Publications

Publications

Publications

2018

Pym, D., Anderson, G. (2018). A substructural modal logic of utility. Journal of Logic and Computation, doi:10.1093/logcom/exw030
Pyrgelis, A., Troncoso, C., De Cristofaro, E. (2018). Knock Knock, Who's There? Membership Inference on Aggregate Location Data.

2017

Abu-Salma, R., Krol, K., Parkin, S., Koh, V., Kwan, K., Mahboob, J., ...Sasse, M.A. (2017). The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram.
Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A., Smith, M. (2017). Obstacles to the Adoption of Secure Communication Tools.
Acs, G., Melis, L., Castelluccia, C., Cristofaro, E.D. (2017). Differentially Private Mixture of Generative Neural Networks.
Andriotis, P., Li, S., Spyridopoulos, T., Stringhini, G. (2017). A comparative study of android users’ privacy preferences under the runtime permission model.
Azouvi, S., Al-Bassam, M., Meiklejohn, S. (2017). Who am i? Secure identity registration on distributed ledgers.
Becker, I.F., Parkin, S., Sasse, M.A. (2017). Finding Security Champions in Blends of Organisational Culture.
Becker, I., Parkin, S., Sasse, M.A. (2017). Measuring the Success of Context-Aware Security Behaviour Surveys.
Blake, D., Caulfield, T., Ioannidis, C., Tonks, I. (2017). New Evidence on Mutual Fund Performance: A Comparison of Alternative Bootstrap Methods. JOURNAL OF FINANCIAL AND QUANTITATIVE ANALYSIS, 52 (3), 1279-1299. doi:10.1017/S0022109017000229
Bootle, J., Cerulli, A., Groth, J., Hajiabadi, M., Jakobsen, S. (2017). Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability.
Caulfield, T., Ioannidis, C., Pym, D. (2017). Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption.
Caulfield, T., Ioannidis, C., Pym, D. (2017). The U.S. Vulnerabilities Equities Process: An Economic Perspective.
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A. (2017). Mean birds: Detecting aggression and bullying on Twitter.
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A. (2017). Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying.
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A. (2017). Hate is not binary: Studying abusive behavior of #GamerGate on Twitter.
Collinson, M., McDonald, K., Dochertyand, S., Pym, D. (2017). A substructural logic for layered graphs (vol 24, pg 953, 2014). JOURNAL OF LOGIC AND COMPUTATION, 27 (1), 413-414. doi:10.1093/logcom/exv019
Dahlqvist, F., Pym, D. (2017). Coalgebraic completeness-via-canonicity for distributive substructural logics. JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 93 1-22. doi:10.1016/j.jlamp.2017.07.002
Docherty, S., Pym, D. (2017). Intuitionistic layered graph logic.
Dodier-Lazaro, S., Abu-Salma, R., Becker, I., Sasse, M.A. (2017). From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design.
Dodier-Lazaro, S., Becker, I., Krinke, J., Sasse, M. (2017). No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones. London: UCL Computer Science.
Dodier-Lazaro, S., Becker, I., Krinke, J., Sasse, M.A. (2017). "No Good Reason to Remove Features" Expert Users Value Useful Apps over Secure Ones.
Egele,, M., Stringhini, G., Kruegel, C., Vigna, G. (2017). Towards Detecting Compromised Accounts on Social Networks. IEEE Transactions on Dependable and Secure Computing, doi:10.1109/TDSC.2015.2479616
Galmiche, D., Kimmel, P., Pym, D. (2017). A substructural epistemic resource logic.
Ghadafi, E., Groth, J. (2017). Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups.
Groth, J., Maller, M. (2017). Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs.
Haslebacher, A., Onaolapo, J., Stringhini, G. (2017). All Your Cards Are Belong To Us: Understanding Online Carding Forums.
Hine, G., Onaolapo, J., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Samaras, R., ...Blackburn, J. (2017). Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and its Effects on the Web.
Kolodenker, E., Koch, W., Stringhini, G., Egele, M. (2017). PayBreak: Defense against cryptographic ransomware.
Mariconti, E., Onaolapo, J., Ahmad, S., Nikiforou, N., Egele, M., Nikiforakis, N., Stringhini, G. (2017). What's in a Name? Understanding Profile Name Reuse on Twitter.
mariconti, E., onaolapo, J., ross, G., Stringhini, G. (2017). The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
Mariconti, E., Onwuzurike, L., Andriotis, P., De Cristofaro, E., Ross, G., Stringhini, G. (2017). MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
Mavroudis, V., Danezis, G. (2017). A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Mba, G., Onaolapo, J., Stringhini, G., Cavallaro, L. (2017). Flipping 419 Scams: Targeting the Weak and the Vulnerable.
Murdoch, S.J., Becker, I., Abu-Salma, R., Anderson, R., Bohm, N., Hutchings, A., ...Stringhini, G. (2017). Are payment card contracts unfair? (Short paper).
Nilizadeh, S., Labreche, F., Sedighian, A., Zand, A., Fernandez, J., Kruegel, C., ...Vigna, G. (2017). POISED: Spotting Twitter Spam Off the Beaten Paths.
Onwuzurike, L., Ikram, M., Farooqi, S., De Cristofaro, E., Friedman, A., Jourjon, G., ...Shafiq, M.A. (2017). Measuring, Characterizing, and Detecting Facebook Like Farms. ACM Transactions on Privacy and Security,
Pym, D., Gheyas, I., Baldwin, A., Ioannidis, C., Williams, J. (2017). Contagion in cybersecurity attacks. Journal of the Operational Research Society, doi:10.1057/jors.2016.37
Pyrgelis, A., Troncoso, C., De Cristofaro, E. (2017). What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.
Sajadmanesh, S., Jafarzadeh, S., Osia, S.A., Rabiee, H.R., Haddadi, H., Mejova, Y., ...Stringhini, G. (2017). Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web.
Serra, J., Leontiadis, I., Spathis, D., Blackburn, J., Stringhini, G., Vakali, A. (2017). Class-based Prediction Errors to Detect Hate Speech with Out-of-vocabulary Words.
Stringhini, G., Shen, Y., Han, Y., Zhang, X. (2017). Marmite: Spreading Malicious File Reputation Through Download Graphs.
Toledo, R., Danezis, G.D., Echizen, I.E. (2017). Mix-ORAM: Towards delegated shuffles.
Troncoso, C., Isaakidis, M., Danezis, G., Halpin, H. (2017). Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments.
Wang, P., Krinke, J., Lu, K., Li, G., Dodier-Lazaro, S. (2017). How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel.
Weissbacher, M., Mariconti, E., Suarez-Tangil, G., Stringhini, G., Robertson, W., Kirda, E. (2017). Ex-Ray: Detection of History-Leaking Browser Extensions.
Whitty, M., Edwards, M., Levi, M., Peersman, C., Rashid, A., Sasse, M.A., ...Stringhini, G. (2017). Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).
Zannettou, S., Caulfield, T., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Sirivianos, M., ...Blackburn, J. (2017). The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources.

2016

Anderson, G., Pym, D. (2016). A calculus and logic of bunched resources and processes. THEORETICAL COMPUTER SCIENCE, 614 63-96. doi:10.1016/j.tcs.2015.11.035
Andriotis, P., Sasse, M.A., Stringhini, G. (2016). Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model.
Asghar, H., Melis, L., Soldani, C., De Cristofaro, E., Kaafar, M.A., Mathy, L. (2016). SplitBox: Toward Efficient Private Network Function Virtualization.
Beautement, A., Becker, I., Parkin, S., Krol, K., Sasse, M.A. (2016). Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
Becker, I., Hutchings, A., Abu-Salma, R., Anderson, R., Bohm, N., Murdoch, S.J., ...Stringhini, G. (2016). International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
Becker, I., Parkin, S., Sasse, M.A. (2016). Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations.
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J. (2016). Foundations of Fully Dynamic Group Signatures..
Bootle, J., Cerulli, A., Chaidos, P., Groth, J., Petit, C. (2016). Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting. In Fischlin, M., Coron, J.-.S. (Eds.), (pp. 327-357). Springer.
Caputo, D.D., Pfleeger, S.L., Sasse, M.A., Ammann, P., Offutt, J., Deng, L. (2016). Barriers to Usable Security? Three Organizational Case Studies. IEEE Security and Privacy, 14 (5), 22-32. doi:10.1109/MSP.2016.95
Caulfield, T., Ioannidis, C., Pym, D. (2016). On the adoption of privacy-enhancing technologies.
Chase, M., Maller, M., Meiklejohn, S. (2016). Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions.
Chase, M., Meiklejohn, S. (2016). Transparency overlays and applications.
Courtault, J.R., Galmiche, D., Pym, D. (2016). A logic of separating modalities. Theoretical Computer Science, 637 30-58. doi:10.1016/j.tcs.2016.04.040
Courtois, N. (2016). Features or Bugs: The Seven Sins of Current Bitcoin. In Tasca, P., Perrony, N., Pelizzon, L., Aste, T. (Eds.), Banking beyond Banks and Money A Guide to Banking Services in the Twenty-First Century. (pp. 97-120). Berlin: Springer.
Courtois, N. (2016). An Improved Differential Attack on Full GOST.
Courtois, N., Mourouzis, T. (2016). Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers.
Courtois, N., Song, G., Castellucci, R. (2016). Speed Optimizations in Bitcoin Key Recovery Attacks.
Courtois, N., Song, G., Papapanagiotakis-Bousy, I., Sepehrdad, P. (2016). Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon.
Danezis, G., Meiklejohn, S. (2016). Centrally Banked Cryptocurrencies.
De Cristofaro, E., Liang, K., Zhang, Y. (2016). Privacy-Preserving Genetic Relatedness Test.
Docherty, S., Pym, D. (2016). Intuitionistic layered graph logic.
Elahi, T., Doucette, J.A., Hosseini, H., Murdoch, S.J., Goldberg, I. (2016). A Framework for the Game-theoretic Analysis of Censorship Resistance. Proceedings on Privacy Enhancing Technologies, 2016 (4), 83. doi:10.1515/popets-2016-0030
Glass, B., Jenkinson, G., Liu, Y., Sasse, M.A., Stajano, F. (2016). The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions.
Groth, J. (2016). On the Size of Pairing-Based Non-interactive Arguments.
Haddadi, H., Nithyanand, R., Khattak, S., Javed, M., Vallina-Rodriguez, N., Falahrastegar, M., ...Murdoch, S.J. (2016). The Adblocking Tug-of-War. USENIX ;login:,
Hayes, J., Troncoso, C., Danezis, G. (2016). TASP: Towards Anonymity Sets that Persist.
Ioannidis, C., Pym, D., Williams, J. (2016). Is Public Co-Ordination of Investment in Information Security Desirable?. Journal of Information Security, 07 (02), 60-80. doi:10.4236/jis.2016.72005
Isaakidis, M., Danezis, G. (2016). Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay Services. HotPETs 2016 .
Isaakidis, M., Halpin, H., Danezis, G. (2016). UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs.
Khattak, S., Elahi, T., Simon, L., Swanson, C.M., Murdoch, S.J., Goldberg, I. (2016). SoK: Making Sense of Censorship Resistance Systems. Proceedings on Privacy Enhancing Technologies, 2016 (4), 37-61. doi:10.1515/popets-2016-0028
Khattak, S., Fifield, D., Afroz, S., Javed, M., Sundaresan, S., Paxson, V., ...McCoy, D. (2016). Do You See What I See? Differential Treatment of Anonymous Users.
Kostkova, P., Brewer, H., de Lusignan, S., Fottrell, E., Goldacre, B., Hart, G., ...McKendry, R. (2016). Who Owns The Data? Open Data for health care. Fontiers in Public Health, 4 (7), doi:10.3389/fpubh.2016.00007
Krol, K., Parkin, S., Sasse, M.A. (2016). “I don’t like putting my face on the Internet!”: An acceptance study of face biometrics as a CAPTCHA replacement.
Krol, K., Parkin, S., Sasse, M.A. (2016). Better the Devil You Know: A User Study of Two CAPTCHAs and a Possible Replacement.
Krol, K., Rahman, M.S., Parkin, S., De Cristofaro, E., Vasserman, E. (2016). An Exploratory Study of User Perceptions of Payment Methods in the UK and the US.
Krol, K., Spring, J.M., Parkin, S., Sasse, M.A. (2016). Towards robust experimental design for user studies in security and privacy.
Lazarov, M., Onaolapo, J., Stringhini, G. (2016). Honey Sheets: What Happens to Leaked Google Spreadsheets?.
Mariconti, E., Onaolapo, J., Ahmad, S.S., Nikiforou, N., Egele, M., Nikiforakis, M., Stringhini, G. (2016). Why Allowing Profile Name Reuse Is A Bad Idea. European Workshop on System Security,
Mariconti, E., Onaolapo, J., Ross, G., Stringhini, G. (2016). What's your major threat? On the differences between the network behavior of targeted and commodity malware.
Meiklejohn, S., Clark, J. (2016). BITCOIN 2016: Third workshop on bitcoin and blockchain research.
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., Mccoy, D., Voelker, G.M., Savage, S. (2016). A Fistful of Bitcoins: Characterizing Payments among Men with No Names. COMMUNICATIONS OF THE ACM, 59 (4), 86-93.
Melis, L., Asghar, H., De Cristofaro, E., Kaafar, M.A. (2016). Private Processing of Outsourced Network Functions: Feasibility and Constructions.
Melis, L., Danezis, G., De Cristofaro, E. (2016). Efficient Private Statistics with Succinct Sketches.
Murdoch, S.J. (2016). Insecure by Design: Protocols for Encrypted Phone Calls. COMPUTER, 49 (3), 25-33. doi:10.1109/MC.2016.70
Nithyanand, R., Khattak, S., Javed, M., Vallina-Rodriguez, N., Falahrastegar, M., Powles, J.E., ...Murdoch, S.J. (2016). Adblocking and Counter Blocking: A Slice of the Arms Race.
Onaolapo, J., Mariconti, E., Stringhini, G. (2016). What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild.
Onwuruzirike, L., De Cristofaro, E. (2016). Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption. ISOC.
Parkin, S., Krol, K., Becker, I., Sasse, M.A. (2016). Applying Cognitive Control Modes to Identify Security Fatigue Hotspots.
Piotrowska, A., Hayes, J., Gelernter, N., Danezis, G., Herzberg, A. (2016). AnoNotify: A Private Notification Service.. IACR Cryptology ePrint Archive, 2016 466.
Pyrgelis, A., De Cristofaro, E., Ross, G. (2016). Privacy-Friendly Mobility Analytics using Aggregate Location Data.
Rial, A., Danezis, G., Kohlweiss, M. (2016). Privacy-preserving smart metering revisited. International Journal of Information Security, 1-31. doi:10.1007/s10207-016-0355-8
Sänger, J., Hänsch, N., Glass, B., Benenson, Z., Landwirth, R., Sasse, M.A. (2016). Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces.
Sasse, M.A., Smith, M. (2016). The Security-Usability Tradeoff Myth [Guest editors' introduction]. IEEE Security and Privacy, 14 (5), 11-13. doi:10.1109/MSP.2016.102
Sasse, M.A., Smith, M. (2016). The Security-Usability Tradeoff Myth. IEEE SECURITY & PRIVACY, 14 (5), 11-13.
Sasse, M.A., Smith, M., Herley, C., Lipford, H., Vaniea, K. (2016). Debunking Security-Usability Tradeoff Myths. IEEE SECURITY & PRIVACY, 14 (5), 33-39.
Sombatruang, N., Sasse, M.A., Baddeley, M. (2016). Why do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions.
Susil, P., Sepehrdad, P., Vaudenay, S., Courtois, N. (2016). On selection of samples in algebraic attacks and a new technique to find hidden low degree equations. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 15 (1), 51-65. doi:10.1007/s10207-015-0295-8
Toledo, R.R., Danezis, G., Goldberg, I. (2016). Lower-Cost ∈-Private Information Retrieval. Proceedings on Privacy Enhancing Technologies, doi:10.1515/popets-2016-0035
Watson, R.N.M., Norton, R.M., Woodruff, J., Moore, S.W., Neumann, P.G., Anderson, J., ...Roe, M. (2016). FAST PROTECTION-DOMAIN CROSSING IN THE CHERI CAPABILITY-SYSTEM ARCHITECTURE. IEEE MICRO, 36 (5), 38-49.

2015

(2015). Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings.
Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M. (2015). Structure-Preserving Signatures and Commitments to Group Elements. Journal of Cryptology, 29 (2), 363-421. doi:10.1007/s00145-014-9196-7
Abu-Salma, R., Sasse, M.A., Bonneau, J., Smith, M. (2015). POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.
Ayday, E., De Cristofaro, E., Hubaux, J.-.P., Tsudik, G. (2015). Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?. Computer, 48 (2), 58-66. doi:10.1109/MC.2015.59
Beris, O., Beautement, A., Sasse, M.A. (2015). Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the Risk Perceptions and Emotions That Drive Security Behaviors.
Bond, M., Choudary, M.O., Murdoch, S.J., Skorobogatov, S., Anderson, R. (2015). Be Prepared: The EMV Pre-play Attack. IEEE SECURITY & PRIVACY,
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., Petit, C. (2015). Short Accountable Ring Signatures Based on DDH.
Brandao, L., Christin, N., Danezis, G., A.n.o.n.y.m.o.u.s. (2015). Toward Mending Two Nation-Scale Brokered Identification Systems. Proceedings on Privacy Enhancing Technologies, 2015 (2), 135-155. doi:10.1515/popets-2015-0022
Caulfield, T., Fielder, A. (2015). Optimizing time allocation for network defence. Journal of Cybersecurity, tyv002. doi:10.1093/cybsec/tyv002
Chaidos, P., Groth, J. (2015). Making Sigma-protocols Non-interactive without Random Oracles.
Chen, C., Asoni, D.E., Barrera, D., Danezis, G., Perrig, A. (2015). HORNET: High-speed Onion Routing at the Network Layer.
Courtois, N. (2015). On Multiple Symmetric Fixed Points in GOST. CRYPTOLOGIA, 39 (4), 322-334. doi:10.1080/01611194.2014.988362
Courtois, N., Emirdag, P., Valsorda, F. (2015). Privilege Escalation and Combination Attacks on HD Wallet Systems in Bitcoin.
Courtois, N., Emirdag, P., Wang, Z. (2015). On Detection of Bitcoin Mining Redirection Attacks.
Courtois, N., Mourouzis, T. (2015). Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants. In Rassias, M., Darras, N. (Eds.), Computation, Cryptography, and Network Security. (pp. 351-380). Berlin: Springer.
Courtois, N., Mourouzis, T., Grocholewska-Czurylo, A., Quisquater, J.J. (2015). On Optimal Size in Truncated Differential Attacks.
Courtois, N.T., Mourouzis, T., Misztal, M., Quisquater, J.-.J., Song, G. (2015). Can GOST Be Made Secure Against Differential Cryptanalysis?. Cryptologia, 39 (2), 145-156. doi:10.1080/01611194.2014.915266
Dahlqvist, F., Pym, D. (2015). Completeness via Canonicity for Distributive Substructural Logics: A Coalgebraic Perspective.
Danezis, G., Borisov, N., Goldberg, I. (2015). DP5: A Private Presence Service. Proceedings on Privacy Enhancing Technologies, 2015 (2), 4-24. doi:10.1515/popets-2015-0008
Danezis, G., Hayes, J. (2015). Guard Sets for Onion Routing. Guard Sets for Onion Routing, 2015 (2), 65-80. doi:10.1515/popets-2015-0017
Danezis, G., Meiklejohn, S. (2015). Centrally Banked Cryptocurrencies.. CoRR, abs/1505.06895
De Cristofaro, E., Malin, B. (Eds.), (2015). Proceedings of the 2nd International Workshop on Genome Privacy and Security (GenoPri'15). .
Dodier-Lazaro, S. (2015). Appropriation and Principled Security.
Freudiger, J., De Cristofaro, E., Brito, A. (2015). Controlled Data Sharing for Collaborative Predictive Blacklisting.
Gentry, C., Groth, J., Ishai, Y., Peikert, C., Sahai, A., Smith, A. (2015). Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs. JOURNAL OF CRYPTOLOGY, 28 (4), 820-843. doi:10.1007/s00145-014-9184-y
Gollmann, D., Herley, C., Koenig, V., Pieters, W., Sasse, M.A. (2015). Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports, 4 1-28. doi:10.4230/DagRep.4.12.1
Groth, J. (2015). Efficient Fully Structure-Preserving Signatures for Large Messages..
Groth, J., Kohlweiss, M. (2015). One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin.
Hao, S., Borgolte, K., Nikiforakis, N., Stringhini, G., Egele, M., Eubanks, M., ...Vigna, G. (2015). Drops For Stuff: An Analysis of Reshipping Mule Scams.
Huang, J.M., Stringhini, G., Yong, P. (2015). Quit Playing Games With My Heart: Understanding Online Dating Scams.
Kapadia, A., Murdoch, S.J. (Eds.), (2015). Proceedings on Privacy Enhancing Technologies. 2015 (1),
Kapadia, A., Murdoch, S.J. (Eds.), (2015). Proceedings on Privacy Enhancing Technologies. 2015 (2),
Kirlappos, I., Parkin, S., Sasse, M.A. (2015). "Shadow security" as a tool for the learning organization. ACM SIGCAS Computers and Society, 45 (1), 29-37. doi:10.1145/2738210.2738216
Kirlappos, I., Sasse, M.A. (2015). Fixing Security Together: Leveraging trust relationships to improve security in organizations.
Krol, K., Papanicolaou, C., Vernitski, A., Sasse, M.A. (2015). “Too taxing on the mind!” Authentication grids are not for everyone.
Krol, K., Philippou, E., De Cristofaro, E., Sasse, M.A. (2015). "They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking.
Lewko, A., Meiklejohn, S. (2015). A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 9020 377-398. doi:10.1007/978-3-662-46447-2_17
Meiklejohn, S., Orlandi, C. (2015). Privacy-Enhancing Overlays in Bitcoin.
Nagy, M., Bui, T., De Cristofaro, E., Asokan, N., Ott, J., Sadeghi, A.R. (2015). How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
Onwuzurike, L., De Cristofaro, E. (2015). Danger is my middle name: Experimenting with SSL Vulnerabilities in Android Apps.
Parkin, S., Driss, S., Krol, K., Sasse, M.A. (2015). Assessing the User Experience of Password Reset Policies in a University.
Pym, D., Anderson, G. (2015). Combinators for Trust Domains in Security Modelling. Journal of Logic and Computation, doi:10.1093/logcom/exv030
Pym, D., Collinson, M., McDonald, K. (2015). Layered Graph Logic as an Assertion Language for Access Control Policy Models. Journal of Logic and Computation, doi:10.1093/logcom/exv020
Sasse, A. (2015). Scaring and Bullying People into Security Won't Work. IEEE SECURITY & PRIVACY, 13 (3), 80-83. doi:10.1109/MSP.2015.65
Stringhini, G. (2015). On The Threats To Cloud-based Online Service Users (And What We Can Do About Them).
Stringhini, G., Mourlanne, P., Jacob, G., Egele, M., Kruegel, C., Vigna, G. (2015). EvilCohort: Detecting Communities of Malicious Accounts on Online Services.
Stringhini, G., Thonnard, O. (2015). That Ain't You: Blocking Spearphishing Through Behavioral Modelling.
Watson, R.N.M., Woodruff, J., Neumann, P.G., Moore, S.W., Anderson, J., Chisnall, D., ...Laurie, B. (2015). CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.

2014

Abe, M., Groth, J., Ohkubo, M., Tango, T. (2014). Converting cryptographic schemes from symmetric to asymmetric bilinear groups.
Abe, M., Groth, J., Ohkubo, M., Tibouchi, M. (2014). Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
Abe, M., Groth, J., Ohkubo, M., Tibouchi, M. (2014). Structure-preserving signatures from type II pairings.
Anderson, R., Murdoch, S.J. (2014). EMV: Why Payment Systems Fail. COMMUNICATIONS OF THE ACM, 57 (6), 24-28. doi:10.1145/2602321
Angela Sasse, M. (2014). "Technology should be smarter than this!": A vision for overcoming the great authentication fatigue. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8425 LNCS 33-36. doi:10.1007/978-3-319-06811-4_7
Bada, M., Sasse, A. (2014). Why do they fail to change behaviour?. .
Beato, F., De Cristofaro, E., Rasmussen, K.B. (2014). Undetectable Communication: The Online Social Networks Case.
Bellare, M., Meiklejohn, S., Thomson, S. (2014). Key-versatile signatures and applications: RKA, KDM and joint Enc/Sig. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 8441 496-513.
Bilogrevic, I., Freudiger, J., De Cristofaro, E., Uzun, E. (2014). What’s the Gist? Privacy-Preserving Aggregation of User Profiles.
Blake, D., Caulfield, T., Ioannidis, C., Tonks, I. (2014). Improved inference in the evaluation of mutual fund performance using panel bootstrap methods. JOURNAL OF ECONOMETRICS, 183 (2), 202-210. doi:10.1016/j.jeconom.2014.05.010
Blundo, C., De Cristofaro, E., Gasti, P. (2014). EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity. Journal of Computer Security, 22 355-381.
Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R. (2014). Chip and skim: Cloning EMV cards with the pre-play attack.
Calderon, T., Meiklejohn, S., Shacham, H., Waters, B. (2014). Rethinking verifiably encrypted signatures: A gap in functionality and potential solutions. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8366 LNCS 349-366. doi:10.1007/978-3-319-04852-9_18
Caulfield, T., Pym, D., Williams, J. (2014). Compositional Security Modelling: Structure, Economics, and Behaviour.
Chaabane, A., Chen, T., Cunche, M., De Cristofaro, E., Friedman, A., Kafaar, M.-.A. (2014). Censorship in the Wild: Analyzing Internet Filtering in Syria.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2014). Malleable Signatures: New Definitions and Delegatable Anonymous Credentials.
Chase, M., Meiklejohn, S. (2014). Deja Q: Using Dual Systems to Revisit q-Type Assumptions.. IACR Cryptology ePrint Archive, 2014 570.
Chase, M., Meiklejohn, S. (2014). Déjà Q: Using dual systems to revisit q-type assumptions. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 8441 622-639.
Chase, M., Meiklejohn, S., Zaverucha, G.M. (2014). Algebraic MACs and keyed-verification anonymous credentials. Proceedings of the ACM Conference on Computer and Communications Security, 1205-1216. doi:10.1145/2660267.2660328
Collinson, M., McDonald, K., Pym, D. (2014). A substructural logic for layered graphs. JOURNAL OF LOGIC AND COMPUTATION, 24 (4), 953-988. doi:10.1093/logcom/exu002
Courtois, N. (2014). Cryptanalysis of Two GOST Variants With 128-bit Keys. Cryptologia, 38 (4), 348-361. doi:10.1080/01611194.2014.915706
Courtois, N., Emirdag, P., Nagy, D. (2014). Could Bitcoin Transactions Be 100x Faster?.
Courtois, N., Grajek, M., Naik, R. (2014). Optimizing SHA256 in Bitcoin Mining.
Courtois, N., Mourouzis, T., Song, G., Sepehrdad, P., Susil, P. (2014). Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon.
Danezis, G., De Cristofaro, E. (2014). Fast and Private Genomic Testing for Disease Susceptibility.
Danezis, G., De Cristofaro, E. (2014). Simpler protocols for privacy-preserving disease susceptibility testing.
Danezis, G., Fournet, C., Groth, J., Kohlweiss, M. (2014). Square Span Programs with Applications to Succinct NIZK Arguments.. IACR Cryptology ePrint Archive, 2014 718.
Danezis, G., Groth, J., Fournet, C., Kohlweiss, M. (2014). Square Span Programs with Applications to Succinct NIZK Arguments.
De Cristofaro, E. (2014). An Exploratory Ethnographic Study of Issues and Concerns with Whole Genome Sequencing.
De Cristofaro, E. (2014). Genomic Privacy and the Rise of a New Research Community. IEEE Security & Privacy, 12 80-83.
De Cristofaro, E., Du, H., Freudiger, J., Norcie, G. (2014). A Comparative Usability Study of Two-Factor Authentication.
De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M.A., Shafiq, M.Z. (2014). Paying for Likes? Understanding Facebook Like Fraud Using Honeypots.
De Cristofaro, E., Murdoch, S.J. (2014). Preface. .
De Cristofaro, E., Murdoch, S.J. (2014). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8555 LNCS doi:10.1007/978-3-319-08506-7
De Cristofaro, E., Murdoch, S.J. (2014). Privacy Enhancing Technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings. Springer.
Elahi, T., Danezis, G., Goldberg, I. (2014). PrivEx: Private collection of traffic statistics for anonymous communication networks. Proceedings of the ACM Conference on Computer and Communications Security, 1068-1079. doi:10.1145/2660267.2660280
Escala, A., Groth, J. (2014). Fine-Tuning Groth-Sahai Proofs.
Groth, J., Ostrovsky, R. (2014). Cryptography in the Multi-string Model. Journal of Cryptology, 27 (3), 506-543. doi:10.1007/s00145-013-9152-y
Herbert, S.J., Murdoch, S.J., Punskaya, E. (2014). Optimising node selection probabilities in multi-hop M/D/1 queuing networks to reduce latency of Tor. ELECTRONICS LETTERS, 50 (17), 1205-1206. doi:10.1049/el.2014.2136
Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D., ...Levchenko, K. (2014). Botcoin: Monetizing Stolen Cycles..
Iedemska, J., Stringhini, G., Kemmerer, R., Kruegel, C., Vigna, G. (2014). The tricks of the trade: What makes spam campaigns successful?.
Ioannidis, C., Williams, J., Pym, D., Gheyas, I. (2014). Resilience in Information Stewardship.
Jennett, C., Sasse, M.A. (2014). Is sending shops ads by Bluetooth just a bit creepy?. [Digital scholarly resource]. Retrieved from: http://theconversation.com/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy-32643
Kirlappos, I., Parkin, S., Sasse, M.A. (2014). Learning from 'Shadow Security': Why understanding noncompliant behaviors provides the basis for effective security.
Kirlappos, I., Sasse, M.A. (2014). What Usable Security Really Means: Trusting and Engaging Users.
Line, M.B., Zand, A., Stringhini, G., Kemmerer, R. (2014). Targeted attacks against industrial control systems: Is the power industry prepared?. Proceedings of the ACM Conference on Computer and Communications Security, 2014-November (November), 13-22. doi:10.1145/2667190.2667192
Morton, A.J., Sasse, M.A. (2014). Desperately Seeking Assurances: Segmenting Users by their Information-Seeking Preferences::A Q Methodology Study of Users’ Ranking of Privacy, Security & Trust Cues.
Murdoch, S.J. (2014). Quantifying and measuring anonymity.
Murdoch, S.J., Anderson, R. (2014). Security Protocols and Evidence: Where Many Payment Systems Fail.
Murphy, R.R., Danezis, G., Horrocks, M.H., Jackson, S.E., Klenerman, D. (2014). Bayesian inference of accurate population sizes and FRET efficiencies from single diffusing biomolecules.. ANALYTICAL CHEMISTRY, 86 (17), 8603-8612. doi:10.1021/ac501188r
Nikiforakis, N., Maggi, F., Stringhini, G., Rafique, M.Z., Joosen, W., Kruegel, C., ...Zanero, S. (2014). Stranger danger: Exploring the ecosystem of ad-based URL shortening services. WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web, 51-61. doi:10.1145/2566486.2567983
Oberg, J., Meiklejohn, S., Sherwood, T., Kastner, R. (2014). Leveraging gate-level properties to identify hardware timing channels. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 33 (9), 1288-1301. doi:10.1109/TCAD.2014.2331332
Pfleeger, S.L., Sasse, M.A., Furnham, A. (2014). From Weakest Link to Security Hero: Transforming Staff Security Behavior. Journal of Homeland Security and Emergency Management, 11 (4), 489-510. doi:10.1515/jhsem-2014-0035
Porter, C., Letier, E., Sasse, M.A. (2014). Building a National E-Service using Sentire: Experience report on the use of Sentire: A Volere-based requirements framework driven by calibrated personas and simulated user feedback.
Pym, D., Ritter, E., Robinson, E. (2014). A proof-theoretic analysis of the classical propositional matrix method. Journal of Logic and Computation, 24 (1), 283-301. doi:10.1093/logcom/exs045
Ruskov, M., Ekblom, P., Sasse, M.A. (2014). Towards a Simulation of Information Security Behaviour in Organisations. In Blackwell, C., Zhu, H. (Eds.), Cyberpatterns. (pp. 177-184). Springer International Publishing.
Sasse, M.A., Kirlappos, I. (2014). Design for Trusted and Trustworthy Services: Why We Must Do Better.. In Trust, Computing, and Society. (pp. 229-249). Cambridge University Press.
Sasse, M.A., Palmer, C.C. (2014). Protecting you. IEEE Security and Privacy, 12 (1), 11-13. doi:10.1109/MSP.2014.11
Sasse, M.A., Palmer, C.C., Jakobsson, M., Consolvo, S., Wash, R., Camp, L.J. (2014). Helping you protect you. IEEE Security and Privacy, 12 (1), 39-42. doi:10.1109/MSP.2014.4
Sasse, M.A., Steves, M., Krol, K., Chisnell, D. (2014). The Great Authentication Fatigue – And How to Overcome It.
Sharad, K., Danezis, G. (2014). An Automated Social Graph De-anonymization Technique.. CoRR, abs/1408.1276
Sharad, K., Danezis, G. (2014). An Automated Social Graph De-anonymization Technique. Proceedings of the ACM Conference on Computer and Communications Security, 47-58. doi:10.1145/2665943.2665960
Steves, M., Chisnell, D., Sasse, A., Krol, K., Theofanos, M., Wald, H. (2014). Report: Authentication Diary Study. National Institute of Standards and Technology .
Stringhini, G., Hohlfeldy, O., Kruegel, C., Vigna, G. (2014). The harvester, the botmaster, and the spammer: On the relations between the different actors in the spam landscape.
Watson, R.N.M., Chisnall, D., Davis, B., Koszek, W., Moore, S.W., Murdoch, S.J., ...Woodruff, J. (2014). Capability Hardware Enhanced RISC Instructions: CHERI User's Guide. University of Cambridge Computer Laboratory.
Watson, R.N.M., Chisnall, D., Davis, B., Koszek, W., Moore, S.W., Murdoch, S.J., ...Woodruff, J. (2014). Bluespec Extensible RISC Implementation: BERI Software Reference. University of Cambridge Computer Laboratory.
Watson, R.N.M., Neumann, P.G., Woodruff, J., Anderson, J., Chisnall, D., Davis, B., ...Roe, M. (2014). Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture. University of Cambridge Computer Laboratory.
Watson, R.N.M., Woodruff, J., Chisnall, D., Davis, B., Koszek, W., Markettos, A.T., ...Norton, R. (2014). Bluespec Extensible RISC Implementation: BERI Hardware Reference. University of Cambridge Computer Laboratory.
Zarras, A., Kapravelos, A., Stringhini, G., Holz, T., Kruegel, C., Vigna, G. (2014). The dark alleys of madison avenue: Understanding malicious advertisements. Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, 373-379. doi:10.1145/2663716.2663719

2013

Acquisti, A., Krontiris, I., Langheinrich, M., Sasse, M.A. (2013). 'My Life, Shared’-Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). Dagstuhl Reports, 3 (7), 74-107. doi:10.4230/DagRep.3.7.74
Ashenden, D., Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy?. COMPUTERS & SECURITY, 39 396-405. doi:10.1016/j.cose.2013.09.004
Barthe, G., Danezis, G., Gregoire, B., Kunz, C., Zanella-Beguelin, S. (2013). Verified computational differential privacy with applications to smart metering. Proceedings of the Computer Security Foundations Workshop, 287-301. doi:10.1109/CSF.2013.26
Bartsch, S., Sasse, M.A. (2013). How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization..
Bayer, S., Groth, J. (2013). Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists.
Bellare, M., Meiklejohn, S., Thomson, S. (2013). Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig.. IACR Cryptology ePrint Archive, 2013 326.
Brostoff, S., Jennett, C., Malheiros, M., Sasse, M.A. (2013). Federated Identity to Access e-Government Services - Are Citizens Ready for This?.
Cardenas, A., Chow, R., De Cristofaro, E. (2013). Data Handling in the Smart Grid: Do We Know Enough?. In Critical Infrastructure Protection VII. (pp. 21-32). Springer Berlin Heidelberg.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2013). Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.. IACR Cryptology ePrint Archive, 2013 179.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2013). Verifiable Elections That Scale for Free..
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2013). Succinct Malleable NIZKs and an Application to Compact Shuffles..
Courtois, N. (2013). Security Evaluation of Russian GOST Cipher.
Courtois, N. (2013). Propagation of Truncated Differentials in GOST.
Courtois, N., Mourouzis, T. (2013). Advanced Differential Cryptanalysis and GOST Cipher.
Courtois, N., Mourouzis, T. (2013). Enhanced Truncated Differential Cryptanalysis of GOST.
Courtois, N.T. (2013). CRYPTANALYSIS OF GOST IN THE MULTIPLE-KEY SCENARIO. Tatra Mountains Mathematical Publications, 57 (1), doi:10.2478/tmmp-2013-0035
Courtois, N.T. (2013). Low-Complexity Key Recovery Attacks on GOST Block Cipher. Cryptologia, 37 (1), 1-10. doi:10.1080/01611194.2012.739587
Courtois, N.T., Hulme, D., Hussain, K., Gawinecki, J.A., Grajek, M. (2013). On Bad Randomness and Cloning of Contactless Payment and Building Smart Cards.
Danezis, G., Fournet, C., Kohlweiss, M., Parno, B. (2013). Pinocchio coin: Building Zerocoin from a succinct pairing-based proof system. Proceedings of the ACM Conference on Computer and Communications Security, 27-29. doi:10.1145/2517872.2517878
Danezis, G., Fournet, C., Kohlweiss, M., Zanella-Béguelin, S. (2013). Smart meter aggregation via secret-sharing. Proceedings of the ACM Conference on Computer and Communications Security, 75-80. doi:10.1145/2516930.2516944
Danezis, G., Käsper, E. (2013). The dangers of composing anonymous channels. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7692 LNCS 191-206. doi:10.1007/978-3-642-36373-3_13
Danezis, G., Troncoso, C. (2013). You cannot hide for long: De-anonymization of real-world dynamic behaviour. Proceedings of the ACM Conference on Computer and Communications Security, 49-59. doi:10.1145/2517840.2517846
De Cristofaro, E., Faber, S., Tsudik, G. (2013). Secure Genomic Testing with Size-and Position-Hiding Private Substring Matching.
De Cristofaro, E., Manulis, M., Poettering, B. (2013). Private discovery of common social contacts. International journal of information security, 12 49-65.
De Cristofaro, E., Soriente, C. (2013). Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI). IEEE Transactions on Information Forensics and Security (TIFS), 8 (8),
De Cristofaro, E., Soriente, C. (2013). Participatory privacy: Enabling privacy in participatory sensing. IEEE Network, 27 32-36.
De Cristofaro, E., Wright, M. (2013). Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Springer.
Dodier-Lazaro, S., Avril, Q., Gouranton, V. (2013). SODA: A Scalability-Oriented Distributed & Anticipative Model for Collision Detection in Physically-based Simulations.
Duncan, B., Pym, D.J., Whittington, M. (2013). Developing a conceptual framework for cloud security assurance.
Egele, M., Stringhini, G., Krügel, C., Vigna, G. (2013). COMPA: Detecting Compromised Accounts on Social Networks..
Fournet, C., Kohlweiss, M., Danezis, G., Luo, Z. (2013). ZQL: A Compiler for Privacy-Preserving Data Processing..
Huth, M., Kuo, J.H.P., Sasse, A., Kirlappos, I. (2013). Towards usable generation and enforcement of trust evidence from programmers' intent.
Huth, M., Kuo, J.H., Sasse, M.A., Kirlappos, I. (2013). Towards Usable Generation and Enforcement of Trust Evidence from Programmers’ Intent.
Kirlappos, I., Beautement, A., Sasse, M.A. (2013). "Comply or die" is dead: Long live security-aware principal agents.
Lewko, A.B., Meiklejohn, S. (2013). A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups.. IACR Cryptology ePrint Archive, 2013 300.
Maggi, F., Frossi, A., Zanero, S., Stringhini, G., Stone-Gross, B., Kruegel, C., Vigna, G. (2013). Two years of short URLs internet measurement: Security threats and countermeasures. WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web, 861-871.
Malheiros, M., Brostoff, S., Jennett, C., Sasse, M.A. (2013). Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.. In Böhme, R. (Ed.), The Economics of Information Security and Privacy. (pp. 237-261). Springer.
Malheiros, M., Preibusch, S., Sasse, M.A. (2013). “Fairly Truthful”: The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure.
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S. (2013). A fistful of bitcoins: Characterizing payments among men with no names. Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, 127-139. doi:10.1145/2504730.2504747
Meiklejohn, S., Shacham, H. (2013). New Trapdoor Projection Maps for Composite-Order Bilinear Groups.. IACR Cryptology ePrint Archive, 2013 657.
Mourouzis, T. (2013). Propagation of Truncated Differentials in GOST.
Murdoch, S.J. (2013). No magic formula. Index on Censorship, 42 (2), 136-139. doi:10.1177/0306422013491368
Murdoch, S.J., Roberts, H. (2013). Internet Censorship and Control Introduction. IEEE INTERNET COMPUTING, 17 (3), 6-9.
Nagy, M., De Cristofaro, E., Dmitrienko, A., Asokan, N., Sadeghi, A.-.R. (2013). Do I know you?–Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Norcie, G., De Cristofaro, E., Bellotti, V. (2013). Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles.
Oberg, J., Meiklejohn, S., Sherwood, T., Kastner, R. (2013). A practical testing framework for isolating hardware timing channels..
Ruskov, M., Ekblom, P., Sasse, A. (2013). In Search for the Right Measure: Assessing Types of Developed Knowledge While Using a Gamified Web Toolkit.
Sasse, M.A., Krol, K. (2013). Usable biometrics for an ageing population. In Fairhurst, M. (Ed.), Age factors in biometric processing. (pp. 303-320). Stevenage, UK: IET.
Stringhini, G., Kruegel, C., Vigna, G. (2013). Shady paths: Leveraging surfing crowds to detect malicious web pages. Proceedings of the ACM Conference on Computer and Communications Security, 133-144. doi:10.1145/2508859.2516682
Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y. (2013). Follow the green: Growth and dynamics in Twitter follower markets. Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, 163-176. doi:10.1145/2504730.2504731
Watson, R.N.M., Murdoch, S.J., Gudka, K., Anderson, J., Neumann, P.G., Laurie, B. (2013). Towards a theory of application compartmentalisation.

2012

(2012). the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012.
(2012). Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers.
(2012). Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers.
Anderson, R.J., Bond, M., Choudary, O., Murdoch, S.J., Stajano, F. (2012). Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV..
Arnell, S., Beautement, A., Inglesant, P., Monahan, B., Pym, D., Sasse, M.A. (2012). Systematic Decision Making in Security Management Modelling Password Usage and Support.
Bartsch, S., Sasse, M.A. (2012). Guiding decisions on authorization policies: a participatory approach to decision support.
Bartsch, S., Sasse, M.A. (2012). How users bypass access control and why: the impact of authorization problems on individuals and the organization. London, UK: UCL Department of Computer Science.
Bayer, S., Groth, J. (2012). Efficient Zero-Knowledge Argument for Correctness of a Shuffle.
Blundo, C., De Cristofaro, E., Gasti, P. (2012). EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity..
Chaabane, A., De Cristofaro, E., Kaafar, M.-.A., Uzun, E. (2012). Privacy in Content-Oriented Networking: Threats and Countermeasures. Computer Communication Review, 43 25-33.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2012). Malleable Proof Systems and Applications.. IACR Cryptology ePrint Archive, 2012 12.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2012). Verifiable Elections That Scale for Free.. IACR Cryptology ePrint Archive, 2012 697.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2012). Succinct Malleable NIZKs and an Application to Compact Shuffles.. IACR Cryptology ePrint Archive, 2012 506.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2012). Malleable Proof Systems and Applications..
Collinson, M., Pym, D., Taylor, B. (2012). A framework for modelling security architectures in services ecosystems.
Conti, N., Jennett, C., Maestre, J., Sasse, M.A. (2012). When did my mobile turn into a 'sellphone'? A study of consumer responses to tailored smartphone ads.
COURTOIS, N. (2012). Security Evaluation of GOST 28147-89 In View Of International Standardisation. Cryptologia, 36 (Issue 1), 2-13. doi:10.1080/01611194.2011.632807
Courtois, N. (2012). An Improved Differential Attack on Full GOST. [Digital scholarly resource]. Retrieved from: http://eprint.iacr.org/2012/138
Courtois, N., Gupta, K., Hulme, D. (2012). Building and Transport Cards: Attacks and Defences.
COURTOIS, N., Misztal, M. (2012). Aggregated Differentials and Cryptanalysis of PP-1 and GOST. Periodica Mathematica Hungarica, Vol. 65 (2), 11-26. doi:10.1007/s10998-012-2983-8
Courtois, N., Mourouzis, T., Hulme, D. (2012). Multiplicative Complexity and Solving Generalized Brent Equations With SAT Solvers.
Courtois, N., Mourouzis, T., Le, P.V. (2012). Extension of de Wegers Attack on RSA with Large Public Keys.
Courtois, N., Sepherdad, P., Susil, P., Vaudenay, S. (2012). ElimLin Algorithm Revisited.
Danezis, G. (2012). Trust as a methodological tool in security engineering. In Trust, Computing, and Society. (pp. 68-92). .
Danezis, G., Kohlweiss, M., Livshits, B., Rial, A. (2012). Private client-side profiling with random forests and hidden markov models. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7384 LNCS 18-37. doi:10.1007/978-3-642-31680-7_2
De Cristofaro, E., Di Pietro, R. (2012). Adversaries and countermeasures in privacy-enhanced Urban sensing systems. IEEE Systems Journal, Special Issue on Security and Privacy of Complex Systems,
De Cristofaro, E., Di Pietro, R. (2012). Preserving Query Privacy in Urban Sensing Systems.
De Cristofaro, E., Faber, S., Gasti, P., Tsudik, G. (2012). GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?.
De Cristofaro, E., Gasti, P., Tsudik, G. (2012). Fast and Private Computation of Cardinality of Set Intersection and Union.
De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A. (2012). Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs.. IEEE Data Eng. Bull., 35 93-100.
De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A. (2012). Hummingbird: Privacy at the time of Twitter.
De Cristofaro, E., Tsudik, G. (2012). Experimenting with Fast Private Set Intersection.
Groth, J., Ostrovsky, R., Sahai, A. (2012). New Techniques for Noninteractive Zero-Knowledge. Journal of the ACM, 59 (3), doi:10.1145/2220357.2220358
Groth, J., Sahai, A. (2012). Efficient Noninteractive Proof Systems for Bilinear Groups. SIAM Journal on Computing, 41 (5), 1193-1232. doi:10.1137/080725386
Ioannidis, C., Pym, D., Williams, J. (2012). Information security trade-offs and optimal patching policies. European Journal of Operational Research, 216 (2), 434-444. doi:10.1016/j.ejor.2011.05.050
Jennett, C., Brostoff, S., Malheiros, M., Sasse, M.A. (2012). Adding insult to injury: consumer experiences of being denied credit. International Journal of Consumer Studies, 36 (5), 549-555. doi:10.1111/j.1470-6431.2012.01120.x
Jennett, C., Malheiros, M., Brostoff, S., Sasse, M.A. (2012). Privacy for applicants versus lenders' needs for predictive power: Is it possible to bridge the gap?. In Gutwirth, S., Leenes, R., De Hert, P., Poullet, Y. (Eds.), (pp. 35-51). SpringerLink.
Kirlappos, I., Sasse, M.A. (2012). Security Education against Phishing: A Modest Proposal for a Major Rethink. IEEE Security and Privacy Magazine, 10 (2), 24-32. doi:10.1109/MSP.2011.179
Kirlappos, I., Sasse, M.A., Harvey, N. (2012). Why Trust Seals Don’t Work: A Study of User Perceptions and Behavior. In Katzenbeisser, S., Weippl, E., Camp, L., Volkamer, M., Reiter, M., Zhang, X. (Eds.), Trust and Trustworthy Computing. (pp. 308-324). Berlin/Heidelberg: Springer.
Krol, K., Moroz, M., Sasse, M.A. (2012). Don't work. Can't work? Why it's time to rethink security warnings.
Malheiros, M., Brostoff, S., Jennett, C., Sasse, A. (2012). Would You Sell Your Mother’s Data? Personal Data Disclosure in a Simulated Credit Card Application.
Malheiros, M., Jennett, C., Patel, S., Brostoff, S., Sasse, M.A. (2012). Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising.
Meiklejohn, S., Erway, C.C., Küpçü, A., Hinkle, T., Lysyanskaya, A. (2012). ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.. IACR Cryptology ePrint Archive, 2012 226.
Mishari, M.A., De Cristofaro, E., El Defrawy, K., Tsudik, G. (2012). Harvesting SSL Certificate Data to Identify Web-Fraud. International Journal of Network Security (IJSN),
Molina-Markham, A., Danezis, G., Fu, K., Shenoy, P., Irwin, D. (2012). Designing privacy-preserving smart meters with low-cost microcontrollers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7397 LNCS 239-253. doi:10.1007/978-3-642-32946-3_18
Morton, A., Sasse, M.A. (2012). Privacy is a process, not a PET: a theory for effective privacy practice.
Murdoch, S.J., Bond, M., Anderson, R. (2012). How Certification Systems Fail: Lessons from the Ware Report. IEEE SECURITY & PRIVACY, 10 (6), 40-44.
Porter, C., Sasse, M.A., Letier, E. (2012). Designing acceptable user registration processes for e-services.
Probst, C.W., Sasse, M.A., Pieters, W., Dimkov, T., Luysterborg, E., Arnaud, M. (2012). Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. In Gutwirth, S., Leenes, R., Hert, P.D., Poullet, Y. (Eds.), European Data Protection: In Good Health?. (pp. 251-265). Springer Netherlands.
Rahaman, A., Sasse, M.A. (2012). Designing National Identity: An Organisational Perspective on Requirements for National Identity Management Systems.
Rial, A., Danezis, G. (2012). Privacy-preserving smart metering. ISSE 2012 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2012 Conference, 105-115. doi:10.1007/978-3-658-00333-3_11
Ruskov, M., Celdran, J.M., Ekblom, P., Sasse, M.A. (2012). Unlocking the next level of crime prevention: development of a game prototype to teach the conjunction of criminal opportunity. Information Technologies and Control, 10 (8), 15-21.
Sasse, M.A., Kirlappos, I. (2012). Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling.
Stringhini, G., Egele, M., Kruegel, C., Vigna, G. (2012). Poultry markets: On the underground economy of twitter followers. WOSN'12 - Proceedings of the ACM Workshop on Online Social Networks, 1-6. doi:10.1145/2342549.2342551
Stringhini, G., Egele, M., Kruegel, C., Vigna, G. (2012). Poultry markets: on the underground economy of twitter followers.. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 42 (4), 527-532. doi:10.1145/2377677.2377781
Stringhini, G., Egele, M., Zarras, A., Holz, T., Kruegel, C., Vigna, G. (2012). B@bel: Leveraging Email Delivery for Spam Mitigation..
Watson, R.N.M., Neumann, P.G., Woodruff, J., Anderson, J., Anderson, R., Dave, N., ...Paeps, P. (2012). CHERI: a research platform deconflating hardware virtualisation and protection.
Wibbeke, A., Schöppner, V., Sasse, M. (2012). Self-reinforcement of uniaxially stretched polycarbonate film.
Zhang, M., Jennett, C., Malheiros, M., Sasse, M.A. (2012). Data after death: User requirements and design challenges for SNSs and email providers.

2011

(2011). Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011.
Abe, M., Groth, J., Haralambiev, K., Ohkubo, M. (2011). Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Abe, M., Groth, J., Ohkubo, M. (2011). Separating Short Structure Preserving Signatures from Non-Interactive Assumptions.
Anderson, R., Murdoch, S.J. (2011). What Next after Anonymity?.
Ateniese, G., De Cristofaro, E., Tsudik, G. (2011). (If) size matters: size-hiding private set intersection.
Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G. (2011). Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
Baldwin, A., Pym, D., Sadler, M., Shiu, S. (2011). Information stewardship in cloud ecosystems: Towards models, economics, and delivery.
BEEHAREE, A.K., Laqua, S., Sasse, M.A. (2011). Navigating Haystacks at 70mph: Intelligent Search for Intelligent In-Car Services.
Ben Abdesslem, F., Henderson, T., Brostoff, S., Sasse, M.A. (2011). Context-based Personalised Settings for Mobile Location Sharing.
Beres, Y., Perrig, A., Sadeghi, A.R., Sasse, A. (2011). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. .
Castelluccia, C., De Cristofaro, E., Francillon, A., Kaafar, M.-.A. (2011). EphPub: Toward Robust Ephemeral Publishing.
COURTOIS, N. (2011). Self-similarity Attacks on Block Ciphers and Application to KeeLoq. In Naccache, D. (Ed.), Quisquater Festschrift. .
Courtois, N. (2011). Algebraic Complexity Reduction and Cryptanalysis of GOST.. IACR Cryptology ePrint Archive, 2011 626.
Courtois, N. (2011). Security Evaluation of GOST 28147-89 In View Of International Standardisation.. IACR Cryptology ePrint Archive, 2011 211.
COURTOIS, N., Bard, G.V., Ault, S.V. (2011). Statistics of Random Permutations and the Cryptanalysis Of Periodic Block Ciphers. Cryptologia,
COURTOIS, N., Bard, G.V., Hulme, D. (2011). A New General-Purpose Method to Multiply 3x3 Matrices Using Only 23 Multiplications. USA .
COURTOIS, N., Hulme, D., Mourouzis, T. (2011). Solving Optimisation Problems in Cryptography, Its Implementation and Cryptanalysis,.
Courtois, N., Hulme, D., Mourouzis, T. (2011). Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis.. IACR Cryptology ePrint Archive, 2011 475.
Courtois, N., Jhawar, R., Inglesant, P., Sasse, M.A. (2011). Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN Authentication.
COURTOIS, N., Misztal, M. (2011). First Differential Attack On Full 32-Round GOST.
Courtois, N., Misztal, M. (2011). Differential Cryptanalysis of GOST.. IACR Cryptology ePrint Archive, 2011 312.
COURTOIS, N., Mourouzis, T. (2011). Black-Box Collision Attacks on the Compression Function of the GOST Hash Function.
Courtois, N.T., Bard, G.V. (2011). Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq.
Cvrček, D., Danezis, G. (2011). Fighting the 'good' internet war. SECURITY PROTOCOLS XVI, 6615 3-+.
Danezis, G. (2011). Covert communications despite traffic data retention. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6615 LNCS 198-214. doi:10.1007/978-3-642-22137-8_27
Danezis, G., Kohlweiss, M., Rial, A. (2011). Differentially private billing with rebates. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6958 LNCS 148-162. doi:10.1007/978-3-642-24178-9_11
Danezis, G., Livshits, B. (2011). Towards ensuring client-side computational integrity (A position paper). Proceedings of the ACM Conference on Computer and Communications Security, 125-129. doi:10.1145/2046660.2046683
De Cristofaro, E., Durussel, A., Aad, I. (2011). Reclaiming privacy for smartphone applications.
De Cristofaro, E., Lu, Y., Tsudik, G. (2011). Efficient techniques for privacy-preserving sharing of sensitive information.
De Cristofaro, E., Manulis, M., Poettering, B. (2011). Private Discovery of Common Social Contacts.
De Cristofaro, E., Soriente, C. (2011). PEPSI—privacy-enhanced participatory sensing infrastructure.
Doupé, A., Egele, M., Caillat, B., Stringhini, G., Yakin, G., Zand, A., ...Vigna, G. (2011). Hit 'em where it hurts: A live security exercise on Cyber Situational Awareness. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 51-61.
Groth, J. (2011). Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments.
Inglesant, P.G., Sasse, M.A. (2011). Information Security as Organizational Power: A framework for re-thinking security policies.
Ioannidis, C., Pym, D.J., Williams, J. (2011). Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach..
Jhawar, R., Inglesant, P.G., Sasse, M.A., Curtois, N.T. (2011). Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN authentication.
Koeberl, P., Li, J., Rajan, A., Vishik, C., Wu, W. (2011). A Practical Device Authentication Scheme Using SRAM PUFs..
Kursawe, K., Danezis, G., Kohlweiss, M. (2011). Privacy-friendly aggregation for the smart-grid. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6794 LNCS 175-191. doi:10.1007/978-3-642-22263-4_10
Laqua, S., Sasse, M.A., Greenspan, S., Gates, C. (2011). Do you know dis?: a user study of a knowledge discovery tool for organizations.
Malheiros, M., Jennett, C., Seager, W., Sasse, M. (2011). Trusting to Learn: Trust and Privacy Issues in Serious Games. In McCune, J., Balacheff, B., Perrig, A., Sadeghi, A.-.R., Sasse, A., Beres, Y. (Eds.), Trust and Trustworthy Computing. (pp. 116-130). Springer Berlin / Heidelberg.
Meiklejohn, S., Mowery, K., Checkoway, S., Shacham, H. (2011). The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion..
Mowery, K., Meiklejohn, S., Savage, S. (2011). Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks..
Murdoch, S.J. (2011). Hardened Stateless Session Cookies.
Murdoch, S.J. (2011). Hardened Stateless Session Cookies (Transcript of Discussion).
Rial, A., Danezis, G. (2011). Privacy-preserving smart metering. Proceedings of the ACM Conference on Computer and Communications Security, 49-60. doi:10.1145/2046556.2046564
Sasse, M., Schöppner, V., Seibel, S., Becker, K. (2011). Expert database provides support for pipe extrusion. Kunststoffe International, 101 (12), 32-34.
Seager, W., Ruskov, M., Sasse, M.A., Fradinho, M. (2011). Eliciting and modelling expertise for serious games in project management. Entertainment Computing, 2 doi:10.1016/j.entcom.2011.01.002
Shokri, R., Theodorakopoulos, G., Danezis, G., Hubaux, J.P., Le Boudec, J.Y. (2011). Quantifying location privacy: The case of sporadic location exposure. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6794 LNCS 57-76. doi:10.1007/978-3-642-22263-4_4
Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G. (2011). The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns..
Stringhini, G., Holz, T., Stone-Gross, B., Kruegel, C., Vigna, G. (2011). BOTMAGNIFIER: Locating Spambots on the Internet..
Troncoso, C., Danezis, G., Kosta, E., Balasch, J., Preneel, B. (2011). PriPAYD: Privacy-friendly pay-as-you-drive insurance. IEEE Transactions on Dependable and Secure Computing, 8 (5), 742-755. doi:10.1109/TDSC.2010.71

2010

Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M. (2010). Structure-Preserving Signatures and Commitments to Group Elements.
Auletta, V., Blundo, C., De Caro, A., De Cristofaro, E., Persiano, G., Visconti, I. (2010). Increasing privacy threats in the cyberspace: the case of Italian e-passports.
Beautement, A., Pym, D.J. (2010). Structured Systems Economics for Security Management..
Beautement, A., Sasse, M.A. (2010). Gathering realistic authentication performance data through field trials.
Beresnevichiene, Y., Pym, D., Shiu, S. (2010). Decision support for systems security investment.
Brostoff, S., Inglesant, P., Sasse, M.A. (2010). Evaluating the usability and security of a graphical one-time PIN system.
Castelluccia, C., De Cristofaro, E., Perito, D. (2010). Private information disclosure from web searches.
Collinson, M., Monahan, B., Pym, D. (2010). Semantics for structured systems modelling and simulation.
Collinson, M., Pym, D. (2010). Erratum: Algebra and logic for access control (Formal Aspects of Computing (2010) 22 (83-104)). Formal Aspects of Computing, 22 (3-4), 483-484. doi:10.1007/s00165-009-0107-x
Collinson, M., Pym, D. (2010). Algebra and logic for access control. Formal Aspects of Computing, 22 (2), 83-104. doi:10.1007/s00165-009-0107-x
Courtois, N.T., Jackson, K., Ware, D. (2010). Fault-Algebraic Attacks on Inner Rounds of DES.
Danezis, G., Aura, T., Chen, S., KIcIman, E. (2010). How to share your favourite search results while preserving privacy and quality. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6205 LNCS 273-290. doi:10.1007/978-3-642-14527-8_16
Danezis, G., Diaz, C., Syverson, P. (2010). Systems for anonymous communication. In Rosenberg, B. (Ed.), Handbook of Financial Cryptography and Security. Chapman and Hall/CRC.
Danezis, G., Díaz, C., Syverson, P.F. (2010). Anonymous Communication.. In Rosenberg, B. (Ed.), Handbook of Financial Cryptography and Security. (pp. 341-389). Chapman and Hall/CRC.
Danezis, G., Diaz, C., Troncoso, C., Laurie, B. (2010). Drac: An architecture for anonymous low-volume communications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6205 LNCS 202-219. doi:10.1007/978-3-642-14527-8_12
Danezis, G., Laurie, B. (2010). Private yet abuse resistant open publishing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5964 LNCS 222-243. doi:10.1007/978-3-642-17773-6_28
De Cristofaro, E., Kim, J. (2010). Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization. IEEE Security & Privacy, 8 18-24.
De Cristofaro, E., Kim, J., Tsudik, G. (2010). Linear-complexity private set intersection protocols secure in malicious model.
De Cristofaro, E., Tsudik, G. (2010). Practical private set intersection protocols with linear complexity.
Diaz, C., Murdoch, S.J., Troncoso, C. (2010). Impact of network topology on anonymity and overhead in low-latency anonymity networks.
Fremont, G., Grazzini, S., Sasse, A., BEEHAREE, A. (2010). The SafeTRIP Project: Improving Road Safety for Passenger Vehicles using 2-way Satellite Communications.
Groth, J. (2010). A Verifiable Secret Shuffle of Homomorphic Encryptions. Journal of Cryptology, 23 (4), 546-579. doi:10.1007/s00145-010-9067-9
Groth, J. (2010). Short Pairing-Based Non-interactive Zero-Knowledge Arguments..
Groth, J. (2010). Short Non-interactive Zero-Knowledge Proofs..
Groth, J., Kiayias, A., Lipmaa, H. (2010). Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Inglesant, P.G., Sasse, M.A. (2010). The true cost of unusable password policies: password use in the wild.
Inglesant, P., Sasse, M.A. (2010). Studying Password Use in the Wild: Practical Problems and Possible Solutions.
Jennett, C., Brostoff, S., Malheiros, M., Sasse, M.A. (2010). Investigating loan applicants' perceptions of alternative data items and the effect of incentives on disclosure.
Keval, H., Sasse, M.A. (2010). “ Not the Usual Suspects ” : A Study of Factors Reducing the Effectiveness of CCTV. Security Journal, 23 (2), 134-154.
Loesing, K., Murdoch, S.J., Dingledine, R. (2010). A Case Study on Measuring Statistical Data in the Tor Anonymity Network.
Meiklejohn, S. (2010). Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008.. ACM SIGACT News, 41 (4), 47. doi:10.1145/1907450.1907527
Meiklejohn, S., Erway, C.C., Küpçü, A., Hinkle, T., Lysyanskaya, A. (2010). ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash..
Meiklejohn, S., Shacham, H., Freeman, D.M. (2010). Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.. IACR Cryptology ePrint Archive, 2010 474.
Meiklejohn, S., Shacham, H., Freeman, D.M. (2010). Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures..
Migliardi, M., Stringhini, G. (2010). Travelling Information For Intrusion Prevention Systems..
Mont, M.C., Beresnevichiene, Y., Pym, D., Shiu, S. (2010). Economics of Identity and Access Management: Providing decision support for investments.
Murdoch, S.J. (2010). Destructive Activism: The Double-Edged Sword of Digital Tactics. In Joyce, M. (Ed.), Digital Activism Decoded. IDEA.
Murdoch, S.J., Anderson, R. (2010). Verified by visa and MasterCard SecureCode: Or, how not to design authentication.
Murdoch, S.J., Drimer, S., Anderson, R., Bond, M. (2010). Chip and PIN is broken.
Parkin, S., van Moorsel, A., Inglesant, P., Sasse, M.A. (2010). A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Potente, K., Schöppner, V., Sasse, M., Seibel, S. (2010). Defects during extrusion processes - Recognize, analyze, graduate and eradicate.
Rahaman, A., Sasse, M.A. (2010). A framework for the lived experience of identity. Identity in the Information Society, 3 (3), 605-638. doi:10.1007/s12394-010-0078-3
Rahaman, A., Sasse, M.A. (2010). Human-Centred Identity - From Rhetoric to Reality.
Riegelsberger, J., Sasse, M.A. (2010). Ignore These At Your Peril: Ten principles for trust design.
Ruskov, M., Seager, W., Sasse, M.A. (2010). Persuading Giants to be Wise:An Exploratory Study of Advice Sharing in Online Games.
Sasse, M.A. (2010). Not Seeing the Crime for the Cameras?. COMMUNICATIONS OF THE ACM, 53 (2), 22-25. doi:10.1145/1646353.1646363
Seager, W., Ruskov, M., Sasse, M.A., Fradinho, M. (2010). Eliciting and modelling expertise for serious game design.
Stringhini, G., Kruegel, C., Vigna, G. (2010). Detecting spammers on social networks. 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 1-9.
tags, A.C.S.-.C.A.C.L.B.C.F.R.F.I.D. (2010). Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.

2009

Auletta, V., Blundo, C., De Cristofaro, E. (2009). HTTP over Bluetooth: a J2ME experience. International Journal On Advances in Telecommunications, 1 57-66.
Beautement, A., Coles, R., Griffin, J., Ioannidis, C., Monahan, B., Pym, D., ...Wonham, M. (2009). Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
Beautement, A., Sasse, A. (2009). The economics of user effort in information security. Computer Fraud & Security, 2009 (10), 8-12. doi:10.1016/S1361-3723(09)70127-7
BEAUTEMENT, A., Sasse, M.A. (2009). The Compliance Budget: The economics of user effort in information security. Computer Fraud & Security, 2009 (10), 8-12. doi:10.1016/S1361-3723(09)70127-7
Bonneau, J., Anderson, J., Danezis, G. (2009). Prying data out of a social network. Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009, 249-254. doi:10.1109/ASONAM.2009.45
Chadwick, D., Inglesant, P., Shi, L.L., Sasse, M.A. (2009). Writing Security Policies in Natural Language. Public Service Review: Home Affairs, (17),
Collinson, M., Monahan, B., Pym, D. (2009). A Logical and Computational Theory of Located Resource. JOURNAL OF LOGIC AND COMPUTATION, 19 (6), 1207-1244. doi:10.1093/logcom/exp021
Collinson, M., Pym, D. (2009). Algebra and logic for resource-based systems modelling. Mathematical Structures in Computer Science, 19 (5), 959-1027. doi:10.1017/S0960129509990077
Courtois, N. (2009). The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime.. IACR Cryptology ePrint Archive, 2009 137.
Courtois, N., O'Neil, S., Quisquater, J.-.J. (2009). Practical Algebraic Attacks on the Hitag2 Stream Cipher..
Courtois, N.T. (2009). The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime.
Courtois, N.T., O'Neil, S., Quisquater, J.-.J. (2009). Practical Algebraic Attacks on the Hitag2 Stream Cipher in RFID Transponders.
Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G. (2009). The value of location information: A European-wide study. SECURITY PROTOCOLS, 5087 112-+.
Danezis, G. (2009). Inferring privacy policies for social networking services. Proceedings of the ACM Conference on Computer and Communications Security, 5-9. doi:10.1145/1654988.1654991
Danezis, G. (2009). The Least Privacy-Damaging Centralised Traffic Data Retention Architecture..
Danezis, G. (2009). The Least Privacy-Damaging Centralised Traffic Data Retention Architecture..
Danezis, G., Diaz, C., Käsper, E., Troncoso, C. (2009). The wisdom of crowds: Attacks and optimal constructions. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5789 LNCS 406-423. doi:10.1007/978-3-642-04444-1_25
Danezis, G., Goldberg, I. (2009). Sphinx: A compact and provably secure mix format. Proceedings - IEEE Symposium on Security and Privacy, 269-282. doi:10.1109/SP.2009.15
Danezis, G., Prateek, M. (2009). Sybilinfer: Detecting Sybil nodes using social networks.
Danezis, G., Troncoso, C. (2009). Vida: How to use bayesian inference to de-anonymize persistent communications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5672 LNCS 56-72. doi:10.1007/978-3-642-03168-7_4
De Cristofaro, E., Bohli, J.-.M., Westhoff, D. (2009). FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
De Cristofaro, E., Ding, X., Tsudik, G. (2009). Privacy-preserving querying in sensor networks.
De Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G. (2009). Privacy-preserving policy-based information transfer.
Drimer, S., Murdoch, S.J., Anderson, R. (2009). Failures of Tamper-Proofing in PIN Entry Devices. IEEE SECURITY & PRIVACY, 7 (6), 39-45.
Drimer, S., Murdoch, S.J., Anderson, R. (2009). Optimised to Fail: Card Readers for Online Banking.
Flechais, I., Sasse, M.A. (2009). Stakeholder Involvement, Motivation, Responsibility, Communication: How to Design Usable Security in e-Science. International Journal of Human-Computer Studies, 67 (4), 281-296.
Groth, J. (2009). Linear Algebra with Sub-linear Size Zero-Knowledge Arguments.
Ioannidis, C., Pym, D., Williams, J. (2009). Investments and trade-offs in the economics of information security.
Knoche, H., Sasse, M.A. (2009). The Big Picture on Small Screens Delivering Acceptable Video Quality in Mobile TV. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 5 (3), 20:1-20:27. doi:10.1145/1556134.1556137
Laqua, S., Sasse, M.A. (2009). Exploring Blog Spaces: A Study of Blog Reading Experiences using Dynamic Contextual Displays.
Laqua, S., Sasse, M.A., Gates, C., Greenspan, S. (2009). Making Sense of the Unknown: Knowledge Dissemination in Organizations.
Lindqvist, J., Aura, T., Danezis, G., Koponen, T., Myllyniemi, A., Mäki, J., Roe, M. (2009). Privacy-preserving 802.11 access-point discovery. Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09, 123-130. doi:10.1145/1514274.1514293
Migliardi, M., Stringhini, G. (2009). A Distributed model for intrusion detection and prevention.
Murdoch, S.J. (2009). Reliability of Chip & PIN evidence in banking disputes. Digital Evidence and Electronic Signature Law Review, 6 98-115. doi:10.14296/deeslr.v6i0.1862
Nicolas T Courtois, S.O.A.J.-.J.Q. (2009). Practical Algebraic Attacks on the Hitag2Stream Cipher.
Sasse, M.A., Johnson, G.I., Briggs, P. (2009). Introducing word processing to novice users: A study of 'procedural' and 'conceptual' approaches. Contemporary Ergonomics 1984-2008: Selected Papers and an Overview of the Ergonomics Society Annual Conference, 146-151.
Sasse, M.A., Karat, C.-.M., Maxion, R.A. (2009). Designing and evaluating usable security and privacy technology..
Troncoso, C., Danezis, G. (2009). The Bayesian traffic analysis of mix networks.

2008

Beautement, A., Sasse, M.A., Wonham, M. (2008). The compliance budget: managing security behaviour in organisations.
Berbain, C., Billet, O., Canteaut, A., Courtois, N., Debraize, B., Gilbert, H., ...Lauradoux, C. (2008). DECIM v2.
Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., ...Minier, M. (2008). Sosemanuk , a Fast Software-Oriented Stream Cipher.
Blundo, C., Cristofaro, E.D., Galdi, C., Persiano, G. (2008). Validating Orchestration of Web Services with BPEL and Aggregate Signatures.
Blundo, C., De Cristofaro, E., Del Sorbo, A., Galdi, C., Persiano, G. (2008). A distributed implementation of the certified information access service.
Chadwick, D.W., Shil, L.L., Sasse, M.A., Inglesant, P. (2008). Interface intelligence.
Coles, R., Griffin, J., Johnson, H., Monahan, B., Parkin, S.E., Pym, D., ...van Moorsel, A. (2008). Trust Economics Feasibility Study.
Collinson, M., Pym, D., Robinson, E. (2008). Bunched polymorphism. Mathematical Structures in Computer Science, 18 (6), 1091-1132. doi:10.1017/S0960129508007159
Courtois, N. (2008). Algebraic Attacks on MiFare Crypto-1, London Oyster Card, Dutch OV-Chipcard + Approx. 1 Billion Other RFID Chips.
Courtois, N., Debraize, B. (2008). Algebraic description and simultaneous linear approximations of addition in Snow 2.0..
Courtois, N., Nohl, K., O'Neil, S. (2008). Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards.
Courtois, N.T., Bard, G.V., Bogdanov, A. (2008). Periodic Ciphers with Small Blocks and Cryptanalysis of KeeLoq.
Courtois, N.T., Bard, G.V., Wagner, D. (2008). Algebraic and slide attacks on KeeLoq.
Courtois, N.T., Debraize, B. (2008). Specific S-box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts.
Courtois, N.T., Debraize, B. (2008). Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0..
Danezis, G., Sassaman, L. (2008). How to bypass two anonymity revocation schemes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5134 LNCS 187-201. doi:10.1007/978-3-540-70630-4_12
Danezis, G., Syverson, P. (2008). Bridging and fingerprinting: Epistemic attacks on route selection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5134 LNCS 151-166. doi:10.1007/978-3-540-70630-4_10
De Mulder, Y., Danezis, G., Batina, L., Preneel, B. (2008). Identification via location-profiling in GSM networks. Proceedings of the ACM Conference on Computer and Communications Security, 23-32. doi:10.1145/1456403.1456409
Drimer, S., Murdoch, S.J., Anderson, R. (2008). Thinking inside the box: System-level failures of tamper proofing.
Groth, J., Ishai, Y. (2008). Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle.
Groth, J., Sahai, A. (2008). Efficient Non-interactive Proof Systems for Bilinear Groups.
Inglesant, P., Sasse, M.A., Chadwick, D., Shi, L.L. (2008). Expressions of Expertness: The Virtuous Circle of Natural Language for Access Control Policy Specification.
Keval, H., Sasse, M.A. (2008). To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task..
Keval, H.U., Sasse, M.A. (2008). Can we ID from CCTV? Image quality in digital CCTV and face identification performance.
Knoche, H., Sasse, M.A. (2008). The sweet spot: How people trade off size and definition on mobile devices.
Knoche, H., Sasse, M.A. (2008). Getting the big picture on small screens: Quality of experience in mobile TV. In Ahmad, A.M.A., Ibrahim, I.K. (Eds.), Multimedia Transcoding in Mobile and Wireless Networks. (pp. 31-46). Hershey, PA, USA: IGI Global.
Murdoch, S.J. (2008). On the Origins of a Thesis. International Workshop on Security and Trust Management .
Murdoch, S.J., Anderson, R. (2008). Tools and Technology of Internet Filtering. In Diebert, R., Palfrey, J., Rohozinski, R., Zittrain, J. (Eds.), Access Denied: The Practice and Policy of Global Internet Filtering. MIT Press.
Murdoch, S.J., Watson, R.N.M. (2008). Metrics for security and performance in low-latency anonymity systems.
Oshlyansky, L., Cairns, P., Sasse, A., Harrison, C. (2008). The challenges faced by academia preparing students for industry: What we teach and what we do.
Sasse, M.A. (2008). Comment and analysis: Angela Sasse on the vulnerability of biometric security.
Zander, S., Murdoch, S.J. (2008). An Improved Clock-skew Measurement Technique for Revealing Hidden Services.

2007

Auletta, V., Blundo, C., De Cristofaro, E. (2007). A J2ME transparent middleware to support HTTP connections over Bluetooth.
Aura, T., Roe, M., Murdoch, S.J. (2007). Securing network location awareness with authenticated DHCP.
Ball, L.J., Sasse, M.A., Sas, C., Ormerod, T.C., Dix, A., Bagnall, P., McEwan, T. (2007). Preface: "HCI... but not as we know it". People and Computers XXI HCI.But Not as We Know It - Proceedings of HCI 2007: The 21st British HCI Group Annual Conference, 1
Blundo, C., De Cristofaro, E. (2007). A Bluetooth-based JXME infrastructure.
Boccolini, G., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., Muster, D., ...Pala, G. (2007). UNIC: A novel bi-directional satellite-based platform to provide TV-centric triple play services.
Boccolini, G., Luise, M., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., ...Sasse, M.A. (2007). A two-way interactive broadband satellite architecture to break the digital divide barrier.
Boccolini, G., Luise, M., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., ...Sasse, M.A. (2007). TV-Centric Technologies To Provide Remote Areas With Two-Way Satellite Broadband Access.
Bond, M. (2007). The dining freemasons (security protocols for secret societies).
Bond, M., Danezis, G. (2007). A pact with the devil. Proceedings New Security Paradigms Workshop, 77-82. doi:10.1145/1278940.1278952
Bond, M., Danezis, G. (2007). The dining freemasons (security protocols for secret societies). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4631 LNCS 258-265.
Bonhard, P., Sasse, A., Harries, C. (2007). “The Devil You Know Knows Best” – How Online Recommendations Can Benefit From Social Networking.
Borisov, N., Danezis, G., Mittal, P., Tabriz, P. (2007). Denial of service or denial of security?. Proceedings of the ACM Conference on Computer and Communications Security, 92-102. doi:10.1145/1315245.1315258
Chandran, N., Groth, J., Sahai, A. (2007). Ring Signatures of Sub-linear Size Without Random Oracles.
Clayton, R., Murdoch, S.J., Watson, R.N.M. (2007). Ignoring the Great Firewall of China. I/S: A Journal of Law and Policy for the Information Society, 3 (2), 271-296.
Collinson, M., Pym, D., Tofts, C. (2007). Erratum: Errata for Formal Aspects of Computing (2006) 18:495-517 and their consequences (Formal Aspects of Computing (2006) 18 (495-517)). Formal Aspects of Computing, 19 (4), 551-554. doi:10.1007/s00165-007-0047-2
Courtois, N. (2007). CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited.
Courtois, N., Bard, G.V., Jefferson, C. (2007). Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers.
Courtois, N., Bard, G.V., Wagner, D. (2007). Algebraic and Slide Attacks on KeeLoq.. IACR Cryptology ePrint Archive, 2007 62.
Courtois, N.T. (2007). How Fast can be Algebraic Attacks on Block Ciphers?.
Courtois, N.T., Bard, G.V. (2007). Algebraic cryptanalysis of the data encryption standard.
Danezis, G. (2007). Breaking four mix-related schemes based on Universal Re-encryption. International Journal of Information Security, 6 (6), 393-402. doi:10.1007/s10207-007-0033-y
Danezis, G., Clayton, R. (2007). Introducing Traffic Analysis. In Digital Privacy: Theory, Technologies and Practices. CRC Press.
Danezis, G., Diaz, C. (2007). Space-efficient private search with applications to rateless codes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4886 LNCS 148-162.
Danezis, G., Diaz, C., Faust, S., Kasper, E., Troncoso, C., Preneel, B. (2007). Efficient negative databases from cryptographic hash functions. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4779 LNCS 423-436.
Danezis, G., Diaz, C., Troncoso, C. (2007). Two-sided statistical disclosure attack. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4776 LNCS 30-44.
De Cristofaro, E. (2007). A secure and privacy-protecting aggregation scheme for sensor networks.
Degabriele, J.P., Pym, D. (2007). Economic aspects of a utility computing service.
Diaz, C., Troncoso, C., Danezis, G. (2007). Does additional information always reduce anonymity?. WPES'07 - Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, 72-75. doi:10.1145/1314333.1314347
Drimer, S., Murdoch, S.J., U.S.E.N.I.X. (2007). Keep your enemies close: Distance bounding against smartcard relay attacks.
Flechais, I., Mascolo, C., Sasse, M.A. (2007). Integrating security and usability into the requirements and design process. International Journal of Electronic Security and Digital Forensics, 1 (1), 12-26. doi:10.1504/IJESDF.2007.013589
Fuehrmann, C., Pym, D. (2007). On categorical models of classical logic and the Geometry of Interaction. MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 17 (5), 957-1027. doi:10.1017/S0960129507006287
Groth, J. (2007). Fully Anonymous Group Signatures Without Random Oracles.
Groth, J., Lu, S. (2007). Verifiable Shuffle of Large Size Ciphertexts.
Groth, J., Lu, S. (2007). A non-interactive shuffle with pairing based verifiability.
Groth, J., Ostrovsky, R. (2007). Cryptography in the Multi-string Model.
Inglesant, P., Sasse, M.A. (2007). Usability is the best policy: public policy and the lived experience of transport systems in London.
Knoche, H., McCarthy, J., Sasse, M.A. (2007). How low can you go? The effect of low resolutions on shot types in mobile TV. Multimedia Tools and Applications, 145-166. doi:10.1007/s11042-006-0076-5
Knoche, H., Papaleo, M., Sasse, M.A., Vanelli-Coralli, A. (2007). The Kindest Cut: Enhancing the User Experience of Mobile TV through Adequate Zooming.
Laqua, S., Bandara, S.U., Sasse, M.A. (2007). GazeSpace: eye gaze controlled content spaces.
Laqua, S., Ogbechie, N., Sasse, M.A. (2007). Contextualizing the Blogosphere: A Comparison ofTraditional and Novel User Interfaces for the Web.
McCusker, G., Pym, D. (2007). A games model of bunched implications.
Murdoch, S.J., Anderson, R. (2007). Shifting borders. Index on Censorship, 36 (4), 156-159. doi:10.1080/03064220701740525
Murdoch, S.J., Zielinski, P. (2007). Sampled traffic analysis by Internet-eXchange-level adversaries.
Pym, D., Taylor, R., Tofts, C. (2007). Public services innovation through technology.
Pym, D., Tofts, C. (2007). Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic. Electronic Notes in Theoretical Computer Science, 172 545-587. doi:10.1016/j.entcs.2007.02.020
Riegelsberger, J., Sasse, A., McCarthy, J.D. (2007). Trust in Mediated Interactions. In Joinson, A., McKenna, K.Y.A.P., T, R., U, D. (Eds.), Oxford Handbook of Internet Psychology. (pp. 53-69). Oxford: Oxford University Press.
Sasse, M.A. (2007). Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A user experience of biometric airport systems. IEEE SECURITY & PRIVACY, 7 78-81.
Seager, W., Knoche, H., Sasse, M.A. (2007). TV-centricity - Requirements gathering for triple play services..
Tabliz, P., Borisov, N., Danezis, G. (2007). Byzantine Attacks on Anonymity Systems. In Digital Privacy: Theory, Technologies and Practices. CRC Press.
Troncoso, C., Danezis, G., Kosta, E., Preneel, B. (2007). PriPAYD: Privacy friendly pay-as-you-drive insurance. WPES'07 - Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, 99-107. doi:10.1145/1314333.1314353

2006

(2006). Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers.
(2006). Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers.
Adida, B., Bond, M., Clulow, J., Lin, A., Murdoch, S.J., Anderson, R., Rivest, R. (2006). Phish and Chips: Traditional and New Recipes for Attacking EMV.
Anderson, R., Bond, M., Murdoch, S.J. (2006). Chip and spin. Computer Security Journal, 22 (2), 1-6.
Auletta, V., Blundo, C., De Cristofaro, E., Raimato, G. (2006). A Lightweight Framework for Web Services Invocation over Bluetooth.
Auletta, V., Blundo, C., De Cristofaro, E., Raimato, G. (2006). Performance evaluation of web services invocation over Bluetooth.
Bonhard, P., Harries, C., McCarthy, J.D., Sasse, M.A. (2006). Accounting for Taste: Using Profile Similarity to Improve Recommender Systems.
Bonhard, P., Sasse, M.A. (2006). 'Knowing me, knowing you' - using profiles and social networking to improve recommender systems. BT Technology Journal, 24 (3), 84-98.
Chadwick, D., Sasse, M.A. (2006). The Virtuous Circle of Expressing Authorisation Policies.
Clayton, R., Murdoch, S.J., Watson, R.N.M. (2006). Ignoring the Great Firewall of China..
Collinson, M., Pym, D. (2006). Bunching for Regions and Locations. Electronic Notes in Theoretical Computer Science, 158 (1), 171-197. doi:10.1016/j.entcs.2006.04.010
Collinson, M., Pym, D., Tofts, C. (2007). Erratum: Errata for Formal Aspects of Computing (2006) 18:495-517 and their consequences (Formal Aspects of Computing (2006) 18 (495-517)). Formal Aspects of Computing, 19 (4), 551-554. doi:10.1007/s00165-007-0047-2
Courtois, N. (2006). How Fast can be Algebraic Attacks on Block Ciphers ?.
Courtois, N., Bard, G.V. (2006). Algebraic Cryptanalysis of the Data Encryption Standard.. IACR Cryptology ePrint Archive, 2006 402.
Courtois, N., Goubin, L. (2006). Cryptology and Smart Cards: the Way to Go.
Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G. (2006). A study on the value of location privacy. Proceedings of the ACM Conference on Computer and Communications Security, 109-118. doi:10.1145/1179601.1179621
Danezis, G. (2006). Breaking four mix-related schemes based on universal re-encryption. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4176 LNCS 46-59.
Danezis, G., Clayton, R. (2006). Route Fingerprinting in Anonymous Communications..
Danezis, G., Clulow, J. (2006). Compulsion resistant anonymous communications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3727 LNCS 11-25.
Danezis, G., Golle, P. (2006). Privacy enhancing technologies: Foreword. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4258 LNCS
Danezis, G., Wittneben, B. (2006). The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications..
Führmann, C., Pym, D. (2006). Order-enriched categorical models of the classical sequent calculus. Journal of Pure and Applied Algebra, 204 (1), 21-78. doi:10.1016/j.jpaa.2005.03.016
Groth, J. (2006). Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures.
Groth, J., Ostrovsky, R., Sahai, A. (2006). Perfect Non-interactive Zero Knowledge for NP.
Groth, J., Ostrovsky, R., Sahai, A. (2006). Non-interactive Zaps and New Techniques for NIZK.
Knoche, H., McCarthy, J.D., Sasse, M.A. (2006). A close-up on Mobile TV: The effect of low resolutions on shot types.
Knoche, H., Sasse, M.A. (2006). Breaking the news on mobile TV: user requirements of a popular mobile content..
Knoche, H., Sasse, M.A., McCarthy, J.D. (2006). Reading the Fine Print: The Effect of Text Legibility on Perceived Video Quality in Mobile TV.
Laqua, S., Patel, G., Sasse, M.A. (2006). Personalised Focus-Metaphor Interfaces: An Eye Tracking Study on User Confusion.
Murdoch, S.J. (2006). Hot or not: Revealing hidden services by their clock skew.
Pym, D.J. (2006). Journal of Logic and Computation: Editorial. Journal of Logic and Computation, 16 (1), 1-3. doi:10.1093/logcom/exi069
Pym, D., Tofts, C. (2006). A calculus and logic of resources and processes. Formal Aspects of Computing, 18 (4), 495-517. doi:10.1007/s00165-006-0018-z
Sasse, A., Stewart, J., Aftelak, A., Nelissen, H., Ahn, J.Y., Steinhage, A., ...Pollington, D. (2006). User Requirements and Expectations. In Technologies for the Wireless Future: Wireless World Research Forum (WWRF). (pp. 15-58). .
Sasse, M.A., Knoche, H. (2006). Quality in Context - an ecological approach to assessing QoS for mobile TV.
Serjantov, A., Murdoch, S.J. (2006). Message Splitting Against the Partial Adversary..
Tafazolli, R., Uusitalo, M., Sasse, A., Arbanowski, S., Falconer, D., Fettweis, G., ...Sarma, A. (2006). Technologies for the Wireless Future: Wireless World Research Forum (WWRF). .
Wikström, D., Groth, J. (2006). An adaptively secure mix-net without erasures.

2005

(2005). The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES.
Bond, M., Clulow, J., Murdoch, S.J. (2005). Bank Card PIN Mailer Security. UK Cards Association.
Bond, M., Clulow, J., Murdoch, S.J. (2005). PIN Mailer Evaluation Testing. UK Cards Association.
Bonhard, P., Sasse, M.A. (2005). "I thought it was terrible and everyone else loved it" - A New Perspective for Effective Recommender System Design.
Brostoff, S., Sasse, M.A., Chadwick, D., Cunningham, J., Mbanaso, U., Otenko, S. (2005). "R-What?" Development of a Role-Based Access Control (RBAC) Policy-Writing Tool for e-Scientists. Software Practice and Experience, 35 (9), 835-856. doi:10.1002/spe.691
Camenisch, J., Groth, J. (2005). Group Signatures: Better Efficiency and New Theoretical Aspects.
Collinson, M., Pym, D., Robinson, E. (2005). On bunched polymorphism.
Courtois, N. (2005). Cryptanalysis of Sfinks.. IACR Cryptology ePrint Archive, 2005 243.
Courtois, N. (2005). Feistel Schemes and Bi-Linear Cryptanalysis.. IACR Cryptology ePrint Archive, 2005 251.
Courtois, N., Debraize, B., Garrido, E. (2005). On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions.. IACR Cryptology ePrint Archive, 2005 203.
Courtois, N., Goubin, L. (2005). An Algebraic Masking Method to Protect AES Against Power Attacks.. IACR Cryptology ePrint Archive, 2005 204.
Danezis, G. (2005). The traffic analysis of continuous-time mixes. Lecture Notes in Computer Science, 3424 35-50.
Danezis, G., Anderson, R. (2005). The economics of resisting censorship. IEEE Security and Privacy, 3 (1), 45-50. doi:10.1109/MSP.2005.29
Danezis, G., Díaz, C. (2005). Improving the Decoding Efficiency of Private Search..
Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R. (2005). Sybil-resistant DHT routing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3679 LNCS 305-318. doi:10.1007/11555827_18
Danezis, G., Lewis, S., Anderson, R.J. (2005). How Much Is Location Privacy Worth?.
Flechais, I., Riegelsberger, J., Sasse, M.A. (2005). Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems.
Galmiche, D., Méry, D., Pym, D. (2005). The semantics of BI and resource tableaux. Mathematical Structures in Computer Science, 15 (6), 1033-1088. doi:10.1017/S0960129505004858
Groth, J. (2005). Cryptography in Subgroups of Zn*.
Groth, J. (2005). Non-interactive Zero-Knowledge Arguments for Voting.
Inglesant, P., Sasse, M.A. (2005). Situating the transient user: overcomingchallenges in the design of e-governmentsystems.
Inglesant, P., Sasse, M.A. (2005). Usability is a policy issue: Minimising the "Hassle Factor" in mobile payment of the Central London Congestion Charge.
Knoche, H., McCarthy, J.D., Sasse, M.A. (2005). Can small be beautiful?: assessing image resolution requirements for mobile TV.
McCarthy, J.D., Riegelsberger, J., Sasse, M.A. (2005). Commercial uses of eye tracking.
Murdoch, S.J., Danezis, G. (2005). Low-cost traffic analysis of Tor. 2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 183-195. doi:10.1109/SP.2005.12
Murdoch, S.J., Lewis, S. (2005). Embedding covert channels into TCP/IP.
Pym, D. (2005). Journal of Logic and Computation: Editorial. Journal of Logic and Computation, 15 (6), 1-. doi:10.1093/logcom/exh054
Riegelsberger, J., Sasse, A., McCarthy, J.D. (2005). Rich media, poor judgement? A study of media effects on users' trust in expertise.
Riegelsberger, J., Sasse, M.A., McCarthy, J. (2005). Depending on the Kindness of Strangers? Trust Relationships in Ambient Societies..
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2005). The Mechanics of Trust: A Framework for Research and Design. International Journal of Human-Computer Studies, 62 (3), 381-422. doi:10.1016/j.ijhcs.2005.01.001
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2005). Do people trust their eyes more than ears?: media bias in detecting cues of expertise.
Sasse, M.A. (2005). Usability and Trust in Information Systems. In Mansell, R., Collins, B. (Eds.), Trust and Crime in Information Societies. (pp. 319-348). Cheltenham, UK: Edward Elgar.
Sasse, M.A., Flechais, I. (2005). Usable Security: Why Do We Need It? How Do We Get It?. In Cranor, L.F., Garfinkel, S. (Eds.), Security and Usability: Designing secure systems that people can use. (pp. 13-30). Sebastopol, US: O'Reilly.
Scholl, J., Parnes, P., McCarthy, J.D., Sasse, M.A. (2005). Designing a large-scale video chat application.

2004

(2004). The Inverse S-box and Two Paradoxes of Whitening.
Boardman, R., Sasse, M.A. (2004). “Stuff Goes into the Computer and Doesn’t Come Out”: A Cross-tool Study of Personal Information Management.
Bond, M., Cvrček, D., Murdoch, S.J. (2004). Unwrapping the Chrysalis. University of Cambridge Computer Laboratory.
Crisler, K., Turner, T., Aftelak, A., Visciola, M., Steinhage, A., Anneroth, M., ...Tscheligi, M. (2004). Considering the User in the Wireless World. IEEE Communications Magazine, 42 (9), 56-62. doi:10.1109/MCOM.2004.1336721
Danezis, G., Laurie, B. (2004). Minx: A simple and efficient anonymous packet format. WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 59-65.
Danezis, G., Serjantov, A. (2004). Statistical Disclosure or Intersection Attacks on Anonymity Systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3200 293-308.
Führmann, C., Pym, D. (2004). On the geometry of interaction for classical logic.
Groth, J. (2004). Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast.
Groth, J. (2004). Evaluating Security of Voting Schemes in the Universal Composability Framework.
Groth, J. (2004). Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems.
McCarthy, J.D., Sasse, M.A., Miras, D. (2004). Sharp or Smooth? Comparing the effects of quantization vs. frame rate for streamed video.
McCarthy, J.D., Sasse, M.A., Riegelsberger, J. (2004). The Geometry of Web Search.
Murdoch, S.J., Zielinski, P. (2004). Covert channels for collusion in online computer games.
Pym, D.J., O'Hearn, P.W., Yang, H. (2004). Possible worlds and resources: The semantics of BI. THEORETICAL COMPUTER SCIENCE, 315 (1), 257-305. doi:10.1016/j.tcs.2003.11.020
Schulzrinne, H., Dimitrova, N., Sasse, M.A., Moon, S.B., Lienhart, R. (Eds.), (2004). Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004. ACM.
Schulzrinne, H., Dimitrova, N., Sasse, M.A., Moon, S.B., Lienhart, R. (Eds.), (2004). MULTIMEDIA ’04: Proceedings of the 12th annual ACM international conference on Multimedia. New York, NY, USA: ACM.
Wilson, G.M., Sasse, M.A. (2004). From doing to being: getting closer to the user experience. Interacting with Computers, 16 (4), 697-705.

2003

(2003). Did Filiol Break AES ?.
(2003). What do DES S-boxes Say to Each Other ?.
Boardman, R., Spence, R., Sasse, M.A. (2003). Too many hierarchies? The daily struggle for control of the workspace.
Brostoff, S., Sasse, M.A. (2003). “Ten strikes and you're out”: Increasing the number of login attempts can improve password usability.
Clayton, R., Danezis, G. (2003). Chaffinch: Confidentiality in the face of legal threats. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2578 70-86.
Courtois, N., Meier, W. (2003). Algebraic Attacks on Stream Ciphers with Linear Feedback..
Damgard, I., Groth, J. (2003). Non-interactive and reusable non-malleable commitment schemes.
Damgård, I., Groth, J., Salomonsen, G. (2003). The Theory and Implementation of an Electronic Voting System. In Gritzalis, D. (Ed.), Secure Electronic Voting. (pp. 77-99). Kluwer Academic Publishers.
Danezis, G. (2003). Mix-networks with restricted routes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2760 1-17.
Danezis, G. (2003). Statistical Disclosure Attacks..
Danezis, G. (2003). Statistical disclosure attacks: Traffic confirmation in open environments. IFIP Advances in Information and Communication Technology, 122 421-426. doi:10.1007/978-0-387-35691-4
Danezis, G., Dingledine, R., Mathewson, N. (2003). Mixminion: Design of a type III anonymous remailer protocol. Proceedings - IEEE Symposium on Security and Privacy, 2003-January 2-15. doi:10.1109/SECPRI.2003.1199323
Danezis, G., Sassaman, L. (2003). Heartbeat Traffic to Counter (n-1) Attacks: Red-Green-Black Mixes. Proceedings of the ACM Workshop on Privacy in the Electronic Society, 89-93.
Flechais, I., Sasse, M.A., Hailes, S. (2003). Bringing Security Home: A Process for Developing Secure and Usable Systems.
Garau, M., Slater, M., Vinayagamoorthy, V., Brogni, A., Steed, A., Sasse, M.A. (2003). The impact of avatar realism and eye gaze control on perceived quality of communication in a shared immersive virtual environment..
Groth, J. (2003). A Verifiable Secret Shuffle of Homomorphic Encryptions.
Harland, J., Pym, D. (2003). Resource-distribution via Boolean Constraints. ACM Transactions on Computational Logic, 4 (1), 56-90. doi:10.1145/601775.601778
Mackenzie, D. (2003). A Game of Chance. New Scientist, 36-40.
McCarthy, J.D., Sasse, M.A., Riegelsberger, J. (2003). Could I have the Menu Please? An Eyetracking Study of Design Conventions.
Monthienvichienchai, R., Sasse, M.A. (2003). Learning from Others' Mistakes Through Computer Supported Vicarious Learning.
Pym, D.J. (2003). Editorial: The 'corner' on semantics. Journal of Logic and Computation, 13 (5), 633-638. doi:10.1093/logcom/13.5.633
Riegelsberger, J., Sasse, M.A. (2003). Designing E-Commerce Applications for Consumer Trust. In Petrovic, O., Ksela, M., Fallenbock, M., Kittl, C. (Eds.), Trust in the Network Economy. (pp. 97-110). Wien, New York: Springer.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). Shiny Happy People Building Trust? Photos on e-commerce Websites and Consumer Trust.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). Trust at First Sight? A Test of Users' Ability to Identify Trustworthy e-commerce Sites.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). The Researcher's Dilemma: Evaluating Trust in Computer Mediated Communications. International Journal of Human-Computer Studies, 58 (6), 759-781. doi:10.1016/S1071-5819(03)00042-9
Sasse, M.A. (2003). Computer Security:Anatomy of a Usability Disaster, and a Plan for Recovery.
Serjantov, A., Danezis, G. (2003). Towards an Information Theoretic Metric for Anonymity..

2002

Boardman, R., Sasse, M.A., Spence, R. (2002). Life Beyond the Mailbox: A Cross-Tool Perspective on Personal Information Management.
Bruneau, D., Sasse, M.A., McCarthy, J.D. (2002). The Eyes Never Lie: The Use of Eyetracking Data in HCI Research.
Courtois, N., Pieprzyk, J. (2002). Cryptanalysis of Block Ciphers with Overdefined Systems of Equations.. IACR Cryptology ePrint Archive, 2002 44.
Crisler, K., Anneroth, M., Sasse, M.A., Pulli, P. (2002). A User-Focused ReferenceModel for WirelessSystems Beyond 3G. Eindhoven .
Galmiche, D., Méry, D., Pym, D. (2002). Resource tableaux (extended abstract).
Ishtiaq, S., Pym, D.J. (2002). Kripke resource models of a dependently-typed, bunched λ-calculus. Journal of Logic and Computation, 12 (6), 1061-1104. doi:10.1093/logcom/12.6.1061
Monthivienchienchai, R., Sasse, M.A., Wheeldon, R. (2002). Educational Metadata: Friendly Fire?. In Hazemi, R., Hailes, S. (Eds.), Support for Authoring and Managing Web-based coursework:. (pp. 203-214). Springer.
Reigelberger, J., Sasse, M.A. (2002). Face It - Photos Don't Make a Web Site Trustworthy.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2002). Eye-catcher or blind spot?.
Sasse, M.A., Monthienivichienchai, R., Harris, C., Ismail, I., Wheeldon, R. (2002). The TACO Project. In Hazemi, R., Hailes, S. (Eds.), Support for Authoring and Managing Web-based coursework. (pp. 139-132). Springer.
Sasse, M.A., Monthienvichienchai, R. (2002). Computer Support for Vicarious Learning.
Sheeran, A., Sasse, M.A., Rimmer, J., Wakeman, I. (2002). How Web Browsers Shape User's Understanding of Networks. The Electronic Library, 20 (1), 35-42.
Terveen, L., Wixon, D., Comstoc, E., Sasse, M.A. (2002). Changing the World, Changing Ourselves.

2001

(2001). How web browsers shape users' understanding of networks.
(2001). Conducting audio and video quality assessment based on HCI evaluation principles. ERCIM News, 46 41-42.
(2001). On multivariate signature-only public key cryptosystems.
Adams, A., Sasse, M.A. (2001). Privacy in multimedia communications: protecting users, not just data.
Bouch, A., Sasse, M.A. (2001). Not all bits have equal value: Investigating users' network QoS requirements.
Bouch, A., Sasse, M.A. (2001). Designing QoS and charging mechanisms: he who pays the service shapes the design.
Bouch, A., Sasse, M.A. (2001). Why value is everything: A user centred approach to network Quality of Service and pricing.
Bouch, A., Wilson, G., Sasse, M.A. (2001). A 3-dimensional approach to measuring end-user quality of service.
Brostoff, S., Sasse, M.A. (2001). Safe and sound: a safety-critical design approach to security.
Clayton, R., Danezis, G., Kuhn, M.G. (2001). Real World Patterns of Failure in Anonymity Systems..
Garau, M., Slater, M., Bee, S., Sasse, M.A. (2001). The impact of eye gaze on communication using humanoid avatars.
Monthienvichienchai, R., Sasse, M.A., Wheeldon, R. (2001). There's trouble in paradise: problems with educational metadata encountered during the MALTED project.
Monthienvichienchai, R., Sasse, M.A., Wheeldon, R. (2001). Educational metadata - friend or foe?.
Pitt, J.V., Sasse, M.A. (2001). Privacy in collaborative multimedia environments.
Riegelsberger, J., Sasse, M.A. (2001). Trustbuilders and trustbusters: the role of trust cues in interfaces to e-commerce applications.
Sasse, M.A., Brostoff, S., Weirich, D. (2001). Transforming the "weakest link": a human-computer interaction approach to usable and effective security. BT Technology Journal, 19 122-131.
Weirich, D., Sasse, M.A. (2001). Persuasive password security.
Weirich, D., Sasse, M.A. (2001). Pretty good persuasion: A first step towards effective password security for the real world.
Wilson, G., Sasse, M.A. (2001). Straight from the heart: using physiological measurements in the evaluation of multimedia quality.

2000

Bouch, A., Sasse, M.A. (2000). The case for predictable media quality in networked multimedia applications.
Bouch, A., Sasse, M.A., DeMeer, H. (2000). Of packets and people: A user-centered approach to quality of service.
Brostoff, S., Sasse, M.A. (2000). Are passfaces more usable than passwords? A field trail investigation.
Rielgelsberger, J., Sasse, M.A. (2000). Trust me, I'm a .com. InterMedia, 28 (4), 23-27.
Rimmer, J., Wakeman, I., Sheeran, L., Sasse, M.A. (2000). Messages from a tangled web.
Sheeran, L., Sasse, M.A., Rimmer, J., Wakeman, I. (2000). Back to basics: is a better understanding of the Internet a precursor for effective use of the web?.
Watson, A., Sasse, M.A. (2000). Distance education via IP videoconferencing: results from a national pilot project.
Watson, A., Sasse, M.A. (2000). The good, the bad and the muffled: the impact of different degradations on internet speech.
Wilson, G.M., Sasse, M.A. (2000). The head or the heart? Measuring the impact of media quality.
Wilson, G.M., Sasse, M.A. (2000). Listen to Your Heart Rate: Counting the Cost of Media Quality.. In Paivia, A. (Ed.), Affective Interactions - Towards a New Generation of Computer Interfaces. (pp. 9-20). Springer-Verlag.
Wilson, G.M., Sasse, M.A. (2000). Investigating the impact of audio degradations on users: subjective vs objective assessment methods.
Wilson, G., Sasse, M.A. (2000). Do users always know what's good for them?Utilising physiological responses to assess media quality.

1999

Adams, A., Sasse, M.A. (1999). Users are not the enemy. Communications of the ACM, 42 (12), 40-46.
Adams, A., Sasse, M.A. (1999). Taming the wolf in sheep's clothing: privacy in multimedia communications.
Adams, A., Sasse, M.A. (1999). Privacy issues in ubiquitous multimedia environments: wake sleeping dogs or let them lie?.
Bouch, A., Sasse, M.A. (1999). Network quality of service – an integrated perspective.
Bouch, A., Sasse, M.A. (1999). Network Quality of Service: what do users need?.
Bouch, A., Sasse, M.A. (1999). It ain't what you charge it's the way that you do it: a users' perspective of network Quality of Service and pricing.
O'Hearn, P.W., Pym, D.J. (1999). The logic of bunched implications. BULLETIN OF SYMBOLIC LOGIC, 5 (2), 215-244. doi:10.2307/421090
Rimmer, J., Wakeman, I., Sheeran, L., Sasse, M.A. (1999). Examining users' repertoire of Internet applications.
Sasse, M.A., Johnson, C. (1999). Human-computer interaction INTERAGT '99 - IFIP TC.13 International Conference on Human-Computer Interaction, 30th August-3rd September 1999, Edinburgh, UK - Editors' preface: A perspective on failure.

1998

Hardman, V., Sasse, M.A., Kouvelas, I. (1998). Successful multiparty audio communication over the Internet. Communications of the ACM, 41 (5), 74-80. doi:10.1145/274946.274959
Hughes, J., Sasse, M.A. (1998). Design to Instruct: Lessons for Training ThroughInvolving Teachers in Design..
Sasse, M.A., Clark, L., Perkins, C. (1998). Piloting IP multicast conferencing over SuperJANET: the PIPVIC Project.
Sasse, M.A., Harris, C., Ismail, I., Monthienvichienchai, P. (1998). Support for authoring and managing web-based coursework: the TACO Project. In Hazemi, R., Hailes, S., Wilbur, S. (Eds.), The Digital University: Reinventing the Academy. (pp. 155-175). Berlin: Springer-Verlag.
Watson, A., Sasse, M.A. (1998). Measuring perceived quality of speech and video in multimedia conferencing applications.

1997

Adams, A., Sasse, M.A., Lunt, P. (1997). Making Passwords Secure and Usable.
Clark, L., Sasse, M.A. (1997). Conceptual Design Reconsidered: The Case of the Internet Session Directory Tool.
Hughes, J., Sasse, M.A. (1997). Internet Multimedia Conferencing - Results from the ReLaTe Project.
Kirstein, P.T., Bennett, R. (1997). Recent Activities in the MERCI Conferencing Project.
Perkins, C., Hardman, V., Kouvelas, I., Sasse, M.A. (1997). Multicast Audio: The Next Generation.
Watson, A., Sasse, M.A. (1997). Multimedia Conferencing via Multicast: Determining the Quality of Service Required by the End User.

1996

Sasse, A., Watson, A. (1996). Remote language teaching over SuperJANET: The ReLaTe project. IEE Colloquium (Digest), (148),
Sasse, A., Watson, A. (1996). Remote Language Teaching over SuperJANET: The ReLaTe project. IEE Colloquium (Digest), (148),
Sasse, M.A., Cunningham, J., Winder, R.L. (Eds.), (1996). People and Computers XI, Proceedings of HCI ’96. Springer.
Watson, A., Sasse, A. (1996). Assessing the usability and effectiveness of a remote language teaching system.
Watson, A., Sasse, M.A. (1996). Evaluating audio and video quality in low-cost multimedia conferencing systems. INTERACTING WITH COMPUTERS, 8 (3), 255-275. doi:10.1016/0953-5438(96)01032-6

1995

Hardman, V., Sasse, M.A., Handley, M., Watson, A. (1995). Reliable audio for use over the Internet.
Kirstein, P., Handley, M., Sasse, A., Clayman, S. (1995). Recent activities in the MICE conferencing project.

1994

Bilting, U., Sasse, M.A., Schulz, C.-.D., Turletti, T. (1994). International Research Seminars through Multimedia Conferencing: Experiences from the MICE project..
Handley, M.J., Kirstein, P.T., Angela Sasse, M. (1994). Multimedia integrated conferencing for European researchers: experiences form the MICE project. IEE Colloquium (Digest), (59),
Sasse, M.A., Bilting, U., Schulz, C.D., Turletti, T. (1994). Remote Seminars through Multimedia Conferencing:Experiences from the MICE project.
Sasse, M.A., Handley, M.J. (1994). Workstation-based multimedia conferencing: experiences from the MICE project.
SASSE, M.A., HANDLEY, M.J., ISMAIL, N.M. (1994). Coping with Complexity and Interference - Design Issues in Multimedia Conferencing Systems.

1993

Handley, M., Kirstein, P.T., Sasse, M.A. (1993). Multimedia Integrated Conferencing for European Researchers (MICE): Piloting Activities and the Conference Management and Multiplexing Centre..
Sasse, M.A., Handley, M.J., Chuang, S.C. (1993). Support for Collaborative Authoring via Email - The MESSIE Environment.

1991

Sasse, M.A. (1991). How to t(r)ap user's mental models..

This page was generated automatically.