ÆÈ·Î¿ì
Frank Stajano
Frank Stajano
Professor of Security and Privacy, University of Cambridge Computer Lab
cl.cam.ac.ukÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Location privacy in pervasive computing
AR Beresford, F Stajano
IEEE Pervasive computing 2 (1), 46-55, 2003
21682003
The resurrecting duckling: Security issues for ad-hoc wireless networks
F Stajano, R Anderson
Lecture Notes in Computer Science 1796, 172-182, 2000
18602000
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE symposium on security and privacy, 553-567, 2012
12572012
Mix zones: User privacy in location-aware services
AR Beresford, F Stajano
IEEE Annual conference on pervasive computing and communications workshops ¡¦, 2004
7152004
Security for Ubiquitous Computing
F Stajano
Security for Ubiquitous Computing, 2002
5212002
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in ¡¦, 2006
403*2006
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
3082015
The resurrecting duckling—what next?
F Stajano
Security Protocols: 8th International Workshop Cambridge, UK, April 3–5 ¡¦, 2001
2612001
Understanding scam victims: seven principles for systems security
F Stajano, P Wilson
Communications of the ACM 54 (3), 70-75, 2011
2392011
The resurrecting duckling: security issues for ubiquitous computing
F Stajano, R Anderson
Computer 35 (4), supl22-supl26, 2002
2082002
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure
F Stajano, N Hoult, I Wassell, P Bennett, C Middleton, K Soga
Ad Hoc Networks 8 (8), 872-888, 2010
2022010
Pico: No more passwords!
F Stajano
Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28 ¡¦, 2011
1852011
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
1702009
Autonomic system for mobility support in 4G networks
P Vidales, J Baliosian, J Serrat, G Mapp, F Stajano, A Hopper
IEEE Journal on Selected Areas in Communications 23 (12), 2288-2304, 2005
1222005
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Proceedings of the 2nd ACM workshop on Online social networks, 1-6, 2009
1212009
The cocaine auction protocol: On the power of anonymous broadcast
F Stajano, RJ Anderson
Information Hiding 1768, 434-447, 1999
971999
Location privacy in bluetooth
FL Wong, F Stajano
Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop ¡¦, 2005
772005
The resurrecting duckling
F Stajano
Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21 ¡¦, 2000
692000
Multi-channel protocols
FL Wong, F Stajano
Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22 ¡¦, 2007
682007
The Thinnest of Clients: Controlling it all via cellphone
F Stajano, A Jones
ACM SIGMOBILE Mobile Computing and Communications Review 2 (4), 46-53, 1998
681998
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20