Ross Anderson
Title
Cited by
Cited by
Year
Security engineering
R Anderson
John Wiley & Sons, 2008
36662008
Information hiding-a survey
FAP Petitcolas, RJ Anderson, MG Kuhn
Proceedings of the IEEE 87 (7), 1062-1078, 1999
35771999
On the limits of steganography
RJ Anderson, FAP Petitcolas
IEEE Journal on selected areas in communications 16 (4), 474-481, 1998
17151998
The resurrecting duckling: Security issues for ad-hoc wireless networks
F Stajano, R Anderson
International workshop on security protocols, 172-182, 1999
17071999
Tamper resistance-a cautionary note
R Anderson, M Kuhn
Proceedings of the second Usenix workshop on electronic commerce 2, 1-11, 1996
14791996
Attacks on copyright marking systems
FAP Petitcolas, RJ Anderson, MG Kuhn
International workshop on information hiding, 218-238, 1998
14291998
Why information security is hard-an economic perspective
R Anderson
Seventeenth Annual Computer Security Applications Conference, 358-365, 2001
10812001
Why cryptosystems fail
R Anderson
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
9001993
Low cost attacks on tamper resistant devices
R Anderson, M Kuhn
International Workshop on Security Protocols, 125-136, 1997
8901997
Optical fault induction attacks
SP Skorobogatov, RJ Anderson
International workshop on cryptographic hardware and embedded systems, 2-12, 2002
8702002
Combining crypto with biometrics effectively
F Hao, R Anderson, J Daugman
IEEE transactions on computers 55 (9), 1081-1088, 2006
7892006
The economics of information security
R Anderson, T Moore
science 314 (5799), 610-613, 2006
7382006
Password memorability and security: Empirical results
J Yan, A Blackwell, R Anderson, A Grant
IEEE Security & privacy 2 (5), 25-31, 2004
7352004
Aurasium: Practical policy enforcement for android applications
R Xu, H Saïdi, R Anderson
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
5202012
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
5162013
Serpent: A proposal for the advanced encryption standard
R Anderson, E Biham, L Knudsen
NIST AES Proposal 174, 1-23, 1998
5111998
Soft tempest: Hidden data transmission using electromagnetic emanations
MG Kuhn, RJ Anderson
International Workshop on Information Hiding, 124-142, 1998
3921998
Key infection: Smart trust for smart dust
R Anderson, H Chan, A Perrig
Proceedings of the 12th IEEE International Conference on Network Protocols …, 2004
3632004
The eternity service
R Anderson
Proceedings of PRAGOCRYPT 96, 242-252, 1996
3561996
Evaluation of copyright marking systems
FAP Petitcolas, RJ Anderson
Proceedings IEEE International Conference on Multimedia Computing and …, 1999
3291999
The system can't perform the operation now. Try again later.
Articles 1–20