Hoc Networks. ESAS 2007: 232-246 - [c59]Ross J. Anderson:
Position Statement in RFID S&P Panel: RFID and the Middleman. Financial Cryptography 2007: 46-49 - [c58]Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross J. Anderson, Ronald L. Rivest:
On the Security of the EMV Secure Messaging API (Extended Abstract). Security Protocols Workshop 2007: 147-149 - [c57]Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, Ross J. Anderson:
Robbing the Bank with a Theorem Prover - (Abstract). Security Protocols Workshop 2007: 171 - 2006
- [j22]Ross J. Anderson, Mike Bond, Jolyon Clulow, Sergei P. Skorobogatov:
Cryptographic Processors-A Survey. Proc. IEEE 94(2): 357-369 (2006) - [j21]Feng Hao, Ross J. Anderson, John Daugman:
Combining Crypto with Biometrics Effectively. IEEE Trans. Computers 55(9): 1081-1088 (2006) - [c56]Richard E. Newman, Sherman Gavette, Larry Yonge, Ross J. Anderson:
Protecting domestic power-line communications. SOUPS 2006: 122-132 - [c55]Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven J. Murdoch, Ross J. Anderson, Ronald L. Rivest:
Phish and Chips. Security Protocols Workshop 2006: 40-48 - [c54]Ross J. Anderson, Mike Bond:
The Man-in-the-Middle Defence. Security Protocols Workshop 2006: 153-156 - [c53]Ross J. Anderson:
The Man-in-the-Middle Defence. Security Protocols Workshop 2006: 157-163 - [c52]Shishir Nagaraja, Ross J. Anderson:
The Topology of Covert Conflict. WEIS 2006 - 2005
- [j20]Ross J. Anderson, Bruce Schneier:
Guest Editors' Introduction: Economics of Information Security. IEEE Secur. Priv. 3(1): 12-13 (2005) - [j19]George Danezis, Ross J. Anderson:
The Economics of Resisting Censorship. IEEE Secur. Priv. 3(1): 45-50 (2005) - [c51]George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson:
Sybil-Resistant DHT Routing. ESORICS 2005: 305-318 - [c50]Ross J. Anderson:
The Initial Costs and Maintenance Costs of Protocols. Security Protocols Workshop 2005: 333-335 - [c49]Ross J. Anderson:
The Initial Costs and Maintenance Costs of Protocols. Security Protocols Workshop 2005: 336-343 - [c48]George Danezis, Stephen Lewis, Ross J. Anderson:
How Much Is Location Privacy Worth? WEIS 2005 - [i1]Shishir Nagaraja, Ross J. Anderson:
The topology of covert conflict. IACR Cryptol. ePrint Arch. 2005: 250 (2005) - 2004
- [j18]Jeff Jianxin Yan, Alan F. Blackwell, Ross J. Anderson, Alasdair Grant:
Password Memorability and Security: Empirical Results. IEEE Secur. Priv. 2(5): 25-31 (2004) - [c47]Ross J. Anderson, Haowen Chan, Adrian Perrig:
Key Infection: Smart Trust for Smart Dust. ICNP 2004: 206-215 - [c46]Ross J. Anderson:
The Dancing Bear: A New Way of Composing Ciphers. Security Protocols Workshop 2004: 231-238 - [c45]Ross J. Anderson:
The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion). Security Protocols Workshop 2004: 239-245 - [p3]Ross J. Anderson:
Cryptography and Competition Policy - Issues with 'Trusted Computing'. Economics of Information Security 2004: 35-52 - 2003
- [j17]Simon W. Moore, Ross J. Anderson, Robert D. Mullins, George S. Taylor, Jacques J. A. Fournier:
Balanced self-checking asynchronous logic for smart card applications. Microprocess. Microsystems 27(9): 421-430 (2003) - [c44]Ross J. Anderson:
Cryptography and competition policy: issues with 'trusted computing'. PODC 2003: 3-10 - [c43]Ross J. Anderson:
What We Can Learn from API Security. Security Protocols Workshop 2003: 288-300 - 2002
- [j16]Ross J. Anderson:
Free speech online and offline. Commun. ACM 45(6): 120 (2002) - [j15]Ross J. Anderson:
Free Speech Online and Offline. Computer 35(6): 28-30 (2002) - [c42]Simon W. Moore, Robert D. Mullins, Paul A. Cunningham, Ross J. Anderson, George S. Taylor:
Improving Smart Card Security Using Self-Timed Circuits. ASYNC 2002: 211-218 - [c41]Sergei P. Skorobogatov, Ross J. Anderson:
Optical Fault Induction Attacks. CHES 2002: 2-12 - [c40]David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater:
On a New Way to Read Data from Memory. IEEE Security in Storage Workshop 2002: 65-69 - 2001
- [b1]Ross J. Anderson:
Security engineering - a guide to building dependable distributed systems. Wiley 2001, ISBN 978-0-471-38922-4, pp. I-XXVIII, 1-612 - [j14]Ross J. Anderson, Frank Stajano, Jong-Hyeon Lee:
Security policies. Adv. Comput. 55: 185-235 (2001) - [j13]Mike Bond, Ross J. Anderson:
API-Level Attacks on Embedded Systems. Computer 34(10): 67-75 (2001) - [c39]Ross J. Anderson:
Why Information Security is Hard-An Economic Perspective. ACSAC 2001: 358-365 - [c38]Ross J. Anderson:
Protecting Embedded Systems - The Next Ten Years. CHES 2001: 1-2 - 2000
- [j12]Ross J. Anderson, Jong-Hyeon Lee:
Jikzi - a new framework for security policy, trusted publishing and electronic commerce. Comput. Commun. 23(17): 1621-1626 (2000) - [j11]Ross J. Anderson, Terry Bollinger, Doug Brown, Enrique Draier, Philip Machanick, Gary McGraw, Nancy R. Mead, Arthur B. Pyster, Howard Schmidt, Timothy J. Shimeall:
Roundtable on Information Security Policy. IEEE Softw. 17(5): 26-32 (2000) - [c37]Ross J. Anderson, Eli Biham, Lars R. Knudsen:
The Case for Serpent. AES Candidate Conference 2000: 349-354 - [c36]Ross J. Anderson:
Privacy Technology Lessons from Healthcare. S&P 2000: 78-79 - [c35]Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas:
Government Access to Keys - Panel Discussion. Security Protocols Workshop 2000: 62-73 - [c34]Ross J. Anderson:
The Correctness of Crypto Transaction Sets. Security Protocols Workshop 2000: 125-127 - [c33]Ross J. Anderson:
The Correctness of Crypto Transaction Sets (Discussion). Security Protocols Workshop 2000: 128-141
1990 – 1999
- 1999
- [j10]Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn:
Information hiding-a survey. Proc. IEEE 87(7): 1062-1078 (1999) - [c32]Ross J. Anderson:
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). ACSAC 1999 - [c31]Fabien A. P. Petitcolas, Ross J. Anderson:
Evaluation of Copyright Marking Systems. ICMCS, Vol. 1 1999: 574-579 - [c30]Frank Stajano, Ross J. Anderson:
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. Information Hiding 1999: 434-447 - [c29]Ross J. Anderson, Jong-Hyeon Lee:
Jikzi: A New Framework for Secure Publishing. Security Protocols Workshop 1999: 21-47 - [c28]Frank Stajano, Ross J. Anderson:
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. Security Protocols Workshop 1999: 172-194 - 1998
- [j9]Ross J. Anderson, Cunsheng Ding, Tor Helleseth, Torleiv Kløve:
How to Build Robust Shared Control Systems. Des. Codes Cryptogr. 15(2): 111-124 (1998) - [j8]Ross J. Anderson, Fabien A. P. Petitcolas:
On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4): 474-481 (1998) - [j7]Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham:
A New Family of Authentication Protocols. ACM SIGOPS Oper. Syst. Rev. 32(4): 9-20 (1998) - [c27]Ross J. Anderson, Eli Biham, Lars R. Knudsen:
Serpent and Smartcards. CARDIS 1998: 246-253 - [c26]Ross J. Anderson:
On the Security of Digital Tachographs. ESORICS 1998: 111-125 - [c25]Eli Biham, Ross J. Anderson, Lars R. Knudsen:
Serpent: A New Block Cipher Proposal. FSE 1998: 222-238 - [c24]Ross J. Anderson, Roger M. Needham, Adi Shamir:
The Steganographic File System. Information Hiding 1998: 73-82 - [c23]Markus G. Kuhn, Ross J. Anderson:
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. Information Hiding 1998: 124-142 - [c22]Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn:
Attacks on Copyright Marking Systems. Information Hiding 1998: 218-238 - [c21]Ross J. Anderson, Václav Matyás Jr., Fabien A. P. Petitcolas:
The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web. USENIX Workshop on Electronic Commerce 1998 - 1997
- [j6]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier:
The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web J. 2: 241-257 (1997) - [c20]Ross J. Anderson, Michael Roe:
The GCHQ Protocol and Its Problems. EUROCRYPT 1997: 134-148 - [c19]Ross J. Anderson, Charalampos Manifavas:
Chameleon - A New Kind of Stream Cipher. FSE 1997: 107-113 - [c18]Ross J. Anderson, Václav Matyás Jr., Fabien A. P. Petitcolas, Iain E. Buchan, Rudolf Hanka:
Secure Books: Protecting the Distribution of Knowledge. Security Protocols Workshop 1997: 1-11 - [c17]Ross J. Anderson, Markus G. Kuhn:
Low Cost Attacks on Tamper Resistant Devices. Security Protocols Workshop 1997: 125-136 - [p2]Ross Anderson:
An Update on the BMA Security Policy. Personal Medical Information 1997: 233-250 - [e3]Ross Anderson:
Personal Medical Information - Security, Engineering, and Ethics. Springer 1997, ISBN 978-3-540-63244-3 [contents] - 1996
- [j5]Ross J. Anderson, S. Johann Bezuidenhoudt:
On the Reliability of Electronic Payment Systems. IEEE Trans. Software Eng. 22(5): 294-301 (1996) - [c16]Ross J. Anderson, Serge Vaudenay:
Minding your p's and q's. ASIACRYPT 1996: 26-35 - [c15]Ross J. Anderson, Eli Biham:
TIGER: A Fast New Hash Function. FSE 1996: 89-97 - [c14]Ross J. Anderson, Eli Biham:
Two Practical and Provably Secure Block Ciphers: BEARS and LION. FSE 1996: 113-120 - [c13]Ross J. Anderson:
Stretching the Limits of Steganography. Information Hiding 1996: 39-48 - [c12]Ross J. Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg:
The Newton Channel. Information Hiding 1996: 151-156 - [c11]Ross J. Anderson:
A Security Policy Model for Clinical Information Systems. S&P 1996: 30-43 - [c10]Ross J. Anderson, Charalampos Manifavas, Chris Sutherland:
NetCard - A Practical Electronic-Cash System. Security Protocols Workshop 1996: 49-57 - [e2]Ross J. Anderson:
Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings. Lecture Notes in Computer Science 1174, Springer 1996, ISBN 3-540-61996-8 [contents] - 1995
- [c9]Ross J. Anderson:
Crypto in Europe - Markets, Law and Policy. Cryptography: Policy and Algorithms 1995: 75-89 - [c8]Ross J. Anderson, Roger M. Needham:
Robustness Principles for Public Key Protocols. CRYPTO 1995: 236-247 - [c7]Ross J. Anderson, S. Johann Bezuidenhoudt:
Cryptographic credit control in pre-payment metering systems. S&P 1995: 15-23 - [p1]Ross J. Anderson, Roger M. Needham:
Programming Satan's Computer. Computer Science Today 1995: 426-440 - 1994
- [j4]Ross J. Anderson:
Why Cryptosystems Fail. Commun. ACM 37(11): 32-40 (1994) - [j3]Ross J. Anderson:
Whither Cryptography. Inf. Manag. Comput. Secur. 2(5): 13-20 (1994) - [c6]Ross J. Anderson:
Liability and Computer Security: Nine Principles. ESORICS 1994: 231-245 - [c5]Ross J. Anderson:
Searching for the Optimum Correlation Attack. FSE 1994: 137-143 - [c4]Ross J. Anderson:
On Fibonacci Keystream Generators. FSE 1994: 346-352 - [e1]Ross J. Anderson:
Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings. Lecture Notes in Computer Science 809, Springer 1994, ISBN 3-540-58108-1 [contents] - 1993
- [c3]Ross J. Anderson:
Why Cryptosystems Fail. CCS 1993: 215-227 - [c2]Ross J. Anderson:
A Modern Rotor Machine. FSE 1993: 47-50 - 1992
- [c1]Ross J. Anderson:
UEPS - A Second Generation Electronic Wallet. ESORICS 1992: 411-418 - 1991
- [j2]Ross J. Anderson:
Tree Functions and Cipher Systems. Cryptologia 15(3): 194-202 (1991) - 1990
- [j1]Ross J. Anderson:
Solving a Class of Stream Ciphers. Cryptologia 14(3): 285-288 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint