Frank Stajano

Orcid: 0000-0001-9186-6798

According to our database1, Frank Stajano authored at least 86 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Acceleration of Core Post-quantum Cryptography Primitive on Open-Source Silicon Platform Through Hardware/Software Co-design.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

2023
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion).
Proceedings of the Security Protocols XXVIII, 2023

Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper).
Proceedings of the Security Protocols XXVIII, 2023

2020
IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps.
IEEE Secur. Priv., 2020

Deploying authentication in the wild: towards greater ecological validity in security usability studies.
J. Cybersecur., 2020

2018
User Authentication for the Internet of Things.
Proceedings of the Security Protocols XXVI, 2018

Intentionality and Agency in Security.
Proceedings of the Security Protocols XXVI, 2018

2017
Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017

Assuring the Safety of Asymmetric Social Protocols.
Proceedings of the Security Protocols XXV, 2017

2016
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens.
CoRR, 2016

The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions.
CoRR, 2016

Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

Explicit Delegation Using Configurable Cookies.
Proceedings of the Security Protocols XXIV, 2016

Red Button and Yellow Button: Usable Security for Lost Security Tokens.
Proceedings of the Security Protocols XXIV, 2016

Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Passwords and the evolution of imperfect authentication.
Commun. ACM, 2015

Pico Without Public Keys.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Pico Without Public Keys (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

2014
Bootstrapping Adoption of the Pico Password Replacement System.
Proceedings of the Security Protocols XXII, 2014

Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes.
Proceedings of the Security Protocols XXII, 2014

Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers.
Proceedings of the Technology and Practice of Passwords, 2014

SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper).
Proceedings of the Technology and Practice of Passwords, 2014

To have and have not: variations on secret sharing to model user presence.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
Must Social Networking Conflict with Privacy?
IEEE Secur. Priv., 2013

2012
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices.
Proceedings of the Security Protocols XX, 2012

Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
Understanding scam victims: seven principles for systems security.
Commun. ACM, 2011

Pico: No More Passwords! (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Pico: No More Passwords!
Proceedings of the Security Protocols XIX, 2011

Make Noise and Whisper: A Solution to Relay Attacks.
Proceedings of the Security Protocols XIX, 2011

How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort).
Proceedings of the Security Protocols XIX, 2011

Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure.
Ad Hoc Networks, 2010

Inglorious Installers: Security in the Application Marketplace.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Relay-Proof Channels Using UWB Lasers.
Proceedings of the Security Protocols XVIII, 2010

It's the Anthropology, Stupid!
Proceedings of the Security Protocols XVIII, 2010

On Storing Private Keys in the Cloud.
Proceedings of the Security Protocols XVIII, 2010

On the Value of Hybrid Security Testing.
Proceedings of the Security Protocols XVIII, 2010

Multichannel Protocols to Prevent Relay Attacks.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Security Issues in Ubiquitous Computing.
Proceedings of the Handbook of Ambient Intelligence and Smart Environments, 2010

2009
Foot-driven computing: our first glimpse of location privacy issues.
ACM SIGSPATIAL Special, 2009

Not That Kind of Friend.
Proceedings of the Security Protocols XVII, 2009

Privacy stories: confidence in privacy behaviors through end user programming.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Eight friends are enough: social graph approximation via public listings.
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009

Privacy-enabling social networking over untrusted networks.
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009

Evaluation of Multi-Carrier Burst Contention and IEEE 802.11 with fading during channel sensing.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

2008
Forensic genomics: kin privacy, driftnets and other open questions.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters.
Proceedings of the Security Protocols XVI, 2008

Cyberdice (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Multichannel Security Protocols.
IEEE Pervasive Comput., 2007

An Architecture for Interactive Context-Aware Applications.
IEEE Pervasive Comput., 2007

Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
Usability of Security Management: Defining the Permissions of Guests.
Proceedings of the Security Protocols, 2006

Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper).
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

2005
Autonomic system for mobility support in 4G networks.
IEEE J. Sel. Areas Commun., 2005

RFID is x-ray vision.
Commun. ACM, 2005

A Practical Approach for 4G Systems: Deployment of Overlay Networks.
Proceedings of the 1st International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2005), 2005

Repairing the Bluetooth Pairing Protocol.
Proceedings of the Security Protocols, 2005

Multi-channel Protocols.
Proceedings of the Security Protocols, 2005

Repairing the Bluetooth Pairing Protocol.
Proceedings of the Security Protocols, 2005

Implementing a Multi-hat PDA.
Proceedings of the Security Protocols, 2005

Visually Interactive Location-Aware Computing.
Proceedings of the UbiComp 2005: Ubiquitous Computing, 7th International Conference, 2005

Location Privacy in Bluetooth.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

2004
Will your digital butlers betray you?
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA.
Proceedings of the Security Protocols, 2004

Mix Zones: User Privacy in Location-aware Services.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Security for Ubiquitous Computing.
Proceedings of the Information Security and Cryptology, 2004

2003
Location Privacy in Pervasive Computing.
IEEE Pervasive Comput., 2003

Security in Pervasive Computing.
Proceedings of the Security in Pervasive Computing, 2003

The Security Challenges of Ubiquitous Computing.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
Technology Challenges for Building Internet-Scale Ubiquitous Computing.
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002

Interfacing with the invisible computer.
Proceedings of the Second Nordic Conference on Human-Computer Interaction 2002, 2002

Security for Whom?: The Shifting Security Assumptions of Pervasive Computing.
Proceedings of the Software Security -- Theories and Systems, 2002

2001
Security policies.
Adv. Comput., 2001

2000
The Resurrecting Duckling - What Next? (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

The Resurrecting Duckling - What Next?
Proceedings of the Security Protocols, 2000

1999
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.
Proceedings of the Security Protocols, 1999

The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
The thinnest of clients: controlling it all via cellphone.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998

1995
Taming the Complexity of Distributed Multimedia Applications.
Proceedings of the USENIX Third Annual Tcl/Tk Workshop, 1995


  Loading...