default search action
Frank Stajano
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c69]Emma Urquhart, Frank Stajano:
Acceleration of Core Post-quantum Cryptography Primitive on Open-Source Silicon Platform Through Hardware/Software Co-design. CANS (1) 2024: 144-161 - 2023
- [c68]Frank Stajano:
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper). Security Protocols Workshop 2023: 3-19 - [c67]Frank Stajano:
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion). Security Protocols Workshop 2023: 20-31 - [e14]Frank Stajano, Vashek Matyás, Bruce Christianson, Jonathan Anderson:
Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14186, Springer 2023, ISBN 978-3-031-43032-9 [contents] - 2020
- [j14]Seb Aebischer, Claudio Dettoni, Graeme Jenkinson, Kat Krol, David Llewellyn-Jones, Toshiyuki Masui, Frank Stajano:
Deploying authentication in the wild: towards greater ecological validity in security usability studies. J. Cybersecur. 6(1) (2020) - [j13]Terry Benzel, Frank Stajano:
IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps. IEEE Secur. Priv. 18(3): 6-7 (2020) - [e13]Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyás:
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12287, Springer 2020, ISBN 978-3-030-57042-2 [contents]
2010 – 2019
- 2018
- [c66]Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano:
Intentionality and Agency in Security. Security Protocols Workshop 2018: 114-125 - [c65]Frank Stajano, T. Mark A. Lomas:
User Authentication for the Internet of Things. Security Protocols Workshop 2018: 209-213 - [e12]Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson:
Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11286, Springer 2018, ISBN 978-3-030-03250-0 [contents] - 2017
- [c64]Virgil D. Gligor, Frank Stajano:
Assuring the Safety of Asymmetric Social Protocols. Security Protocols Workshop 2017: 38-48 - [c63]Frank Stajano:
Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion). Security Protocols Workshop 2017: 49-59 - [e11]Jonathan Anderson, Vashek Matyás, Bruce Christianson, Frank Stajano:
Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10368, Springer 2017, ISBN 978-3-319-62032-9 [contents] - [e10]Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás:
Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10476, Springer 2017, ISBN 978-3-319-71074-7 [contents] - 2016
- [c62]Ian Goldberg, Graeme Jenkinson, Frank Stajano:
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. ACNS 2016: 36-57 - [c61]David Llewellyn-Jones, Graeme Jenkinson, Frank Stajano:
Explicit Delegation Using Configurable Cookies. Security Protocols Workshop 2016: 141-152 - [c60]Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano:
Red Button and Yellow Button: Usable Security for Lost Security Tokens. Security Protocols Workshop 2016: 165-171 - [c59]Frank Stajano:
Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion). Security Protocols Workshop 2016: 172-180 - [e9]Frank Stajano, Stig Fr. Mjølsnes, Graeme Jenkinson, Per Thorsheim:
Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings. Lecture Notes in Computer Science 9551, Springer 2016, ISBN 978-3-319-29937-2 [contents] - [i2]Jeunese A. Payne, Graeme Jenkinson, Frank Stajano, M. Angela Sasse, Max Spencer:
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens. CoRR abs/1605.03478 (2016) - [i1]Brian Glass, Graeme Jenkinson, Yuqi Liu, M. Angela Sasse, Frank Stajano:
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions. CoRR abs/1607.03417 (2016) - 2015
- [j12]Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
Passwords and the evolution of imperfect authentication. Commun. ACM 58(7): 78-87 (2015) - [c58]Frank Stajano, Bruce Christianson, T. Mark A. Lomas, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser:
Pico Without Public Keys. Security Protocols Workshop 2015: 195-211 - [c57]Frank Stajano:
Pico Without Public Keys (Transcript of Discussion). Security Protocols Workshop 2015: 212-223 - [e8]Bruce Christianson, Petr Svenda, Vashek Matyás, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9379, Springer 2015, ISBN 978-3-319-26095-2 [contents] - 2014
- [c56]Quentin Stafford-Fraser, Graeme Jenkinson, Frank Stajano, Max Spencer, Chris Warrington, Jeunese A. Payne:
To have and have not: variations on secret sharing to model user presence. UbiComp Adjunct 2014: 1313-1320 - [c55]Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser:
Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers. PASSWORDS 2014: 61-73 - [c54]Jonathan Millican, Frank Stajano:
SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper). PASSWORDS 2014: 146-152 - [c53]Frank Stajano, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington:
Bootstrapping Adoption of the Pico Password Replacement System. Security Protocols Workshop 2014: 172-186 - [c52]Frank Stajano:
Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion). Security Protocols Workshop 2014: 187-196 - [c51]Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano:
I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes. Security Protocols Workshop 2014: 197-215 - [e7]Bruce Christianson, James A. Malcolm, Vashek Matyás, Petr Svenda, Frank Stajano, Jonathan Anderson:
Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers. Lecture Notes in Computer Science 8809, Springer 2014, ISBN 978-3-319-12399-8 [contents] - 2013
- [j11]Jonathan Anderson, Frank Stajano:
Must Social Networking Conflict with Privacy? IEEE Secur. Priv. 11(3): 51-60 (2013) - [e6]Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau:
Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8263, Springer 2013, ISBN 978-3-642-41716-0 [contents] - 2012
- [c50]Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. IEEE Symposium on Security and Privacy 2012: 553-567 - [c49]Oliver Stannard, Frank Stajano:
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices. Security Protocols Workshop 2012: 223-230 - [c48]Frank Stajano:
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion). Security Protocols Workshop 2012: 231-241 - [e5]Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7622, Springer 2012, ISBN 978-3-642-35693-3 [contents] - 2011
- [j10]Frank Stajano, Paul Wilson:
Understanding scam victims: seven principles for systems security. Commun. ACM 54(3): 70-75 (2011) - [c47]Ross J. Anderson, Mike Bond, Omar Choudary, Steven J. Murdoch, Frank Stajano:
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. Financial Cryptography 2011: 220-234 - [c46]Frank Stajano:
Pico: No More Passwords! Security Protocols Workshop 2011: 49-81 - [c45]Frank Stajano:
Pico: No More Passwords! (Transcript of Discussion). Security Protocols Workshop 2011: 82-97 - [c44]Omar Choudary, Frank Stajano:
Make Noise and Whisper: A Solution to Relay Attacks. Security Protocols Workshop 2011: 271-283 - [c43]Jonathan Anderson, Frank Stajano, Robert N. M. Watson:
How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort). Security Protocols Workshop 2011: 359-367 - [e4]Bruce Christianson, Bruno Crispo, James A. Malcolm, Frank Stajano:
Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7114, Springer 2011, ISBN 978-3-642-25866-4 [contents] - 2010
- [j9]Frank Stajano, Neil A. Hoult, Ian J. Wassell, Peter Bennett, Campbell R. Middleton, Kenichi Soga:
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure. Ad Hoc Networks 8(8): 872-888 (2010) - [c42]Frank Stajano, Ford-Long Wong, Bruce Christianson:
Multichannel Protocols to Prevent Relay Attacks. Financial Cryptography 2010: 4-19 - [c41]Bruce Christianson, Alex Shafarenko, Frank Stajano, Ford-Long Wong:
Relay-Proof Channels Using UWB Lasers. Security Protocols Workshop 2010: 45-46 - [c40]Jonathan Anderson, Frank Stajano:
On Storing Private Keys in the Cloud. Security Protocols Workshop 2010: 98-106 - [c39]Ross J. Anderson, Frank Stajano:
It's the Anthropology, Stupid! Security Protocols Workshop 2010: 127-130 - [c38]Saad Aloteibi, Frank Stajano:
On the Value of Hybrid Security Testing. Security Protocols Workshop 2010: 207-213 - [c37]Jonathan Anderson, Joseph Bonneau, Frank Stajano:
Inglorious Installers: Security in the Application Marketplace. WEIS 2010 - [p1]Frank Stajano:
Security Issues in Ubiquitous Computing. Handbook of Ambient Intelligence and Smart Environments 2010: 281-314 - [e3]Susanne Wetzel, Cristina Nita-Rotaru, Frank Stajano:
Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010. ACM 2010, ISBN 978-1-60558-923-7 [contents]
2000 – 2009
- 2009
- [j8]Frank Stajano:
Foot-driven computing: our first glimpse of location privacy issues. ACM SIGSPATIAL Special 1(2): 28-32 (2009) - [c36]Bogdan A. Roman, Ioannis Chatzigeorgiou, Ian J. Wassell, Frank Stajano:
Evaluation of Multi-Carrier Burst Contention and IEEE 802.11 with fading during channel sensing. PIMRC 2009: 57-61 - [c35]Jonathan Anderson, Claudia Díaz, Joseph Bonneau, Frank Stajano:
Privacy-enabling social networking over untrusted networks. WOSN 2009: 1-6 - [c34]Joseph Bonneau, Jonathan Anderson, Ross J. Anderson, Frank Stajano:
Eight friends are enough: social graph approximation via public listings. SNS 2009: 13-18 - [c33]Luke Church, Jonathan Anderson, Joseph Bonneau, Frank Stajano:
Privacy stories: confidence in privacy behaviors through end user programming. SOUPS 2009 - [c32]Jonathan Anderson, Frank Stajano:
Not That Kind of Friend. Security Protocols Workshop 2009: 343-349 - 2008
- [c31]Frank Stajano, Daniel Cvrcek, Matt Lewis:
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. ACNS 2008: 460-478 - [c30]Frank Stajano, Richard Clayton:
Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters. Security Protocols Workshop 2008: 54-70 - [c29]Frank Stajano:
Cyberdice (Transcript of Discussion). Security Protocols Workshop 2008: 71-83 - [c28]Bogdan Roman, Frank Stajano, Ian J. Wassell, David Naveen Cottingham:
Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks. WCNC 2008: 1667-1672 - [c27]Frank Stajano, Lucia Bianchi, Pietro Liò, Douwe Korff:
Forensic genomics: kin privacy, driftnets and other open questions. WPES 2008: 15-22 - 2007
- [j7]Kasim Rehman, Frank Stajano, George Coulouris:
An Architecture for Interactive Context-Aware Applications. IEEE Pervasive Comput. 6(1): 73-80 (2007) - [j6]Ford-Long Wong, Frank Stajano:
Multichannel Security Protocols. IEEE Pervasive Comput. 6(4): 31-39 (2007) - [c26]Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. Wassell, Frank Stajano:
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern. CNSR 2007: 157-165 - [e2]Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings. Lecture Notes in Computer Science 4572, Springer 2007, ISBN 978-3-540-73274-7 [contents] - [e1]Frank Stajano, Hyoung Joong Kim, Jong-Suk Chae, Seong-Dong Kim:
Ubiquitous Convergence Technology, First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4412, Springer 2007, ISBN 978-3-540-71788-1 [contents] - 2006
- [c25]Joonwoong Kim, Alastair R. Beresford, Frank Stajano:
Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper). ICUCT 2006: 263-272 - [c24]Ford-Long Wong, Frank Stajano:
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies. PerCom Workshops 2006: 246-250 - [c23]Matthew Johnson, Frank Stajano:
Usability of Security Management: Defining the Permissions of Guests. Security Protocols Workshop 2006: 276-283 - 2005
- [j5]Frank Stajano:
RFID is x-ray vision. Commun. ACM 48(9): 31-33 (2005) - [j4]Pablo Vidales, Javier Baliosian, Joan Serrat, Glenford E. Mapp, Frank Stajano, Andy Hopper:
Autonomic system for mobility support in 4G networks. IEEE J. Sel. Areas Commun. 23(12): 2288-2304 (2005) - [c22]Ford-Long Wong, Frank Stajano:
Location Privacy in Bluetooth. ESAS 2005: 176-188 - [c21]Kasim Rehman, Frank Stajano, George Coulouris:
Visually Interactive Location-Aware Computing. UbiComp 2005: 177-194 - [c20]Ford-Long Wong, Frank Stajano, Jolyon Clulow:
Repairing the Bluetooth Pairing Protocol. Security Protocols Workshop 2005: 31-45 - [c19]Frank Stajano:
Repairing the Bluetooth Pairing Protocol. Security Protocols Workshop 2005: 46-50 - [c18]Ford-Long Wong, Frank Stajano:
Multi-channel Protocols. Security Protocols Workshop 2005: 112-127 - [c17]Matthew Johnson, Frank Stajano:
Implementing a Multi-hat PDA. Security Protocols Workshop 2005: 295-307 - [c16]Pablo Vidales, Glenford E. Mapp, Frank Stajano, Jon Crowcroft, Carlos Jesus Bernardos:
A Practical Approach for 4G Systems: Deployment of Overlay Networks. TRIDENTCOM 2005: 172-181 - 2004
- [c15]Frank Stajano:
Security for Ubiquitous Computing. ICISC 2004: 2 - [c14]Alastair R. Beresford, Frank Stajano:
Mix Zones: User Privacy in Location-aware Services. PerCom Workshops 2004: 127-131 - [c13]Frank Stajano:
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. Security Protocols Workshop 2004: 51-64 - [c12]Frank Stajano:
One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion). Security Protocols Workshop 2004: 65-67 - [c11]Frank Stajano:
Will your digital butlers betray you? WPES 2004: 37-38 - 2003
- [j3]Alastair R. Beresford, Frank Stajano:
Location Privacy in Pervasive Computing. IEEE Pervasive Comput. 2(1): 46-55 (2003) - [c10]Frank Stajano:
The Security Challenges of Ubiquitous Computing. CHES 2003: 1 - [c9]Frank Stajano:
Security in Pervasive Computing. SPC 2003: 6-8 - 2002
- [c8]Frank Stajano:
Security for Whom?: The Shifting Security Assumptions of Pervasive Computing. ISSS 2002: 16-27 - [c7]Kasim Rehman, Frank Stajano, George Coulouris:
Interfacing with the invisible computer. NordiCHI 2002: 213-216 - [c6]Tatsuo Nakajima, Hiroo Ishikawa, Eiji Tokunaga, Frank Stajano:
Technology Challenges for Building Internet-Scale Ubiquitous Computing. WORDS 2002: 171-179 - 2001
- [j2]Ross J. Anderson, Frank Stajano, Jong-Hyeon Lee:
Security policies. Adv. Comput. 55: 185-235 (2001) - 2000
- [c5]Frank Stajano:
The Resurrecting Duckling - What Next? Security Protocols Workshop 2000: 204-214 - [c4]Frank Stajano:
The Resurrecting Duckling - What Next? (Transcript of Discussion). Security Protocols Workshop 2000: 215-222
1990 – 1999
- 1999
- [c3]Frank Stajano, Ross J. Anderson:
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. Information Hiding 1999: 434-447 - [c2]Frank Stajano, Ross J. Anderson:
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. Security Protocols Workshop 1999: 172-194 - 1998
- [j1]Frank Stajano, Alan Jones:
The thinnest of clients: controlling it all via cellphone. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2(4): 46-53 (1998) - 1995
- [c1]Frank Stajano, Rob Walker:
Taming the Complexity of Distributed Multimedia Applications. Tcl/Tk Workshop 1995
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint