Computer Science · Physical Sciences
13h-index998citations38works0.02yr avg
Accepting Students?
No reports yet. Know if this professor is taking students?
Research Topics
Advanced Authentication Protocols Security(16), User Authentication and Security Systems(13), Cryptographic Implementations and Security(12), Advanced Malware Detection Techniques(10), Security and Verification in Computing(7)
Publications38 total
2021· 3 citedOpen Access
2021· 42 citedOpen Access
IEEE Security & Privacy·2015· 10 cited
Be prepared: The EMV pre-play attack
UCL Discovery (University College London)·2015· 2 cited
2014· 105 cited
Lecture notes in computer science·2013· 3 cited
DROPS (Schloss Dagstuhl – Leibniz Center for Informatics)·2013· 1 citedOpen Access
Topics in Cryptology - CT-RSA 2013
Springer US·2013
arXiv (Cornell University)·2012· 4 citedOpen Access
IEEE Security & Privacy·2012· 22 cited
Lecture notes in computer science·2012· 7 cited
The low-call diet: Authenticated Encryption for call counting HSM users.
IACR Cryptology ePrint Archive·2012
Information Security Technical Report·2010· 3 cited
2010· 179 cited
Lecture notes in computer science·2010· 7 citedOpen Access
Lecture notes in computer science·2010· 2 cited
Lecture notes in computer science·2009· 15 cited
Lecture notes in computer science·2009
page 1 of 2Next →
Frequent Co-authors
Ross Anderson(14), Steven J. Murdoch(10), Jolyon Clulow(9), Sergei Skorobogatov(5), Ben Adida(5), Amerson Lin(5), Omar Choudary(4), Ronald L. Rivest(4), George French(4), Nigel P. Smart(3), Gaven J. Watson(3), George Danezis(2), Paul Youn(2), Jonathan Herzog(2), Saar Drimer(1), Richard Clayton(1), Piotr Zieliński(1), Rune Andersen(1), Ron Rivest(1), Frank Stajano(1)