What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Steven J. Murdoch
Google Scholar
30
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Scalable Time-Lock Puzzle.
Aydin Abadi
Dan Ristea
Artem Grigor
Steven J. Murdoch
2024
journals/popets
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser.
Killian Davitt
Dan Ristea
Duncan Russell
Steven J. Murdoch
2023
conf/eurosp
Recurring Contingent Service Payment.
Aydin Abadi
Steven J. Murdoch
Thomas Zacharias
2023
conf/asiaccs
Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims.
Aydin Abadi
Steven J. Murdoch
2022
conf/fc
Multi-party Updatable Delegated Private Set Intersection.
Aydin Abadi
Changyu Dong
Steven J. Murdoch
Sotirios Terzis
2021
conf/esorics
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited.
Aydin Abadi
Steven J. Murdoch
Thomas Zacharias
2019
conf/ccs
Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.
Colin C. Ife
Yun Shen
Steven J. Murdoch
Gianluca Stringhini
2016
journals/popets
SoK: Making Sense of Censorship Resistance Systems.
Sheharbano Khattak
Tariq Elahi
Laurent Simon
Colleen M. Swanson
Steven J. Murdoch
Ian Goldberg
2016
journals/popets
A Framework for the Game-theoretic Analysis of Censorship Resistance.
Tariq Elahi
John A. Doucette
Hadi Hosseini
Steven J. Murdoch
Ian Goldberg
2016
conf/uss
Adblocking and Counter Blocking: A Slice of the Arms Race.
Rishab Nithyanand
Sheharbano Khattak
Mobin Javed
Narseo Vallina-Rodriguez
Marjan Falahrastegar
Julia E. Powles
Emiliano De Cristofaro
Hamed Haddadi
Steven J. Murdoch
2016
conf/fc
Are Payment Card Contracts Unfair? (Short Paper).
Steven J. Murdoch
Ingolf Becker
Ruba Abu-Salma
Ross J. Anderson
Nicholas Bohm
Alice Hutchings
M. Angela Sasse
Gianluca Stringhini
2016
conf/ndss
Do You See What I See? Differential Treatment of Anonymous Users.
Sheharbano Khattak
David Fifield
Sadia Afroz
Mobin Javed
Srikanth Sundaresan
Damon McCoy
Vern Paxson
Steven J. Murdoch
2015
journals/popets
Editors' Introduction.
Apu Kapadia
Steven J. Murdoch
2015
journals/popets
Editors' Introduction.
Apu Kapadia
Steven J. Murdoch
2015
conf/sp
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
Robert N. M. Watson
Jonathan Woodruff
Peter G. Neumann
Simon W. Moore
Jonathan Anderson
David Chisnall
Nirav H. Dave
Brooks Davis
Khilan Gudka
Ben Laurie
Steven J. Murdoch
Robert M. Norton
Michael Roe
Stacey D. Son
Munraj Vadera
2014
conf/fc
Security Protocols and Evidence: Where Many Payment Systems Fail.
Steven J. Murdoch
Ross J. Anderson
2014
conf/sp
Chip and Skim: Cloning EMV Cards with the Pre-play Attack.
Mike Bond
Omar Choudary
Steven J. Murdoch
Sergei P. Skorobogatov
Ross J. Anderson
2013
conf/esorics
Quantifying and Measuring Anonymity.
Steven J. Murdoch
2011
conf/fc
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV.
Ross J. Anderson
Mike Bond
Omar Choudary
Steven J. Murdoch
Frank Stajano
2010
conf/fc
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication.
Steven J. Murdoch
Ross J. Anderson
2010
conf/fc
A Case Study on Measuring Statistical Data in the Tor Anonymity Network.
Karsten Loesing
Steven J. Murdoch
Roger Dingledine
2010
conf/sp
Chip and PIN is Broken.
Steven J. Murdoch
Saar Drimer
Ross J. Anderson
Mike Bond
2009
conf/fc
Optimised to Fail: Card Readers for Online Banking.
Saar Drimer
Steven J. Murdoch
Ross J. Anderson
2008
conf/uss
An Improved Clock-skew Measurement Technique for Revealing Hidden Services.
Sebastian Zander
Steven J. Murdoch
2008
conf/sp
Thinking Inside the Box: System-Level Failures of Tamper Proofing.
Saar Drimer
Steven J. Murdoch
Ross J. Anderson
2007
conf/uss
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.
Saar Drimer
Steven J. Murdoch
2006
conf/ccs
Hot or not: revealing hidden services by their clock skew.
Steven J. Murdoch
2005
conf/sp
Low-Cost Traffic Analysis of Tor.
Steven J. Murdoch
George Danezis
2005
conf/ih
Embedding Covert Channels into TCP/IP.
Steven J. Murdoch
Stephen Lewis
2004
conf/ih
Covert Channels for Collusion in Online Computer Games.
Steven J. Murdoch
Piotr Zielinski
Coauthors
Alice Hutchings
(1)
Apu Kapadia
(2)
Artem Grigor
(1)
Aydin Abadi
(5)
Ben Laurie
(1)
Brooks Davis
(1)
Changyu Dong
(1)
Colin C. Ife
(1)
Colleen M. Swanson
(1)
Damon McCoy
(1)
Dan Ristea
(2)
David Chisnall
(1)
David Fifield
(1)
Duncan Russell
(1)
Emiliano De Cristofaro
(1)
Frank Stajano
(1)
George Danezis
(1)
Gianluca Stringhini
(2)
Hadi Hosseini
(1)
Hamed Haddadi
(1)
Ian Goldberg
(2)
Ingolf Becker
(1)
John A. Doucette
(1)
Jonathan Anderson
(1)
Jonathan Woodruff
(1)
Julia E. Powles
(1)
Karsten Loesing
(1)
Khilan Gudka
(1)
Killian Davitt
(1)
Laurent Simon
(1)
M. Angela Sasse
(1)
Marjan Falahrastegar
(1)
Michael Roe
(1)
Mike Bond
(3)
Mobin Javed
(2)
Munraj Vadera
(1)
Narseo Vallina-Rodriguez
(1)
Nicholas Bohm
(1)
Nirav H. Dave
(1)
Omar Choudary
(2)
Peter G. Neumann
(1)
Piotr Zielinski
(1)
Rishab Nithyanand
(1)
Robert M. Norton
(1)
Robert N. M. Watson
(1)
Roger Dingledine
(1)
Ross J. Anderson
(8)
Ruba Abu-Salma
(1)
Saar Drimer
(4)
Sadia Afroz
(1)
Sebastian Zander
(1)
Sergei P. Skorobogatov
(1)
Sheharbano Khattak
(3)
Simon W. Moore
(1)
Sotirios Terzis
(1)
Srikanth Sundaresan
(1)
Stacey D. Son
(1)
Stephen Lewis
(1)
Steven J. Murdoch
(30)
Tariq Elahi
(2)
Thomas Zacharias
(2)
Vern Paxson
(1)
Yun Shen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to