Ross J. Anderson
Orcid: 0000-0001-8697-5682Affiliations:
- University of Cambridge, UK
According to our database1,
Ross J. Anderson
authored at least 202 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on idref.fr
-
on viaf.org
-
on twitter.com
-
on orcid.org
-
on id.ndl.go.jp
-
on id.loc.gov
-
on d-nb.info
-
on cl.cam.ac.uk
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict.
Proceedings of the ACM on Web Conference 2024, 2024
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024
No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
2023
Machine Learning needs its own Randomness Standard: Randomised Smoothing and PRNG-based attacks.
CoRR, 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Security Protocols XXVIII, 2023
Proceedings of the Security Protocols XXVIII, 2023
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion).
Proceedings of the Security Protocols XXVIII, 2023
Proceedings of the Security Protocols XXVIII, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
Proc. Priv. Enhancing Technol., 2022
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks.
CoRR, 2022
Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict.
CoRR, 2022
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
2021
ExtremeBB: Enabling Large-Scale Research into Extremism, the Manosphere and Their Correlation by Online Forum Data.
CoRR, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
CoRR, 2020
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020
2019
CoRR, 2019
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the Security Protocols XXVII, 2019
To Compress Or Not To Compress: Understanding The Interactions Between Adversarial Attacks And Neural Network Compression.
Proceedings of the Second Conference on Machine Learning and Systems, SysML 2019, 2019
2018
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Sustainable Security - an Internet of Durable Goods.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
J. Cybersecur., 2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
2016
Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards.
Proc. Priv. Enhancing Technol., 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only).
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
IEEE Secur. Priv., 2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
2014
Comput. Hum. Behav., 2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
2013
CoRR, 2013
Proceedings of the Security Protocols XXI, 2013
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013
Proceedings of the SPSM'13, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
IEEE Secur. Priv., 2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs.
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Fundamental Approaches to Software Engineering, 2011
2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
Proceedings of the Deontic Logic in Computer Science, 9th International Conference, 2008
Proceedings of the Data and Applications Security XXII, 2008
Security engineering - a guide to building dependable distributed systems (2. ed.).
Wiley, ISBN: 978-0-470-06852-6, 2008
2007
Proceedings of the Security Protocols, 2007
Proceedings of the Security Protocols, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Bio-Inspired Computing and Communication, 2007
2006
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006
2005
IEEE Secur. Priv., 2005
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
Proceedings of the Security Protocols, 2005
2004
Proceedings of the Economics of Information Security, 2004
Proceedings of the Security Protocols, 2004
Proceedings of the Security Protocols, 2004
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004
2003
Microprocess. Microsystems, 2003
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
2002
Proceedings of the First International IEEE Security in Storage Workshop, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the 8th International Symposium on Advanced Research in Asynchronous Circuits and Systems (ASYNC 2002), 2002
2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
Security engineering - a guide to building dependable distributed systems.
Wiley, ISBN: 978-0-471-38922-4, 2001
2000
Jikzi - a new framework for security policy, trusted publishing and electronic commerce.
Comput. Commun., 2000
Proceedings of the Security Protocols, 2000
Proceedings of the Security Protocols, 2000
Proceedings of the Security Protocols, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
The Case for Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
Proceedings of the Security Protocols, 1999
Proceedings of the Security Protocols, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Proceedings of the Information Hiding, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997
Proceedings of the Security Protocols, 1997
Proceedings of the Security Protocols, 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the Personal Medical Information - Security, Engineering, and Ethics, 1997
1996
Proceedings of the Security Protocols, 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Fast Software Encryption, 1996
1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Proceedings of the Computer Security, 1994
1993
1992
Proceedings of the Computer Security, 1992
1991
1990