Follow
Frank Stajano
Frank Stajano
Professor of Security and Privacy, University of Cambridge Computer Lab
Verified email at cl.cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
21282003
The resurrecting duckling: Security issues for ad-hoc wireless networks
F Stajano, R Anderson
International workshop on security protocols, 172-182, 1999
18291999
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE symposium on security and privacy, 553-567, 2012
11632012
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual conference on pervasive computing and communications workshops …, 2004
6922004
Security for Ubiquitous Computing
F Stajano
Security for Ubiquitous Computing, 2002
5092002
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
2752015
The resurrecting duckling—what next?
F Stajano
International Workshop on Security Protocols, 204-214, 2000
2512000
Understanding scam victims: seven principles for systems security
F Stajano, P Wilson
Communications of the ACM 54 (3), 70-75, 2011
2202011
The resurrecting duckling: security issues for ubiquitous computing
F Stajano, R Anderson
Computer 35 (4), supl22-supl26, 2002
2032002
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure
F Stajano, N Hoult, I Wassell, P Bennett, C Middleton, K Soga
Ad Hoc Networks 8 (8), 872-888, 2010
1922010
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
190*2006
Pico: No more passwords!
F Stajano
International Workshop on Security Protocols, 49-81, 2011
1812011
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
1682009
Autonomic system for mobility support in 4G networks
P Vidales, J Baliosian, J Serrat, G Mapp, F Stajano, A Hopper
IEEE Journal on Selected Areas in Communications 23 (12), 2288-2304, 2005
1222005
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Proceedings of the 2nd ACM workshop on Online social networks, 1-6, 2009
1212009
The cocaine auction protocol: On the power of anonymous broadcast
F Stajano, R Anderson
International Workshop on Information Hiding, 434-447, 1999
971999
Location privacy in bluetooth
FL Wong, F Stajano
European Workshop on Security in Ad-hoc and Sensor Networks, 176-188, 2005
742005
The resurrecting duckling
F Stajano
International workshop on security protocols, 183-194, 1999
691999
Multi-channel protocols
FL Wong, F Stajano
International Workshop on Security Protocols, 112-127, 2005
672005
The Thinnest of Clients: Controlling it all via cellphone
F Stajano, A Jones
ACM SIGMOBILE Mobile Computing and Communications Review 2 (4), 46-53, 1998
671998
The system can't perform the operation now. Try again later.
Articles 1–20