Frank Stajano
Orcid: 0000-0001-9186-6798
According to our database1,
Frank Stajano
authored at least 86 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Acceleration of Core Post-quantum Cryptography Primitive on Open-Source Silicon Platform Through Hardware/Software Co-design.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
2023
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion).
Proceedings of the Security Protocols XXVIII, 2023
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper).
Proceedings of the Security Protocols XXVIII, 2023
2020
IEEE Secur. Priv., 2020
Deploying authentication in the wild: towards greater ecological validity in security usability studies.
J. Cybersecur., 2020
2018
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the Security Protocols XXVI, 2018
2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the Security Protocols XXV, 2017
2016
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens.
CoRR, 2016
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions.
CoRR, 2016
Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
2014
Proceedings of the Security Protocols XXII, 2014
Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014
I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes.
Proceedings of the Security Protocols XXII, 2014
Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers.
Proceedings of the Technology and Practice of Passwords, 2014
SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper).
Proceedings of the Technology and Practice of Passwords, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
2013
2012
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices.
Proceedings of the Security Protocols XX, 2012
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
2010
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure.
Ad Hoc Networks, 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Handbook of Ambient Intelligence and Smart Environments, 2010
2009
ACM SIGSPATIAL Special, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009
Evaluation of Multi-Carrier Burst Contention and IEEE 802.11 with fading during channel sensing.
Proceedings of the IEEE 20th International Symposium on Personal, 2009
2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Security Protocols XVI, 2008
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
IEEE Pervasive Comput., 2007
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
2006
Proceedings of the Security Protocols, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006
2005
IEEE J. Sel. Areas Commun., 2005
Proceedings of the 1st International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2005), 2005
Proceedings of the Security Protocols, 2005
Proceedings of the Security Protocols, 2005
Proceedings of the UbiComp 2005: Ubiquitous Computing, 7th International Conference, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the Security Protocols, 2004
Proceedings of the Security Protocols, 2004
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the Information Security and Cryptology, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002
Proceedings of the Second Nordic Conference on Human-Computer Interaction 2002, 2002
Proceedings of the Software Security -- Theories and Systems, 2002
2001
2000
Proceedings of the Security Protocols, 2000
1999
Proceedings of the Security Protocols, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
1998
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998
1995
Proceedings of the USENIX Third Annual Tcl/Tk Workshop, 1995