Frank Stajano
Frank Stajano
Professor of Security and Privacy, University of Cambridge Computer Lab
Verified email at - Homepage
Cited by
Cited by
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
The resurrecting duckling
F Stajano
International workshop on security protocols, 183-194, 1999
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE symposium on security and privacy, 553-567, 2012
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual conference on pervasive computing and communications workshops …, 2004
Security for Ubiquitous Computing
F Stajano
Security for Ubiquitous Computing, 2002
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
A Roychoudhury, M D'Souza
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
Understanding scam victims: seven principles for systems security
F Stajano, P Wilson
Communications of the ACM 54 (3), 70-75, 2011
The resurrecting duckling—what next?
F Stajano
International Workshop on Security Protocols, 204-214, 2000
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure
F Stajano, N Hoult, I Wassell, P Bennett, C Middleton, K Soga
Ad Hoc Networks 8 (8), 872-888, 2010
The resurrecting duckling: security issues for ubiquitous computing
F Stajano, R Anderson
Computer 35 (4), supl22-supl26, 2002
Pico: No more passwords!
F Stajano
International Workshop on Security Protocols, 49-81, 2011
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
Autonomic system for mobility support in 4G networks
P Vidales, J Baliosian, J Serrat, G Mapp, F Stajano, A Hopper
IEEE Journal on Selected Areas in Communications 23 (12), 2288-2304, 2005
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Proceedings of the 2nd ACM workshop on Online social networks, 1-6, 2009
The cocaine auction protocol: On the power of anonymous broadcast
F Stajano, R Anderson
Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000
Location privacy in bluetooth
FL Wong, F Stajano
European Workshop on Security in Ad-hoc and Sensor Networks, 176-188, 2005
The Thinnest of Clients: Controlling it all via cellphone
F Stajano, A Jones
ACM SIGMOBILE Mobile Computing and Communications Review 2 (4), 46-53, 1998
Multi-channel protocols
FL Wong, F Stajano
International Workshop on Security Protocols, 112-127, 2005
Privacy stories: confidence in privacy behaviors through end user programming.
L Church, J Anderson, J Bonneau, F Stajano
SOUPS, 2009
The system can't perform the operation now. Try again later.
Articles 1–20