Suivre
Ross Anderson
Titre
Citée par
Citée par
Année
Security engineering: a guide to building dependable distributed systems
R Anderson
John Wiley & Sons, 2020
44782020
Information hiding-a survey
FAP Petitcolas, RJ Anderson, MG Kuhn
Proceedings of the IEEE 87 (7), 1062-1078, 1999
40961999
On the limits of steganography
RJ Anderson, FAP Petitcolas
IEEE Journal on selected areas in communications 16 (4), 474-481, 1998
19681998
The resurrecting duckling
F Stajano
International workshop on security protocols, 183-194, 1999
19391999
Tamper resistance-a cautionary note
R Anderson, M Kuhn
Proceedings of the second Usenix workshop on electronic commerce 2, 1-11, 1996
16311996
Attacks on copyright marking systems
FAP Petitcolas, RJ Anderson, MG Kuhn
International workshop on information hiding, 218-238, 1998
15121998
Why information security is hard-an economic perspective
R Anderson
Seventeenth annual computer security applications conference, 358-365, 2001
12712001
Optical fault induction attacks
SP Skorobogatov, RJ Anderson
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
11692003
Low cost attacks on tamper resistant devices
R Anderson, M Kuhn
International Workshop on Security Protocols, 125-136, 1997
10091997
The economics of information security
R Anderson, T Moore
science 314 (5799), 610-613, 2006
9842006
Why cryptosystems fail
R Anderson
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
9781993
Combining crypto with biometrics effectively
F Hao, R Anderson, J Daugman
IEEE transactions on computers 55 (9), 1081-1088, 2006
9272006
Password memorability and security: Empirical results
J Yan, A Blackwell, R Anderson, A Grant
IEEE Security & privacy 2 (5), 25-31, 2004
9132004
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
7922013
Aurasium: Practical policy enforcement for android applications
R Xu, H Saïdi, R Anderson
21st USENIX Security Symposium (USENIX Security 12), 539-552, 2012
6352012
Serpent: A proposal for the advanced encryption standard
R Anderson, E Biham, L Knudsen
NIST AES Proposal 174, 1-23, 1998
5981998
Soft tempest: Hidden data transmission using electromagnetic emanations
MG Kuhn, RJ Anderson
Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998
4951998
The eternity service
R Anderson
Proceedings of PRAGOCRYPT 96, 242-252, 1996
4091996
Two remarks on public key cryptology
R Anderson
Invited Lecture, ACM CCCS'97, 1997
4021997
The economics of online crime
T Moore, R Clayton, R Anderson
Journal of Economic Perspectives 23 (3), 3-20, 2009
3912009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20