F Stajano
F Stajano
Professor of Security and Privacy, University of Cambridge Computer Lab
Verified email at cl.cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
20632003
The resurrecting duckling: Security issues for ad-hoc wireless networks
F Stajano, R Anderson
International workshop on security protocols, 172-182, 1999
17711999
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE Symposium on Security and Privacy, 553-567, 2012
9992012
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual Conference on Pervasive Computing and Communications Workshops …, 2004
6582004
Security for Ubiquitous Computing
F Stajano
Security for Ubiquitous Computing, 2002
4932002
Evolutionary robotics
JC Bongard
Communications of the ACM 56 (8), 74-83, 2013
315*2013
The resurrecting duckling—what next?
F Stajano
International Workshop on Security Protocols, 204-214, 2000
2442000
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
2192015
The resurrecting duckling: security issues for ubiquitous computing
F Stajano, R Anderson
Computer 35 (4), supl22-supl26, 2002
1992002
Understanding scam victims: seven principles for systems security
F Stajano, P Wilson
Communications of the ACM 54 (3), 70-75, 2011
1962011
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure
F Stajano, N Hoult, I Wassell, P Bennett, C Middleton, K Soga
Ad Hoc Networks 8 (8), 872-888, 2010
1832010
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
180*2006
Pico: No more passwords!
F Stajano
International Workshop on Security Protocols, 49-81, 2011
1682011
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
1622009
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Proceedings of the 2nd ACM workshop on Online social networks, 1-6, 2009
1222009
Autonomic system for mobility support in 4G networks
P Vidales, J Baliosian, J Serrat, G Mapp, F Stajano, A Hopper
IEEE Journal on selected areas in communications 23 (12), 2288-2304, 2005
1212005
The cocaine auction protocol: On the power of anonymous broadcast
F Stajano, R Anderson
International Workshop on Information Hiding, 434-447, 1999
921999
Quantitatively assessing and visualising industrial system attack surfaces
EP Leverett
University of Cambridge, Darwin College 7, 21, 2011
802011
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
PJ Denning
Communications of the ACM 60 (12), 20-23, 2017
72*2017
Location privacy in bluetooth
FL Wong, F Stajano
European Workshop on Security in Ad-hoc and Sensor Networks, 176-188, 2005
722005
The system can't perform the operation now. Try again later.
Articles 1–20