What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ross J. Anderson
Google Scholar
54
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
SoK: Web Authentication and Recovery in the Age of End-to-End Encryption.
Jenny Blessing
Daniel Hugenroth
Ross J. Anderson
Alastair R. Beresford
2025
conf/eurosp
Yet Another Diminishing Spark: Low-Level Cyberattacks in the Israel-Gaza Conflict.
Anh V. Vu
Alice Hutchings
Ross J. Anderson
2024
conf/sp
No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment.
Anh V. Vu
Alice Hutchings
Ross J. Anderson
2022
conf/eurosp
PostCog: A tool for interdisciplinary research into underground forums at scale.
Ildiko Pete
Jack Hughes
Andrew Caines
Anh V. Vu
Harshad Gupta
Alice Hutchings
Ross J. Anderson
Paula Buttery
2020
conf/ccs
Towards Certifiable Adversarial Sample Detection.
Ilia Shumailov
Yiren Zhao
Robert D. Mullins
Ross J. Anderson
2020
conf/dsn
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information.
Yiren Zhao
Ilia Shumailov
Han Cui
Xitong Gao
Robert D. Mullins
Ross J. Anderson
2018
conf/eurosp
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers.
Laurent Simon
David Chisnall
Ross J. Anderson
2017
conf/soups
DigiTally: Piloting Offline Payments for Phones.
Khaled Baqer
Ross J. Anderson
Lorna Mutegi
Jeunese A. Payne
Joseph Sevilla
2016
journals/popets
Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards.
Laurent Simon
Wenduan Xu
Ross J. Anderson
2016
conf/fc
Are Payment Card Contracts Unfair? (Short Paper).
Steven J. Murdoch
Ingolf Becker
Ruba Abu-Salma
Ross J. Anderson
Nicholas Bohm
Alice Hutchings
M. Angela Sasse
Gianluca Stringhini
2014
conf/fc
Security Protocols and Evidence: Where Many Payment Systems Fail.
Steven J. Murdoch
Ross J. Anderson
2014
conf/sp
Chip and Skim: Cloning EMV Cards with the Pre-play Attack.
Mike Bond
Omar Choudary
Steven J. Murdoch
Sergei P. Skorobogatov
Ross J. Anderson
2013
conf/ccs
PIN skimmer: inferring PINs through the camera and microphone.
Laurent Simon
Ross J. Anderson
2012
conf/uss
Aurasium: Practical Policy Enforcement for Android Applications.
Rubin Xu
Hassen Saïdi
Ross J. Anderson
2012
conf/fc
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs.
Joseph Bonneau
Sören Preibusch
Ross J. Anderson
2012
conf/fc
Ethics Committees and IRBs: Boon, or Bane, or More Research Needed?
Ross J. Anderson
2012
conf/fc
Social Authentication: Harder Than It Looks.
Hyoungshick Kim
John Kit Tang
Ross J. Anderson
2012
conf/acsac
Security economics: a personal perspective.
Ross J. Anderson
2011
conf/fc
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV.
Ross J. Anderson
Mike Bond
Omar Choudary
Steven J. Murdoch
Frank Stajano
2010
conf/fc
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication.
Steven J. Murdoch
Ross J. Anderson
2010
conf/sp
Chip and PIN is Broken.
Steven J. Murdoch
Saar Drimer
Ross J. Anderson
Mike Bond
2009
conf/fc
Optimised to Fail: Card Readers for Online Banking.
Saar Drimer
Steven J. Murdoch
Ross J. Anderson
2008
conf/sp
Thinking Inside the Box: System-Level Failures of Tamper Proofing.
Saar Drimer
Steven J. Murdoch
Ross J. Anderson
2007
conf/crypto
Information Security Economics - and Beyond.
Ross J. Anderson
Tyler Moore
2007
conf/fc
Position Statement in RFID S&P Panel: RFID and the Middleman.
Ross J. Anderson
2006
conf/soups
Protecting domestic power-line communications.
Richard E. Newman
Sherman Gavette
Larry Yonge
Ross J. Anderson
2005
conf/esorics
Sybil-Resistant DHT Routing.
George Danezis
Chris Lesniewski-Laas
M. Frans Kaashoek
Ross J. Anderson
2002
conf/ches
Optical Fault Induction Attacks.
Sergei P. Skorobogatov
Ross J. Anderson
2001
conf/ches
Protecting Embedded Systems - The Next Ten Years.
Ross J. Anderson
2001
conf/acsac
Why Information Security is Hard-An Economic Perspective.
Ross J. Anderson
2000
conf/sp
Privacy Technology Lessons from Healthcare.
Ross J. Anderson
1999
conf/ih
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.
Frank Stajano
Ross J. Anderson
1999
conf/acsac
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering).
Ross J. Anderson
1998
conf/fse
Serpent: A New Block Cipher Proposal.
Eli Biham
Ross J. Anderson
Lars R. Knudsen
1998
conf/ih
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.
Markus G. Kuhn
Ross J. Anderson
1998
conf/ih
Attacks on Copyright Marking Systems.
Fabien A. P. Petitcolas
Ross J. Anderson
Markus G. Kuhn
1998
conf/ih
The Steganographic File System.
Ross J. Anderson
Roger M. Needham
Adi Shamir
1998
conf/esorics
On the Security of Digital Tachographs.
Ross J. Anderson
1997
conf/fse
Chameleon - A New Kind of Stream Cipher.
Ross J. Anderson
Charalampos Manifavas
1997
conf/eurocrypt
The GCHQ Protocol and Its Problems.
Ross J. Anderson
Michael Roe
1996
conf/fse
Two Practical and Provably Secure Block Ciphers: BEARS and LION.
Ross J. Anderson
Eli Biham
1996
conf/fse
TIGER: A Fast New Hash Function.
Ross J. Anderson
Eli Biham
1996
conf/sp
A Security Policy Model for Clinical Information Systems.
Ross J. Anderson
1996
conf/ih
The Newton Channel.
Ross J. Anderson
Serge Vaudenay
Bart Preneel
Kaisa Nyberg
1996
conf/ih
Stretching the Limits of Steganography.
Ross J. Anderson
1996
conf/asiacrypt
Minding your p's and q's.
Ross J. Anderson
Serge Vaudenay
1995
conf/crypto
Robustness Principles for Public Key Protocols.
Ross J. Anderson
Roger M. Needham
1995
conf/sp
Cryptographic credit control in pre-payment metering systems.
Ross J. Anderson
S. Johann Bezuidenhoudt
1994
conf/fse
On Fibonacci Keystream Generators.
Ross J. Anderson
1994
conf/fse
Searching for the Optimum Correlation Attack.
Ross J. Anderson
1994
conf/esorics
Liability and Computer Security: Nine Principles.
Ross J. Anderson
1993
conf/fse
A Modern Rotor Machine.
Ross J. Anderson
1993
conf/ccs
Why Cryptosystems Fail.
Ross J. Anderson
1992
conf/esorics
UEPS - A Second Generation Electronic Wallet.
Ross J. Anderson
Coauthors
Adi Shamir
(1)
Alastair R. Beresford
(1)
Alice Hutchings
(4)
Andrew Caines
(1)
Anh V. Vu
(3)
Bart Preneel
(1)
Charalampos Manifavas
(1)
Chris Lesniewski-Laas
(1)
Daniel Hugenroth
(1)
David Chisnall
(1)
Eli Biham
(3)
Fabien A. P. Petitcolas
(1)
Frank Stajano
(2)
George Danezis
(1)
Gianluca Stringhini
(1)
Han Cui
(1)
Harshad Gupta
(1)
Hassen Saïdi
(1)
Hyoungshick Kim
(1)
Ildiko Pete
(1)
Ilia Shumailov
(2)
Ingolf Becker
(1)
Jack Hughes
(1)
Jenny Blessing
(1)
Jeunese A. Payne
(1)
John Kit Tang
(1)
Joseph Bonneau
(1)
Joseph Sevilla
(1)
Kaisa Nyberg
(1)
Khaled Baqer
(1)
Larry Yonge
(1)
Lars R. Knudsen
(1)
Laurent Simon
(3)
Lorna Mutegi
(1)
M. Angela Sasse
(1)
M. Frans Kaashoek
(1)
Markus G. Kuhn
(2)
Michael Roe
(1)
Mike Bond
(3)
Nicholas Bohm
(1)
Omar Choudary
(2)
Paula Buttery
(1)
Richard E. Newman
(1)
Robert D. Mullins
(2)
Roger M. Needham
(2)
Ross J. Anderson
(54)
Ruba Abu-Salma
(1)
Rubin Xu
(1)
S. Johann Bezuidenhoudt
(1)
Saar Drimer
(3)
Serge Vaudenay
(2)
Sergei P. Skorobogatov
(2)
Sherman Gavette
(1)
Sören Preibusch
(1)
Steven J. Murdoch
(8)
Tyler Moore
(1)
Wenduan Xu
(1)
Xitong Gao
(1)
Yiren Zhao
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to