Publications

Publications

Publications

2018

Andriotis, P., Sasse, M.A., Stringhini, G. (2018). Studying Users’ Adaptation to Android’s Run-time Fine-grained Access Control System. Journal of Information Security and Applications,
Azouvi, S., Hicks, A., Murdoch, S.J. (2018). Incentives in Security Protocols.
Bano, S., Richter, P., Javed, M., Sundaresan, S., Durumeric, Z., Murdoch, S., ...Paxson, V. (2018). Scanning the Internet for Liveness. ACM SIGCOMM Computer Communication Review, doi:10.1145/3213232.3213234
Bernard-Jones, E., Onaolapo, J., Stringhini, G. (2018). BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts.
Bootle, J., Groth, J. (2018). Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials.
Cerulli, A., De Cristofaro, E., Soriente, C. (2018). Nothing Refreshes Like a RePSI: Reactive Private Set Intersection.
Demjaha, A., Spring, J.M., Becker, I., Parkin, S., Sasse, M.A. (2018). Metaphors Considered Harmful? An Exploratory Study of the Effectiveness of Functional Metaphors for End-to-End Encryption.
Docherty, S., Pym, D. (2018). Modular Tableaux Calculi for Separation Theories.
Docherty, S., Pym, D. (2018). A Stone-type Duality Theorem for Separation Logic Via its Underlying Bunched Logics. Electronic Notes in Theoretical Computer Science, 336 101-118. doi:10.1016/j.entcs.2018.03.018
Edwards, M., Suarez-Tangil, G., Peersman, C., Stringhini, G., Rashid, A., Whitty, M. (2018). The Geography of Online Dating Fraud.
Groth, J., Kohlweiss, M., Maller, M., Meiklejohn, S., Miers, I. (2018). Updatable and Universal Common Reference Strings with Applications to zk-SNARKs.. .
Ibosiola, D., Steer, B., Garcia-Recuero, A., Stringhini, G., Uhlig, S., Tyson, G. (2018). Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers.
Ioannou, A., Blackburn, J., Stringhini, G., De Cristofaro, E., Kourtellis, N., Sirivianos, M. (2018). From risk factors to detection and intervention: a practical proposal for future work on cyberbullying. Behaviour and Information Technology, doi:10.1080/0144929X.2018.1432688
Meiklejohn, S., Mercer, R. (2018). Möbius: Trustless Tumbling for Transaction Privacy.. PoPETs, 2018 105-121. doi:10.1515/popets-2018-0015
Perez, B., Musolesi, M., Stringhini, G. (2018). You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information.
Pym, D., Spring, J., O'Hearn, P. (2018). Why Separation Logic Works. Philosophy and Technology,
Pyrgelis, A., Troncoso, C., De Cristofaro, E. (2018). Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Zannettou, S., Blackburn, J., Sirivianos, M., Stringhini, G. (2018). Understanding Web Archiving Services and Their (Mis)Use on Social Media.
Zannettou, S., Bradlyn, B., Cristofaro, E.D., Kwak, H., Sirivianos, M., Stringhini, G., Blackburn, J. (2018). What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber..
Zannettou, S., Bradlyn, B., De Cristofaro, E., Sirivianos, M., Stringhini, G., Kwak, H., Blackburn, J. (2018). What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?.

2017

Abu-Salma, R., Krol, K., Parkin, S., Koh, V., Kwan, K., Mahboob, J., ...Sasse, M.A. (2017). The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram.
Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A., Smith, M. (2017). Obstacles to the Adoption of Secure Communication Tools.
Acs, G., Melis, L., Castelluccia, C., Cristofaro, E.D. (2017). Differentially Private Mixture of Generative Neural Networks.
Al-Bassam, M., Sonnino, A., Bano, S., Hrycyszyn, D., Danezis, G. (2017). Chainspace: A Sharded Smart Contracts Platform. .
Andriotis, P., Li, S., Spyridopoulos, T., Stringhini, G. (2017). A comparative study of android users’ privacy preferences under the runtime permission model.
Azouvi, S., Al-Bassam, M., Meiklejohn, S. (2017). Who am i? Secure identity registration on distributed ledgers.
Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., Danezis, G. (2017). Consensus in the Age of Blockchains. .
Becker, I.F., Hutchings, A., Abu-Salma, R., Anderson, R., Bohm, N., Murdoch, S., ...Stringhini, G. (2017). International comparison of bank fraud reimbursement: customer perceptions and contractual terms. Journal of Cybersecurity, doi:10.1093/cybsec/tyx011
Becker, I.F., Parkin, S., Sasse, M.A. (2017). Finding Security Champions in Blends of Organisational Culture.
Becker, I., Parkin, S., Sasse, M.A. (2017). Measuring the Success of Context-Aware Security Behaviour Surveys.
Blake, D., Caulfield, T., Ioannidis, C., Tonks, I. (2017). New Evidence on Mutual Fund Performance: A Comparison of Alternative Bootstrap Methods. JOURNAL OF FINANCIAL AND QUANTITATIVE ANALYSIS, 52 (3), 1279-1299. doi:10.1017/S0022109017000229
Bootle, J., Cerulli, A., Groth, J., Hajiabadi, M., Jakobsen, S. (2017). Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability.
Caulfield, T., Ioannidis, C., Pym, D. (2017). Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption.
Caulfield, T., Ioannidis, C., Pym, D. (2017). The U.S. Vulnerabilities Equities Process: An Economic Perspective.
Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E.D., Stringhini, G., Vakali, A. (2017). Mean Birds: Detecting Aggression and Bullying on Twitter..
Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E.D., Stringhini, G., Vakali, A. (2017). Detecting Aggressors and Bullies on Twitter..
Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E.D., Stringhini, G., Vakali, A. (2017). Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying..
Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E.D., Stringhini, G., Vakali, A. (2017). Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter..
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A. (2017). Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying.
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A. (2017). Hate is not binary: Studying abusive behavior of #GamerGate on Twitter.
Collinson, M., McDonald, K., Dochertyand, S., Pym, D. (2017). A substructural logic for layered graphs (vol 24, pg 953, 2014). JOURNAL OF LOGIC AND COMPUTATION, 27 (1), 413-414. doi:10.1093/logcom/exv019
Dahlqvist, F., Pym, D. (2017). Coalgebraic completeness-via-canonicity for distributive substructural logics. JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 93 1-22. doi:10.1016/j.jlamp.2017.07.002
Docherty, S., Pym, D. (2017). Intuitionistic layered graph logic.
Dodier-Lazaro, S., Abu-Salma, R., Becker, I., Sasse, M.A. (2017). From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design.
Dodier-Lazaro, S., Becker, I., Krinke, J., Sasse, M. (2017). No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones. London: UCL Computer Science.
Dodier-Lazaro, S., Becker, I., Krinke, J., Sasse, M.A. (2017). "No Good Reason to Remove Features" Expert Users Value Useful Apps over Secure Ones.
Egele,, M., Stringhini, G., Kruegel, C., Vigna, G. (2017). Towards Detecting Compromised Accounts on Social Networks. IEEE Transactions on Dependable and Secure Computing, doi:10.1109/TDSC.2015.2479616
Egele, M., Stringhini, G., Kruegel, C., Vigna, G. (2017). Towards Detecting Compromised Accounts on Social Networks.. IEEE Trans. Dependable Sec. Comput., 14 447-460. doi:10.1109/TDSC.2015.2479616
Farooqi, S., Ikram, M., De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M.A., ...Zaffar, F. (2017). Characterizing Key Stakeholders in an Online Black-Hat Marketplace. PROCEEDINGS OF THE 2017 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 17-27. doi:10.1109/ECRIME.2017.7945050
Galmiche, D., Kimmel, P., Pym, D. (2017). A substructural epistemic resource logic.
Ghadafi, E., Groth, J. (2017). Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups.
Groth, J., Maller, M. (2017). Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs.
Haslebacher, A., Onaolapo, J., Stringhini, G. (2017). All Your Cards Are Belong To Us: Understanding Online Carding Forums.
Hayes, J., Danezis, G. (2017). Generating Steganographic Images via Adversarial Training.
Hayes, J., Danezis, G. (2017). Machine Learning as an Adversarial Service: Learning Black-Box Adversarial Examples. .
Hayes, J., Melis, L., Danezis, G., Cristofaro, E.D. (2017). LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks. .
Hine, G., Onaolapo, J., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Samaras, R., ...Blackburn, J. (2017). Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and its Effects on the Web.
Ioannou, A., Blackburn, J., Stringhini, G., De Christofaro, E., Kourtellis, N., Sirivianos, M., Zaphiris, P. (2017). From Risk Factors to Detection and Intervention: A Metareview and Practical Proposal for Research on Cyberbullying.
Kolodenker, E., Koch, W., Stringhini, G., Egele, M. (2017). PayBreak: Defense against cryptographic ransomware.
Kulynych, B., Isaakidis, M., Troncoso, C., Danezis, G. (2017). ClaimChain: Decentralized Public Key Infrastructure. .
Mariconti, E., Onaolapo, J., Ahmad, S.S., Nikiforou, N., Egele, M., Nikiforakis, N., Stringhini, G. (2017). What's in a Name?: Understanding Profile Name Reuse on Twitter..
Mariconti, E., Onaolapo, J., Ross, G., Stringhini, G. (2017). The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
Mariconti, E., Onwuzurike, L., Andriotis, P., Cristofaro, E.D., Ross, G.J., Stringhini, G. (2017). MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models..
Mariconti, E., Onwuzurike, L., Andriotis, P., De Cristofaro, E., Ross, G., Stringhini, G. (2017). MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
Mauriés, J.R.P., Krol, K., Parkin, S., Abu-Salma, R., Sasse, M.A. (2017). Dead on Arrival: Recovering from Fatal Flaws in Email Encryption Tools.
Mavroudis, V., Cerulli, A., Svenda, P., Cvrcek, D., Klinec, D., Danezis, G. (2017). A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Mba, G., Onaolapo, J., Stringhini, G., Cavallaro, L. (2017). Flipping 419 Scams: Targeting the Weak and the Vulnerable.
Mba, G., Onaolapo, J., Stringhini, G., Cavallaro, L. (2017). Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable..
Meiklejohn, S., Mercer, R. (2017). Möbius: Trustless Tumbling for Transaction Privacy.. .
Murdoch, S.J. (2017). Method, system and apparatus using forward-secure cryptography for passcode verification.
Murdoch, S.J., Becker, I., Abu-Salma, R., Anderson, R., Bohm, N., Hutchings, A., ...Stringhini, G. (2017). Are payment card contracts unfair? (Short paper).
Nilizadeh, S., Labreche, F., Sedighian, A., Zand, A., Fernandez, J.M., Kruegel, C., ...Vigna, G. (2017). POISED: Spotting Twitter Spam Off the Beaten Paths..
Onwuzurike, L., Ikram, M., Farooqi, S., De Cristofaro, E., Friedman, A., Jourjon, G., ...Shafiq, M.A. (2017). Measuring, Characterizing, and Detecting Facebook Like Farms. ACM Transactions on Privacy and Security,
Piotrowska, A.M., Hayes, J., Elahi, T., Meiser, S., Danezis, G. (2017). The Loopix Anonymity System.
Piotrowska, A.M., Hayes, J., Gelernter, N., Danezis, G., Herzberg, A. (2017). AnNotify: A Private Notification Service.
Pym, D., Anderson, G. (2017). A Substructural Modal Logic of Utility. Journal of Logic and Computation, doi:10.1093/logcom/exw030
Pym, D., Gheyas, I., Baldwin, A., Ioannidis, C., Williams, J. (2017). Contagion in cybersecurity attacks. Journal of the Operational Research Society, doi:10.1057/jors.2016.37
Pyrgelis, A., Troncoso, C., De Cristofaro, E. (2017). What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.
Sajadmanesh, S., Jafarzadeh, S., Ossia, S.A., Rabiee, H.R., Haddadi, H., Mejova, Y., ...Stringhini, G. (2017). Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web..
Serra, J., Leontiadis, I., Spathis, D., Blackburn, J., Stringhini, G., Vakali, A. (2017). Class-based Prediction Errors to Detect Hate Speech with Out-of-vocabulary Words.
Spring, J.M., P.y.m., Moore, T. (2017). Practicing a Science of Security: A Philosophy of Science Perspective.
Stringhini, G., Shen, Y., Han, Y., Zhang, X. (2017). Marmite: Spreading Malicious File Reputation Through Download Graphs.
Toledo, R.R., Danezis, G., Echizen, I. (2017). Mix-ORAM: Using Delegated Shuffles.
Troncoso, C., Danezis, G., Isaakidis, M., Halpin, H. (2017). Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments.
Wang, P., Krinke, J., Lu, K., Li, G., Dodier-Lazaro, S. (2017). How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel.
Weissbacher, M., Mariconti, E., Suarez-Tangil, G., Stringhini, G., Robertson, W., Kirda, E. (2017). Ex-Ray: Detection of History-Leaking Browser Extensions.
Whitty, M., Edwards, M., Levi, M., Peersman, C., Rashid, A., Sasse, M.A., ...Stringhini, G. (2017). Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).
Zannettou, S., Caulfield, T., Cristofaro, E.D., Kourtellis, N., Leontiadis, I., Sirivianos, M., ...Blackburn, J. (2017). The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources.. CoRR, abs/1705.06947
Zannettou, S., Caulfield, T., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Sirivianos, M., ...Blackburn, J. (2017). The web centipede: Understanding how web communities influence each other through the lens of mainstream and alternative news sources.

2016

(2016). Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers.
Anderson, G., Pym, D. (2016). A calculus and logic of bunched resources and processes. THEORETICAL COMPUTER SCIENCE, 614 63-96. doi:10.1016/j.tcs.2015.11.035
Andriotis, P., Sasse, M.A., Stringhini, G. (2016). Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model.
ao, L.T.A.N.B., Christin, N., Danezis, G. (2016). A Public Comment on NCCoE’s White Paper on Privacy-Enhancing Identity Brokers. CoRR, abs/1611.02968
Asghar, H., Melis, L., Soldani, C., De Cristofaro, E., Kaafar, M.A., Mathy, L. (2016). SplitBox: Toward Efficient Private Network Function Virtualization.
Baqer, K., Huang, D.Y., McCoy, D., Weaver, N. (2016). Stressing Out: Bitcoin "Stress Testing"..
Beautement, A., Becker, I., Parkin, S., Krol, K., Sasse, M.A. (2016). Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
Becker, I., Hutchings, A., Abu-Salma, R., Anderson, R., Bohm, N., Murdoch, S.J., ...Stringhini, G. (2016). International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
Becker, I., Parkin, S., Sasse, M.A. (2016). Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations.
Bonneau, J. (2016). Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus..
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J. (2016). Foundations of Fully Dynamic Group Signatures..
Bootle, J., Cerulli, A., Chaidos, P., Groth, J., Petit, C. (2016). Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting. In Fischlin, M., Coron, J.-.S. (Eds.), (pp. 327-357). Springer.
Caputo, D.D., Pfleeger, S.L., Sasse, M.A., Ammann, P., Offutt, J., Deng, L. (2016). Barriers to Usable Security? Three Organizational Case Studies. IEEE Security and Privacy, 14 (5), 22-32. doi:10.1109/MSP.2016.95
Caulfield, T., Ioannidis, C., Pym, D. (2016). On the adoption of privacy-enhancing technologies.
Cerulli, A. (2016). Efficient Zero-Knowledge Proof Systems. In Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures. Springer.
Chase, M., Maller, M., Meiklejohn, S. (2016). Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions.
Chase, M., Maller, M., Meiklejohn, S. (2016). Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions.. IACR Cryptology ePrint Archive, 2016 840.
Chase, M., Meiklejohn, S. (2016). Transparency overlays and applications.
Chase, M., Meiklejohn, S. (2016). Transparency Overlays and Applications.. IACR Cryptology ePrint Archive, 2016 915.
Courtault, J.R., Galmiche, D., Pym, D. (2016). A logic of separating modalities. Theoretical Computer Science, 637 30-58. doi:10.1016/j.tcs.2016.04.040
Courtois, N. (2016). Features or Bugs: The Seven Sins of Current Bitcoin. In Tasca, P., Perrony, N., Pelizzon, L., Aste, T. (Eds.), Banking beyond Banks and Money A Guide to Banking Services in the Twenty-First Century. (pp. 97-120). Berlin: Springer.
Courtois, N. (2016). An Improved Differential Attack on Full GOST.
Courtois, N., Mourouzis, T. (2016). Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers.
Courtois, N., Song, G., Castellucci, R. (2016). Speed Optimizations in Bitcoin Key Recovery Attacks.
Courtois, N., Song, G., Papapanagiotakis-Bousy, I., Sepehrdad, P. (2016). Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon.
Danezis, G., Katzenbeisser, S., Peters, C., Preneel, B. (2016). Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032). Dagstuhl Reports, 6 99-107. doi:10.4230/DagRep.6.1.99
Danezis, G., Meiklejohn, S. (2016). Centrally Banked Cryptocurrencies.
De Cristofaro, E., Liang, K., Zhang, Y. (2016). Privacy-Preserving Genetic Relatedness Test.
Delmolino, K., Arnett, M., Kosba, A.E., Miller, A., Shi, E. (2016). Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab..
Docherty, S., Pym, D. (2016). Intuitionistic layered graph logic.
Elahi, T., Doucette, J.A., Hosseini, H., Murdoch, S.J., Goldberg, I. (2016). A Framework for the Game-theoretic Analysis of Censorship Resistance. Proceedings on Privacy Enhancing Technologies, 2016 (4), 83. doi:10.1515/popets-2016-0030
Escala, A., Guasch, S., Herranz, J., Morillo, P. (2016). Universal Cast-as-Intended Verifiability..
Glass, B., Jenkinson, G., Liu, Y., Sasse, M.A., Stajano, F. (2016). The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions.
Groth, J. (2016). On the Size of Pairing-Based Non-interactive Arguments.
Gupta, D., Mood, B., Feigenbaum, J., Butler, K., Traynor, P. (2016). Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Haddadi, H., Nithyanand, R., Khattak, S., Javed, M., Vallina-Rodriguez, N., Falahrastegar, M., ...Murdoch, S.J. (2016). The Adblocking Tug-of-War. USENIX ;login:,
Haslebacher, A., Onaolapo, J., Stringhini, G. (2016). All Your Cards Are Belong To Us: Understanding Online Carding Forums.. CoRR, abs/1607.00117
Hayes, J., Troncoso, C., Danezis, G. (2016). TASP: Towards Anonymity Sets that Persist.
Hine, G.E., Onaolapo, J., Cristofaro, E.D., Kourtellis, N., Leontiadis, I., Samaras, R., ...Blackburn, J. (2016). A Longitudinal Measurement Study of 4chan's Politically Incorrect Forum and its Effect on the Web.. CoRR, abs/1610.03452
Ioannidis, C., Pym, D., Williams, J. (2016). Is Public Co-Ordination of Investment in Information Security Desirable?. Journal of Information Security, 07 (02), 60-80. doi:10.4236/jis.2016.72005
Isaakidis, M., Danezis, G. (2016). Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay Services. HotPETs 2016 .
Isaakidis, M., Halpin, H., Danezis, G. (2016). UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs.
Khattak, S., Elahi, T., Simon, L., Swanson, C.M., Murdoch, S.J., Goldberg, I. (2016). SoK: Making Sense of Censorship Resistance Systems. Proceedings on Privacy Enhancing Technologies, 2016 (4), 37-61. doi:10.1515/popets-2016-0028
Khattak, S., Fifield, D., Afroz, S., Javed, M., Sundaresan, S., Paxson, V., ...McCoy, D. (2016). Do You See What I See? Differential Treatment of Anonymous Users.
Kostkova, P., Brewer, H., de Lusignan, S., Fottrell, E., Goldacre, B., Hart, G., ...McKendry, R. (2016). Who Owns The Data? Open Data for health care. Fontiers in Public Health, 4 (7), doi:10.3389/fpubh.2016.00007
Krol, K., Parkin, S., Sasse, M.A. (2016). “I don’t like putting my face on the Internet!”: An acceptance study of face biometrics as a CAPTCHA replacement.
Krol, K., Parkin, S., Sasse, M.A. (2016). Better the Devil You Know: A User Study of Two CAPTCHAs and a Possible Replacement.
Krol, K., Rahman, M.S., Parkin, S., De Cristofaro, E., Vasserman, E. (2016). An Exploratory Study of User Perceptions of Payment Methods in the UK and the US.
Krol, K., Spring, J.M., Parkin, S., Sasse, M.A. (2016). Towards robust experimental design for user studies in security and privacy.
Lazarov, M., Onaolapo, J., Stringhini, G. (2016). Honey Sheets: What Happens to Leaked Google Spreadsheets?.
Mariconti, E., Onaolapo, J., Ahmad, S.S., Nikiforou, N., Egele, M., Nikiforakis, M., Stringhini, G. (2016). Why Allowing Profile Name Reuse Is A Bad Idea. European Workshop on System Security,
Mariconti, E., Onaolapo, J., Ross, G., Stringhini, G. (2016). What's your major threat? On the differences between the network behavior of targeted and commodity malware.
Meiklejohn, S., Clark, J. (2016). BITCOIN 2016: Third workshop on bitcoin and blockchain research.
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., Mccoy, D., Voelker, G.M., Savage, S. (2016). A Fistful of Bitcoins: Characterizing Payments among Men with No Names. COMMUNICATIONS OF THE ACM, 59 (4), 86-93.
Melis, L., Asghar, H., De Cristofaro, E., Kaafar, M.A. (2016). Private Processing of Outsourced Network Functions: Feasibility and Constructions.
Melis, L., Danezis, G., Cristofaro, E.D. (2016). Efficient Private Statistics with Succinct Sketches.
Murdoch, S.J. (2016). Insecure by Design: Protocols for Encrypted Phone Calls. COMPUTER, 49 (3), 25-33. doi:10.1109/MC.2016.70
Nithyanand, R., Khattak, S., Javed, M., Vallina-Rodriguez, N., Falahrastegar, M., Powles, J.E., ...Murdoch, S.J. (2016). Adblocking and Counter Blocking: A Slice of the Arms Race.
Onaolapo, J., Mariconti, E., Stringhini, G. (2016). What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild.
Onwuruzirike, L., De Cristofaro, E. (2016). Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption. ISOC.
Onwuzurike, L., De Cristofaro, E. (2016). POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps.
Parkin, S., Krol, K., Becker, I., Sasse, M.A. (2016). Applying Cognitive Control Modes to Identify Security Fatigue Hotspots.
Piotrowska, A.M., Hayes, J., Gelernter, N., Danezis, G., Herzberg, A. (2016). AnoNotify: A Private Notification Service. IACR Cryptology ePrint Archive, 2016 466.
Pyrgelis, A., De Cristofaro, E., Ross, G. (2016). Privacy-Friendly Mobility Analytics using Aggregate Location Data.
Rial, A., Danezis, G., Kohlweiss, M. (2016). Privacy-preserving smart metering revisited. International Journal of Information Security, 1-31. doi:10.1007/s10207-016-0355-8
Ryan, P.Y.A., Rønne, P.B., Iovino, V. (2016). Selene: Voting with Transparent Verifiability and Coercion-Mitigation..
Sänger, J., Hänsch, N., Glass, B., Benenson, Z., Landwirth, R., Sasse, M.A. (2016). Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces.
Sasse, M.A., Smith, M. (2016). The Security-Usability Tradeoff Myth [Guest editors' introduction]. IEEE Security and Privacy, 14 (5), 11-13. doi:10.1109/MSP.2016.102
Sasse, M.A., Smith, M. (2016). The Security-Usability Tradeoff Myth. IEEE SECURITY & PRIVACY, 14 (5), 11-13. doi:10.1109/MSP.2016.102
Sasse, M.A., Smith, M., Herley, C., Lipford, H., Vaniea, K. (2016). Debunking Security-Usability Tradeoff Myths. IEEE SECURITY & PRIVACY, 14 (5), 33-39.
Sombatruang, N., Sasse, M.A., Baddeley, M. (2016). Why do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions.
Susil, P., Sepehrdad, P., Vaudenay, S., Courtois, N. (2016). On selection of samples in algebraic attacks and a new technique to find hidden low degree equations. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 15 (1), 51-65. doi:10.1007/s10207-015-0295-8
Toledo, R.R., Danezis, G., Goldberg, I. (2016). Lower-Cost \(\in\)-Private Information Retrieval. PoPETs, 2016 184-201. doi:10.1515/popets-2016-0035
Toledo, R.R., Danezis, G., Goldberg, I. (2016). Lower-Cost epsilon-Private Information Retrieval. CoRR, abs/1604.00223
Watson, R.N.M., Norton, R.M., Woodruff, J., Moore, S.W., Neumann, P.G., Anderson, J., ...Roe, M. (2016). FAST PROTECTION-DOMAIN CROSSING IN THE CHERI CAPABILITY-SYSTEM ARCHITECTURE. IEEE MICRO, 36 (5), 38-49.

2015

(2015). Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings.
Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M. (2015). Structure-Preserving Signatures and Commitments to Group Elements. Journal of Cryptology, 29 (2), 363-421. doi:10.1007/s00145-014-9196-7
Abu-Salma, R., Sasse, M.A., Bonneau, J., Smith, M. (2015). POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.
ao, L.T.A.N.B., Christin, N., Danezis, G., a.n.o.n.y.m.o.u.s. (2015). Toward Mending Two Nation-Scale Brokered Identification Systems. PoPETs, 2015 135-155.
Ayday, E., De Cristofaro, E., Hubaux, J.-.P., Tsudik, G. (2015). Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?. COMPUTER, 48 (2), 58-66. doi:10.1109/MC.2015.59
Beris, O., Beautement, A., Sasse, M.A. (2015). Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the Risk Perceptions and Emotions That Drive Security Behaviors.
Bond, M., Choudary, M.O., Murdoch, S.J., Skorobogatov, S., Anderson, R. (2015). Be Prepared: The EMV Pre-play Attack. IEEE SECURITY & PRIVACY,
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., Petit, C. (2015). Short Accountable Ring Signatures Based on DDH.
Borisov, N., Danezis, G., Goldberg, I. (2015). DP5: A Private Presence Service. PoPETs, 2015 4-24.
Caulfield, T., Fielder, A. (2015). Optimizing time allocation for network defence. Journal of Cybersecurity, tyv002. doi:10.1093/cybsec/tyv002
Chaidos, P., Groth, J. (2015). Making Sigma-protocols Non-interactive without Random Oracles.
Chen, C., Asoni, D.E., Barrera, D., Danezis, G., Perrig, A. (2015). HORNET: High-speed Onion Routing at the Network Layer.
Courtois, N. (2015). On Multiple Symmetric Fixed Points in GOST. CRYPTOLOGIA, 39 (4), 322-334. doi:10.1080/01611194.2014.988362
Courtois, N., Emirdag, P., Valsorda, F. (2015). Privilege Escalation and Combination Attacks on HD Wallet Systems in Bitcoin.
Courtois, N., Emirdag, P., Wang, Z. (2015). On Detection of Bitcoin Mining Redirection Attacks.
Courtois, N., Mourouzis, T. (2015). Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants. In Rassias, M., Darras, N. (Eds.), Computation, Cryptography, and Network Security. (pp. 351-380). Berlin: Springer.
Courtois, N., Mourouzis, T., Grocholewska-Czurylo, A., Quisquater, J.J. (2015). On Optimal Size in Truncated Differential Attacks.
Courtois, N.T., Mourouzis, T., Misztal, M., Quisquater, J.-.J., Song, G. (2015). Can GOST Be Made Secure Against Differential Cryptanalysis?. CRYPTOLOGIA, 39 (2), 145-156. doi:10.1080/01611194.2014.915266
Dahlqvist, F., Pym, D. (2015). Completeness via Canonicity for Distributive Substructural Logics: A Coalgebraic Perspective.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.-.H., Métayer, D.L., Tirtea, R., Schiffner, S. (2015). Privacy and Data Protection by Design - from policy to engineering. .
Danezis, G., Meiklejohn, S. (2015). Centrally Banked Cryptocurrencies. CoRR, abs/1505.06895
Danezis, G., Meiklejohn, S. (2015). Centrally Banked Cryptocurrencies. IACR Cryptology ePrint Archive, 2015 502.
De Cristofaro, E., Malin, B. (Eds.), (2015). Proceedings of the 2nd International Workshop on Genome Privacy and Security (GenoPri'15). .
Desmedt, Y., Erotokritou, S. (2015). Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols. E-VOTING AND IDENTITY, VOTEID 2015, 9269 110-126. doi:10.1007/978-3-319-22270-7_7
Desmedt, Y., Erotokritou, S. (2015). Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols..
Desmedt, Y., Morozov, K. (2015). Parity Check Based Redistribution of Secret Shares.
Dodier-Lazaro, S. (2015). Appropriation and Principled Security.
Freudiger, J., De Cristofaro, E., Brito, A. (2015). Controlled Data Sharing for Collaborative Predictive Blacklisting.
Gentry, C., Groth, J., Ishai, Y., Peikert, C., Sahai, A., Smith, A. (2015). Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs. JOURNAL OF CRYPTOLOGY, 28 (4), 820-843. doi:10.1007/s00145-014-9184-y
Gollmann, D., Herley, C., Koenig, V., Pieters, W., Sasse, M.A. (2015). Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports, 4 1-28. doi:10.4230/DagRep.4.12.1
Groth, J. (2015). Efficient Fully Structure-Preserving Signatures for Large Messages.
Groth, J., Kohlweiss, M. (2015). One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin.
Hao, S., Borgolte, K., Nikiforakis, N., Stringhini, G., Egele, M., Eubanks, M., ...Vigna, G. (2015). Drops For Stuff: An Analysis of Reshipping Mule Scams.
Hayes, J., Danezis, G. (2015). Guard Sets for Onion Routing. PoPETs, 2015 65-80.
Hayes, J., Danezis, G. (2015). Better open-world website fingerprinting. CoRR, abs/1509.00789
Huang, J.M., Stringhini, G., Yong, P. (2015). Quit Playing Games With My Heart: Understanding Online Dating Scams.
Kapadia, A., Murdoch, S.J. (Eds.), (2015). Proceedings on Privacy Enhancing Technologies. 2015 (1),
Kapadia, A., Murdoch, S.J. (Eds.), (2015). Proceedings on Privacy Enhancing Technologies. 2015 (2),
Kirlappos, I., Parkin, S., Sasse, M.A. (2015). "Shadow security" as a tool for the learning organization. ACM SIGCAS Computers and Society, 45 (1), 29-37. doi:10.1145/2738210.2738216
Kirlappos, I., Sasse, M.A. (2015). Fixing Security Together: Leveraging trust relationships to improve security in organizations.
Krol, K., Papanicolaou, C., Vernitski, A., Sasse, M.A. (2015). “Too taxing on the mind!” Authentication grids are not for everyone.
Krol, K., Philippou, E., De Cristofaro, E., Sasse, M.A. (2015). "They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking.
Lewko, A., Meiklejohn, S. (2015). A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 9020 377-398. doi:10.1007/978-3-662-46447-2_17
Meiklejohn, S., Orlandi, C. (2015). Privacy-Enhancing Overlays in Bitcoin.
Melis, L., Danezis, G., Cristofaro, E.D. (2015). Efficient Private Statistics with Succinct Sketches. CoRR, abs/1508.06110
Nagy, M., Bui, T., De Cristofaro, E., Asokan, N., Ott, J., Sadeghi, A.R. (2015). How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
Onwuzurike, L., De Cristofaro, E. (2015). Danger is my middle name: Experimenting with SSL Vulnerabilities in Android Apps.
Parkin, S., Driss, S., Krol, K., Sasse, M.A. (2015). Assessing the User Experience of Password Reset Policies in a University.
Pym, D., Anderson, G. (2015). Combinators for Trust Domains in Security Modelling. Journal of Logic and Computation, doi:10.1093/logcom/exv030
Pym, D., Collinson, M., McDonald, K. (2015). Layered Graph Logic as an Assertion Language for Access Control Policy Models. Journal of Logic and Computation, doi:10.1093/logcom/exv020
Sasse, A. (2015). Scaring and Bullying People into Security Won't Work. IEEE SECURITY & PRIVACY, 13 (3), 80-83. doi:10.1109/MSP.2015.65
Stringhini, G. (2015). On The Threats To Cloud-based Online Service Users (And What We Can Do About Them).
Stringhini, G., Mourlanne, P., Jacob, G., Egele, M., Kruegel, C., Vigna, G. (2015). EvilCohort: Detecting Communities of Malicious Accounts on Online Services.
Stringhini, G., Thonnard, O. (2015). That Ain't You: Blocking Spearphishing Through Behavioral Modelling.
Watson, R.N.M., Woodruff, J., Neumann, P.G., Moore, S.W., Anderson, J., Chisnall, D., ...Laurie, B. (2015). CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.

2014

Abe, M., Groth, J., Ohkubo, M., Tango, T. (2014). Converting cryptographic schemes from symmetric to asymmetric bilinear groups.
Abe, M., Groth, J., Ohkubo, M., Tibouchi, M. (2014). Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
Abe, M., Groth, J., Ohkubo, M., Tibouchi, M. (2014). Structure-preserving signatures from type II pairings.
Anderson, R., Murdoch, S.J. (2014). EMV: Why Payment Systems Fail. COMMUNICATIONS OF THE ACM, 57 (6), 24-28. doi:10.1145/2602321
Angela Sasse, M. (2014). "Technology should be smarter than this!": A vision for overcoming the great authentication fatigue. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8425 LNCS 33-36. doi:10.1007/978-3-319-06811-4_7
Asghar, H.J., Desmedt, Y., Pieprzyk, J., Steinfeld, R. (2014). A subexponential construction of graph coloring for multiparty computation.. J. Mathematical Cryptology, 8 363-403.
Asghar, H.J., Desmedt, Y., Pieprzyk, J., Steinfeld, R. (2014). A Subexponential Construction of Graph Coloring for Multiparty Computation.. IACR Cryptology ePrint Archive, 2014 66.
Bada, M., Sasse, A. (2014). Why do they fail to change behaviour?. .
Beato, F., De Cristofaro, E., Rasmussen, K.B. (2014). Undetectable Communication: The Online Social Networks Case.
Bellare, M., Meiklejohn, S., Thomson, S. (2014). Key-versatile signatures and applications: RKA, KDM and joint Enc/Sig. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 8441 496-513.
Bilogrevic, I., Freudiger, J., De Cristofaro, E., Uzun, E. (2014). What’s the Gist? Privacy-Preserving Aggregation of User Profiles.
Blake, D., Caulfield, T., Ioannidis, C., Tonks, I. (2014). Improved inference in the evaluation of mutual fund performance using panel bootstrap methods. JOURNAL OF ECONOMETRICS, 183 (2), 202-210. doi:10.1016/j.jeconom.2014.05.010
Blundo, C., De Cristofaro, E., Gasti, P. (2014). EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity. Journal of Computer Security, 22 355-381.
Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R. (2014). Chip and skim: Cloning EMV cards with the pre-play attack.
Calderon, T., Meiklejohn, S., Shacham, H., Waters, B. (2014). Rethinking verifiably encrypted signatures: A gap in functionality and potential solutions. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8366 LNCS 349-366. doi:10.1007/978-3-319-04852-9_18
Caulfield, T., Pym, D., Williams, J. (2014). Compositional Security Modelling: Structure, Economics, and Behaviour.
Chaabane, A., Chen, T., Cunche, M., De Cristofaro, E., Friedman, A., Kafaar, M.-.A. (2014). Censorship in the Wild: Analyzing Internet Filtering in Syria.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2014). Malleable Signatures: New Definitions and Delegatable Anonymous Credentials.
Chase, M., Meiklejohn, S. (2014). Deja Q: Using Dual Systems to Revisit q-Type Assumptions.. IACR Cryptology ePrint Archive, 2014 570.
Chase, M., Meiklejohn, S. (2014). Déjà Q: Using dual systems to revisit q-type assumptions. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 8441 622-639.
Chase, M., Meiklejohn, S., Zaverucha, G.M. (2014). Algebraic MACs and keyed-verification anonymous credentials. Proceedings of the ACM Conference on Computer and Communications Security, 1205-1216. doi:10.1145/2660267.2660328
Collinson, M., McDonald, K., Pym, D. (2014). A substructural logic for layered graphs. JOURNAL OF LOGIC AND COMPUTATION, 24 (4), 953-988. doi:10.1093/logcom/exu002
Courtois, N. (2014). Cryptanalysis of Two GOST Variants With 128-bit Keys. Cryptologia, 38 (4), 348-361. doi:10.1080/01611194.2014.915706
Courtois, N., Emirdag, P., Nagy, D. (2014). Could Bitcoin Transactions Be 100x Faster?.
Courtois, N., Grajek, M., Naik, R. (2014). Optimizing SHA256 in Bitcoin Mining.
Courtois, N., Mourouzis, T., Song, G., Sepehrdad, P., Susil, P. (2014). Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon.
Danezis, G., Cristofaro, E.D. (2014). Fast and Private Genomic Testing for Disease Susceptibility.
Danezis, G., De Cristofaro, E. (2014). Simpler protocols for privacy-preserving disease susceptibility testing.
Danezis, G., Fournet, C., Groth, J., Kohlweiss, M. (2014). Square Span Programs with Applications to Succinct NIZK Arguments. IACR Cryptology ePrint Archive, 2014 718.
Danezis, G., Fournet, C., Groth, J., Kohlweiss, M. (2014). Square Span Programs with Applications to Succinct NIZK Arguments.
De Cristofaro, E. (2014). An Exploratory Ethnographic Study of Issues and Concerns with Whole Genome Sequencing.
De Cristofaro, E. (2014). Genomic Privacy and the Rise of a New Research Community. IEEE Security & Privacy, 12 80-83.
De Cristofaro, E., Du, H., Freudiger, J., Norcie, G. (2014). A Comparative Usability Study of Two-Factor Authentication.
De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M.A., Shafiq, M.Z. (2014). Paying for Likes? Understanding Facebook Like Fraud Using Honeypots.
De Cristofaro, E., Murdoch, S.J. (2014). Preface. .
De Cristofaro, E., Murdoch, S.J. (2014). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8555 LNCS doi:10.1007/978-3-319-08506-7
De Cristofaro, E., Murdoch, S.J. (2014). Privacy Enhancing Technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings. Springer.
Desmedt, Y. (2014). On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions.
Desmedt, Y. (2014). On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion).
Desmedt, Y., Iovino, V., Persiano, G., Visconti, I. (2014). Controlled Homomorphic Encryption: Definition and Construction.. IACR Cryptology ePrint Archive, 2014 989.
Elahi, T., Danezis, G., Goldberg, I. (2014). PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, 1068-1079. doi:10.1145/2660267.2660280
Escala, A., Groth, J. (2014). Fine-Tuning Groth-Sahai Proofs.
Groth, J., Ostrovsky, R. (2014). Cryptography in the Multi-string Model. Journal of Cryptology, 27 (3), 506-543. doi:10.1007/s00145-013-9152-y
Herbert, S.J., Murdoch, S.J., Punskaya, E. (2014). Optimising node selection probabilities in multi-hop M/D/1 queuing networks to reduce latency of Tor. ELECTRONICS LETTERS, 50 (17), 1205-1206. doi:10.1049/el.2014.2136
Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D., ...Levchenko, K. (2014). Botcoin: Monetizing Stolen Cycles..
Iedemska, J., Stringhini, G., Kemmerer, R., Kruegel, C., Vigna, G. (2014). The tricks of the trade: What makes spam campaigns successful?.
Ioannidis, C., Williams, J., Pym, D., Gheyas, I. (2014). Resilience in Information Stewardship.
Jennett, C., Sasse, M.A. (2014). Is sending shops ads by Bluetooth just a bit creepy?. [Digital scholarly resource]. Retrieved from: http://theconversation.com/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy-32643
Kirlappos, I., Parkin, S., Sasse, M.A. (2014). Learning from 'Shadow Security': Why understanding noncompliant behaviors provides the basis for effective security.
Kirlappos, I., Sasse, M.A. (2014). What Usable Security Really Means: Trusting and Engaging Users.
Line, M.B., Zand, A., Stringhini, G., Kemmerer, R. (2014). Targeted attacks against industrial control systems: Is the power industry prepared?. Proceedings of the ACM Conference on Computer and Communications Security, 2014-November (November), 13-22. doi:10.1145/2667190.2667192
Morton, A.J., Sasse, M.A. (2014). Desperately Seeking Assurances: Segmenting Users by their Information-Seeking Preferences::A Q Methodology Study of Users’ Ranking of Privacy, Security & Trust Cues.
Murdoch, S.J. (2014). Quantifying and measuring anonymity.
Murdoch, S.J., Anderson, R. (2014). Security Protocols and Evidence: Where Many Payment Systems Fail.
Murphy, R.R., Danezis, G., Horrocks, M.H., Jackson, S.E., Klenerman, D. (2014). Bayesian inference of accurate population sizes and FRET efficiencies from single diffusing biomolecules.. ANALYTICAL CHEMISTRY, 86 (17), 8603-8612. doi:10.1021/ac501188r
Nikiforakis, N., Maggi, F., Stringhini, G., Rafique, M.Z., Joosen, W., Kruegel, C., ...Zanero, S. (2014). Stranger danger: Exploring the ecosystem of ad-based URL shortening services. WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web, 51-61. doi:10.1145/2566486.2567983
Oberg, J., Meiklejohn, S., Sherwood, T., Kastner, R. (2014). Leveraging gate-level properties to identify hardware timing channels. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 33 (9), 1288-1301. doi:10.1109/TCAD.2014.2331332
Pfleeger, S.L., Sasse, M.A., Furnham, A. (2014). From Weakest Link to Security Hero: Transforming Staff Security Behavior. Journal of Homeland Security and Emergency Management, 11 (4), 489-510. doi:10.1515/jhsem-2014-0035
Porter, C., Letier, E., Sasse, M.A. (2014). Building a National E-Service using Sentire: Experience report on the use of Sentire: A Volere-based requirements framework driven by calibrated personas and simulated user feedback.
Pym, D., Ritter, E., Robinson, E. (2014). A proof-theoretic analysis of the classical propositional matrix method. Journal of Logic and Computation, 24 (1), 283-301. doi:10.1093/logcom/exs045
Ruskov, M., Ekblom, P., Sasse, M.A. (2014). Towards a Simulation of Information Security Behaviour in Organisations. In Blackwell, C., Zhu, H. (Eds.), Cyberpatterns. (pp. 177-184). Springer International Publishing.
Sasse, M.A., Kirlappos, I. (2014). Design for Trusted and Trustworthy Services: Why We Must Do Better.. In Trust, Computing, and Society. (pp. 229-249). Cambridge University Press.
Sasse, M.A., Palmer, C.C. (2014). Protecting you. IEEE Security and Privacy, 12 (1), 11-13. doi:10.1109/MSP.2014.11
Sasse, M.A., Palmer, C.C., Jakobsson, M., Consolvo, S., Wash, R., Camp, L.J. (2014). Helping you protect you. IEEE Security and Privacy, 12 (1), 39-42. doi:10.1109/MSP.2014.4
Sasse, M.A., Steves, M., Krol, K., Chisnell, D. (2014). The Great Authentication Fatigue – And How to Overcome It.
Sharad, K., Danezis, G. (2014). An Automated Social Graph De-anonymization Technique. CoRR, abs/1408.1276
Sharad, K., Danezis, G. (2014). An Automated Social Graph De-anonymization Technique. Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014, 47-58. doi:10.1145/2665943.2665960
Steves, M., Chisnell, D., Sasse, A., Krol, K., Theofanos, M., Wald, H. (2014). Report: Authentication Diary Study. National Institute of Standards and Technology .
Stringhini, G., Hohlfeldy, O., Kruegel, C., Vigna, G. (2014). The harvester, the botmaster, and the spammer: On the relations between the different actors in the spam landscape.
Wang, Y., Desmedt, Y. (2014). Efficient Secret Sharing Schemes Achieving Optimal Information Rate.
Watson, R.N.M., Chisnall, D., Davis, B., Koszek, W., Moore, S.W., Murdoch, S.J., ...Woodruff, J. (2014). Capability Hardware Enhanced RISC Instructions: CHERI User's Guide. University of Cambridge Computer Laboratory.
Watson, R.N.M., Chisnall, D., Davis, B., Koszek, W., Moore, S.W., Murdoch, S.J., ...Woodruff, J. (2014). Bluespec Extensible RISC Implementation: BERI Software Reference. University of Cambridge Computer Laboratory.
Watson, R.N.M., Neumann, P.G., Woodruff, J., Anderson, J., Chisnall, D., Davis, B., ...Roe, M. (2014). Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture. University of Cambridge Computer Laboratory.
Watson, R.N.M., Woodruff, J., Chisnall, D., Davis, B., Koszek, W., Markettos, A.T., ...Norton, R. (2014). Bluespec Extensible RISC Implementation: BERI Hardware Reference. University of Cambridge Computer Laboratory.
Zarras, A., Kapravelos, A., Stringhini, G., Holz, T., Kruegel, C., Vigna, G. (2014). The dark alleys of madison avenue: Understanding malicious advertisements. Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, 373-379. doi:10.1145/2663716.2663719

2013

Acquisti, A., Krontiris, I., Langheinrich, M., Sasse, M.A. (2013). 'My Life, Shared’-Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). Dagstuhl Reports, 3 (7), 74-107. doi:10.4230/DagRep.3.7.74
Adham, M., Azodi, A., Desmedt, Y., Karaolis, I. (2013). How to Attack Two-Factor Authentication Internet Banking..
Ashenden, D., Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy?. COMPUTERS & SECURITY, 39 396-405. doi:10.1016/j.cose.2013.09.004
Barthe, G., Danezis, G., Gregoire, B., Kunz, C., Zanella-Beguelin, S. (2013). Verified computational differential privacy with applications to smart metering. 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, 287-301. doi:10.1109/CSF.2013.26
Bartsch, S., Sasse, M.A. (2013). How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization..
Bayer, S., Groth, J. (2013). Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists.
Bellare, M., Meiklejohn, S., Thomson, S. (2013). Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig.. IACR Cryptology ePrint Archive, 2013 326.
Brostoff, S., Jennett, C., Malheiros, M., Sasse, M.A. (2013). Federated Identity to Access e-Government Services - Are Citizens Ready for This?.
Cardenas, A., Chow, R., De Cristofaro, E. (2013). Data Handling in the Smart Grid: Do We Know Enough?. In Critical Infrastructure Protection VII. (pp. 21-32). Springer Berlin Heidelberg.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2013). Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.. IACR Cryptology ePrint Archive, 2013 179.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2013). Verifiable Elections That Scale for Free..
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2013). Succinct Malleable NIZKs and an Application to Compact Shuffles..
Courtois, N. (2013). Security Evaluation of Russian GOST Cipher.
Courtois, N. (2013). Propagation of Truncated Differentials in GOST.
Courtois, N., Mourouzis, T. (2013). Advanced Differential Cryptanalysis and GOST Cipher.
Courtois, N., Mourouzis, T. (2013). Enhanced Truncated Differential Cryptanalysis of GOST.
Courtois, N.T. (2013). CRYPTANALYSIS OF GOST IN THE MULTIPLE-KEY SCENARIO. Tatra Mountains Mathematical Publications, 57 (1), doi:10.2478/tmmp-2013-0035
Courtois, N.T. (2013). Low-Complexity Key Recovery Attacks on GOST Block Cipher. Cryptologia, 37 (1), 1-10. doi:10.1080/01611194.2012.739587
Courtois, N.T., Hulme, D., Hussain, K., Gawinecki, J.A., Grajek, M. (2013). On Bad Randomness and Cloning of Contactless Payment and Building Smart Cards.
Danezis, G., Fournet, C., Kohlweiss, M., Parno, B. (2013). Pinocchio coin: Building Zerocoin from a succinct pairing-based proof system. PETShop’13, Proceedings of the 2013 ACM Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, 27-30. doi:10.1145/2517872.2517878
Danezis, G., Fournet, C., Kohlweiss, M., Zanella-Béguelin, S. (2013). Smart meter aggregation via secret-sharing. SEGS’13, Proceedings of the 2013 ACM Workshop on Smart Energy Grid Security, Co-located with CCS 2013, November 8, 2013, Berlin, Germany, 75-80. doi:10.1145/2516930.2516944
Danezis, G., Troncoso, C. (2013). You cannot hide for long: De-anonymization of real-world dynamic behaviour. Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany, November 4, 2013, 49-60. doi:10.1145/2517840.2517846
De Cristofaro, E., Faber, S., Tsudik, G. (2013). Secure Genomic Testing with Size-and Position-Hiding Private Substring Matching.
De Cristofaro, E., Manulis, M., Poettering, B. (2013). Private discovery of common social contacts. International journal of information security, 12 49-65.
De Cristofaro, E., Soriente, C. (2013). Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI). IEEE Transactions on Information Forensics and Security (TIFS), 8 (8),
De Cristofaro, E., Soriente, C. (2013). Participatory privacy: Enabling privacy in participatory sensing. IEEE Network, 27 32-36.
Dodier-Lazaro, S., Avril, Q., Gouranton, V. (2013). SODA: A Scalability-Oriented Distributed & Anticipative Model for Collision Detection in Physically-based Simulations.
Duncan, B., Pym, D.J., Whittington, M. (2013). Developing a conceptual framework for cloud security assurance.
Egele, M., Stringhini, G., Krügel, C., Vigna, G. (2013). COMPA: Detecting Compromised Accounts on Social Networks..
Fournet, C., Kohlweiss, M., Danezis, G., Luo, Z. (2013). ZQL: A Compiler for Privacy-Preserving Data Processing.
Huth, M., Kuo, J.H.P., Sasse, A., Kirlappos, I. (2013). Towards usable generation and enforcement of trust evidence from programmers' intent.
Huth, M., Kuo, J.H., Sasse, M.A., Kirlappos, I. (2013). Towards Usable Generation and Enforcement of Trust Evidence from Programmers’ Intent.
Kirlappos, I., Beautement, A., Sasse, M.A. (2013). "Comply or die" is dead: Long live security-aware principal agents.
Lewko, A.B., Meiklejohn, S. (2013). A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups.. IACR Cryptology ePrint Archive, 2013 300.
Maggi, F., Frossi, A., Zanero, S., Stringhini, G., Stone-Gross, B., Kruegel, C., Vigna, G. (2013). Two years of short URLs internet measurement: Security threats and countermeasures. WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web, 861-871.
Mahmood, S., Desmedt, Y. (2013). Two new economic models for privacy.. ACM SIGMETRICS Performance Evaluation Review, 40 (4), 84. doi:10.1145/2479942.2479953
Malheiros, M., Brostoff, S., Jennett, C., Sasse, M.A. (2013). Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.. In Böhme, R. (Ed.), The Economics of Information Security and Privacy. (pp. 237-261). Springer.
Malheiros, M., Preibusch, S., Sasse, M.A. (2013). “Fairly Truthful”: The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure.
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S. (2013). A fistful of bitcoins: Characterizing payments among men with no names. Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, 127-139. doi:10.1145/2504730.2504747
Meiklejohn, S., Shacham, H. (2013). New Trapdoor Projection Maps for Composite-Order Bilinear Groups.. IACR Cryptology ePrint Archive, 2013 657.
Mourouzis, T. (2013). Propagation of Truncated Differentials in GOST.
Murdoch, S.J. (2013). No magic formula. Index on Censorship, 42 (2), 136-139. doi:10.1177/0306422013491368
Murdoch, S.J., Roberts, H. (2013). Internet Censorship and Control Introduction. IEEE INTERNET COMPUTING, 17 (3), 6-9. doi:10.1109/MIC.2013.51
Nagy, M., De Cristofaro, E., Dmitrienko, A., Asokan, N., Sadeghi, A.-.R. (2013). Do I know you?–Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Norcie, G., De Cristofaro, E., Bellotti, V. (2013). Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles.
Oberg, J., Meiklejohn, S., Sherwood, T., Kastner, R. (2013). A practical testing framework for isolating hardware timing channels..
Ruskov, M., Ekblom, P., Sasse, A. (2013). In Search for the Right Measure: Assessing Types of Developed Knowledge While Using a Gamified Web Toolkit.
Sasse, M.A., Krol, K. (2013). Usable biometrics for an ageing population. In Fairhurst, M. (Ed.), Age factors in biometric processing. (pp. 303-320). Stevenage, UK: IET.
Stringhini, G., Kruegel, C., Vigna, G. (2013). Shady paths: Leveraging surfing crowds to detect malicious web pages. Proceedings of the ACM Conference on Computer and Communications Security, 133-144. doi:10.1145/2508859.2516682
Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y. (2013). Follow the green: Growth and dynamics in Twitter follower markets. Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, 163-176. doi:10.1145/2504730.2504731
Watson, R.N.M., Murdoch, S.J., Gudka, K., Anderson, J., Neumann, P.G., Laurie, B. (2013). Towards a theory of application compartmentalisation.

2012

(2012). the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012.
(2012). Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers.
(2012). Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers.
Anderson, R.J., Bond, M., Choudary, O., Murdoch, S.J., Stajano, F. (2012). Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV..
Arnell, S., Beautement, A., Inglesant, P., Monahan, B., Pym, D., Sasse, M.A. (2012). Systematic Decision Making in Security Management Modelling Password Usage and Support.
Bartsch, S., Sasse, M.A. (2012). Guiding decisions on authorization policies: a participatory approach to decision support.
Bartsch, S., Sasse, M.A. (2012). How users bypass access control and why: the impact of authorization problems on individuals and the organization. London, UK: UCL Department of Computer Science.
Bayer, S., Groth, J. (2012). Efficient Zero-Knowledge Argument for Correctness of a Shuffle.
Blundo, C., De Cristofaro, E., Gasti, P. (2012). EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity..
Chaabane, A., De Cristofaro, E., Kaafar, M.-.A., Uzun, E. (2012). Privacy in Content-Oriented Networking: Threats and Countermeasures. Computer Communication Review, 43 25-33.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2012). Malleable Proof Systems and Applications.. IACR Cryptology ePrint Archive, 2012 12.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2012). Verifiable Elections That Scale for Free.. IACR Cryptology ePrint Archive, 2012 697.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2012). Succinct Malleable NIZKs and an Application to Compact Shuffles.. IACR Cryptology ePrint Archive, 2012 506.
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S. (2012). Malleable Proof Systems and Applications..
Collinson, M., Pym, D., Taylor, B. (2012). A framework for modelling security architectures in services ecosystems.
Conti, N., Jennett, C., Maestre, J., Sasse, M.A. (2012). When did my mobile turn into a 'sellphone'? A study of consumer responses to tailored smartphone ads.
COURTOIS, N. (2012). Security Evaluation of GOST 28147-89 In View Of International Standardisation. Cryptologia, 36 (Issue 1), 2-13. doi:10.1080/01611194.2011.632807
Courtois, N. (2012). An Improved Differential Attack on Full GOST. [Digital scholarly resource]. Retrieved from: http://eprint.iacr.org/2012/138
Courtois, N., Gupta, K., Hulme, D. (2012). Building and Transport Cards: Attacks and Defences.
COURTOIS, N., Misztal, M. (2012). Aggregated Differentials and Cryptanalysis of PP-1 and GOST. Periodica Mathematica Hungarica, Vol. 65 (2), 11-26. doi:10.1007/s10998-012-2983-8
Courtois, N., Mourouzis, T., Hulme, D. (2012). Multiplicative Complexity and Solving Generalized Brent Equations With SAT Solvers.
Courtois, N., Mourouzis, T., Le, P.V. (2012). Extension of de Wegers Attack on RSA with Large Public Keys.
Courtois, N., Sepherdad, P., Susil, P., Vaudenay, S. (2012). ElimLin Algorithm Revisited.
Danezis, G. (2012). Trust as a methodological tool in security engineering. In Trust, Computing, and Society. (pp. 68-92). .
Danezis, G., Käsper, E. (2012). The dangers of composing anonymous channels. Information Hiding - 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers, 191-206. doi:10.1007/978-3-642-36373-3_13
Danezis, G., Kohlweiss, M., Livshits, B., Rial, A. (2012). Private client-side profiling with random forests and hidden markov models. Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings, 18-37. doi:10.1007/978-3-642-31680-7_2
De Cristofaro, E., Di Pietro, R. (2012). Adversaries and countermeasures in privacy-enhanced Urban sensing systems. IEEE Systems Journal, Special Issue on Security and Privacy of Complex Systems,
De Cristofaro, E., Di Pietro, R. (2012). Preserving Query Privacy in Urban Sensing Systems.
De Cristofaro, E., Faber, S., Gasti, P., Tsudik, G. (2012). GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?.
De Cristofaro, E., Gasti, P., Tsudik, G. (2012). Fast and Private Computation of Cardinality of Set Intersection and Union.
De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A. (2012). Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs.. IEEE Data Eng. Bull., 35 93-100.
De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A. (2012). Hummingbird: Privacy at the time of Twitter.
De Cristofaro, E., Tsudik, G. (2012). Experimenting with Fast Private Set Intersection.
Desmedt, Y. (2012). A Brief Survey of Research Jointly with Jean-Jacques Quisquater..
Desmedt, Y., Chaidos, P. (2012). Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System..
Desmedt, Y., Pieprzyk, J., Steinfeld, R. (2012). Active Security in Multiparty Computation over Black-Box Groups..
Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H., Yao, A.C.-.C. (2012). Graph Coloring Applied to Secure Computation in Non-Abelian Groups. JOURNAL OF CRYPTOLOGY, 25 (4), 557-600. doi:10.1007/s00145-011-9104-3
Erotokritou, S., Desmedt, Y. (2012). Human Perfectly Secure Message Transmission Protocols and Their Applications..
Fischer-Hübner, S., Wright, M.K. (Eds.), (2012). Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings. Springer.
Groth, J., Ostrovsky, R., Sahai, A. (2012). New Techniques for Noninteractive Zero-Knowledge. Journal of the ACM, 59 (3), doi:10.1145/2220357.2220358
Groth, J., Sahai, A. (2012). Efficient Noninteractive Proof Systems for Bilinear Groups. SIAM Journal on Computing, 41 (5), 1193-1232. doi:10.1137/080725386
Ioannidis, C., Pym, D., Williams, J. (2012). Information security trade-offs and optimal patching policies. European Journal of Operational Research, 216 (2), 434-444. doi:10.1016/j.ejor.2011.05.050
Jennett, C., Brostoff, S., Malheiros, M., Sasse, M.A. (2012). Adding insult to injury: consumer experiences of being denied credit. International Journal of Consumer Studies, 36 (5), 549-555. doi:10.1111/j.1470-6431.2012.01120.x
Jennett, C., Malheiros, M., Brostoff, S., Sasse, M.A. (2012). Privacy for applicants versus lenders' needs for predictive power: Is it possible to bridge the gap?. In Gutwirth, S., Leenes, R., De Hert, P., Poullet, Y. (Eds.), (pp. 35-51). SpringerLink.
Kirlappos, I., Sasse, M.A. (2012). Security Education against Phishing: A Modest Proposal for a Major Rethink. IEEE Security and Privacy Magazine, 10 (2), 24-32. doi:10.1109/MSP.2011.179
Kirlappos, I., Sasse, M.A., Harvey, N. (2012). Why Trust Seals Don’t Work: A Study of User Perceptions and Behavior. In Katzenbeisser, S., Weippl, E., Camp, L., Volkamer, M., Reiter, M., Zhang, X. (Eds.), Trust and Trustworthy Computing. (pp. 308-324). Berlin/Heidelberg: Springer.
Krol, K., Moroz, M., Sasse, M.A. (2012). Don't work. Can't work? Why it's time to rethink security warnings.
Mahmood, S., Desmedt, Y. (2012). Your Facebook deactivated friend or a cloaked spy..
Mahmood, S., Desmedt, Y. (2012). Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)..
Mahmood, S., Desmedt, Y. (2012). Usable Privacy by Visual and Interactive Control of Information Flow..
Malheiros, M., Brostoff, S., Jennett, C., Sasse, A. (2012). Would You Sell Your Mother’s Data? Personal Data Disclosure in a Simulated Credit Card Application.
Malheiros, M., Jennett, C., Patel, S., Brostoff, S., Sasse, M.A. (2012). Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising.
Meiklejohn, S., Erway, C.C., Küpçü, A., Hinkle, T., Lysyanskaya, A. (2012). ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.. IACR Cryptology ePrint Archive, 2012 226.
Mishari, M.A., De Cristofaro, E., El Defrawy, K., Tsudik, G. (2012). Harvesting SSL Certificate Data to Identify Web-Fraud. International Journal of Network Security (IJSN),
Molina-Markham, A., Danezis, G., Fu, K., Shenoy, P., Irwin, D. (2012). Designing privacy-preserving smart meters with low-cost microcontrollers. Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, 239-253. doi:10.1007/978-3-642-32946-3_18
Morton, A., Sasse, M.A. (2012). Privacy is a process, not a PET: a theory for effective privacy practice.
Murdoch, S.J., Bond, M., Anderson, R. (2012). How Certification Systems Fail: Lessons from the Ware Report. IEEE SECURITY & PRIVACY, 10 (6), 40-44. doi:10.1109/MSP.2012.89
Porter, C., Sasse, M.A., Letier, E. (2012). Designing acceptable user registration processes for e-services.
Probst, C.W., Sasse, M.A., Pieters, W., Dimkov, T., Luysterborg, E., Arnaud, M. (2012). Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. In Gutwirth, S., Leenes, R., Hert, P.D., Poullet, Y. (Eds.), European Data Protection: In Good Health?. (pp. 251-265). Springer Netherlands.
Rahaman, A., Sasse, M.A. (2012). Designing National Identity: An Organisational Perspective on Requirements for National Identity Management Systems.
Rial, A., Danezis, G. (2012). Privacy-preserving smart metering. ISSE 2012 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Belgium, October 23-24, 2012, 105-115. doi:10.1007/978-3-658-00333-3_11
Ruskov, M., Celdran, J.M., Ekblom, P., Sasse, M.A. (2012). Unlocking the next level of crime prevention: development of a game prototype to teach the conjunction of criminal opportunity. Information Technologies and Control, 10 (8), 15-21.
Sasse, M.A., Kirlappos, I. (2012). Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling.
Stringhini, G., Egele, M., Kruegel, C., Vigna, G. (2012). Poultry markets: On the underground economy of twitter followers. WOSN'12 - Proceedings of the ACM Workshop on Online Social Networks, 1-6. doi:10.1145/2342549.2342551
Stringhini, G., Egele, M., Kruegel, C., Vigna, G. (2012). Poultry markets: on the underground economy of twitter followers.. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 42 (4), 527-532. doi:10.1145/2377677.2377781
Stringhini, G., Egele, M., Zarras, A., Holz, T., Kruegel, C., Vigna, G. (2012). B@bel: Leveraging Email Delivery for Spam Mitigation..
Wang, Y., Desmedt, Y. (2012). Edge-Colored Graphs with Applications To Homogeneous Faults. CoRR, abs/1207.5439
Watson, R.N.M., Neumann, P.G., Woodruff, J., Anderson, J., Anderson, R., Dave, N., ...Paeps, P. (2012). CHERI: a research platform deconflating hardware virtualisation and protection.
Wibbeke, A., Schöppner, V., Sasse, M. (2012). Self-reinforcement of uniaxially stretched polycarbonate film.
Zhang, M., Jennett, C., Malheiros, M., Sasse, M.A. (2012). Data after death: User requirements and design challenges for SNSs and email providers.

2011

(2011). Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011.
Abe, M., Groth, J., Haralambiev, K., Ohkubo, M. (2011). Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Abe, M., Groth, J., Ohkubo, M. (2011). Separating Short Structure Preserving Signatures from Non-Interactive Assumptions.
Anderson, R., Murdoch, S.J. (2011). What Next after Anonymity?.
Ateniese, G., De Cristofaro, E., Tsudik, G. (2011). (If) size matters: size-hiding private set intersection.
Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G. (2011). Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
Baldwin, A., Pym, D., Sadler, M., Shiu, S. (2011). Information stewardship in cloud ecosystems: Towards models, economics, and delivery.
BEEHAREE, A.K., Laqua, S., Sasse, M.A. (2011). Navigating Haystacks at 70mph: Intelligent Search for Intelligent In-Car Services.
Ben Abdesslem, F., Henderson, T., Brostoff, S., Sasse, M.A. (2011). Context-based Personalised Settings for Mobile Location Sharing.
Beres, Y., Perrig, A., Sadeghi, A.R., Sasse, A. (2011). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. .
Castelluccia, C., De Cristofaro, E., Francillon, A., Kaafar, M.-.A. (2011). EphPub: Toward Robust Ephemeral Publishing.
COURTOIS, N. (2011). Self-similarity Attacks on Block Ciphers and Application to KeeLoq. In Naccache, D. (Ed.), Quisquater Festschrift. .
Courtois, N. (2011). Algebraic Complexity Reduction and Cryptanalysis of GOST.. IACR Cryptology ePrint Archive, 2011 626.
Courtois, N. (2011). Security Evaluation of GOST 28147-89 In View Of International Standardisation.. IACR Cryptology ePrint Archive, 2011 211.
COURTOIS, N., Bard, G.V., Ault, S.V. (2011). Statistics of Random Permutations and the Cryptanalysis Of Periodic Block Ciphers. Cryptologia,
COURTOIS, N., Bard, G.V., Hulme, D. (2011). A New General-Purpose Method to Multiply 3x3 Matrices Using Only 23 Multiplications. USA .
COURTOIS, N., Hulme, D., Mourouzis, T. (2011). Solving Optimisation Problems in Cryptography, Its Implementation and Cryptanalysis,.
Courtois, N., Hulme, D., Mourouzis, T. (2011). Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis.. IACR Cryptology ePrint Archive, 2011 475.
Courtois, N., Jhawar, R., Inglesant, P., Sasse, M.A. (2011). Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN Authentication.
COURTOIS, N., Misztal, M. (2011). First Differential Attack On Full 32-Round GOST.
Courtois, N., Misztal, M. (2011). Differential Cryptanalysis of GOST.. IACR Cryptology ePrint Archive, 2011 312.
COURTOIS, N., Mourouzis, T. (2011). Black-Box Collision Attacks on the Compression Function of the GOST Hash Function.
Courtois, N.T., Bard, G.V. (2011). Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq.
Danezis, G., Kohlweiss, M., Rial, A. (2011). Differentially private billing with rebates. Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers, 148-162. doi:10.1007/978-3-642-24178-9_11
Danezis, G., Livshits, B. (2011). Towards ensuring client-side computational integrity (A position paper). Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011, Chicago, IL, USA, October 21, 2011, 125-130. doi:10.1145/2046660.2046683
De Cristofaro, E., Durussel, A., Aad, I. (2011). Reclaiming privacy for smartphone applications.
De Cristofaro, E., Lu, Y., Tsudik, G. (2011). Efficient techniques for privacy-preserving sharing of sensitive information.
De Cristofaro, E., Manulis, M., Poettering, B. (2011). Private Discovery of Common Social Contacts.
De Cristofaro, E., Soriente, C. (2011). PEPSI—privacy-enhanced participatory sensing infrastructure.
Desmedt, Y. (2011). Covert Channels.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (pp. 265-266). Springer.
Desmedt, Y. (2011). Deniable Encryption.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (pp. 322-323). Springer.
Desmedt, Y. (2011). Access Structure.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (p. 20). Springer.
Desmedt, Y. (2011). Station-to-Station Protocol.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (p. 1256). Springer.
Desmedt, Y. (2011). Relay Attack.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (p. 1042). Springer.
Desmedt, Y. (2011). Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (pp. 457-458). Springer.
Desmedt, Y. (2011). Man-in-the-Middle Attack.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (p. 759). Springer.
Desmedt, Y. (2011). ElGamal Public Key Encryption.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (p. 396). Springer.
Desmedt, Y. (2011). Knapsack Cryptographic Schemes.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (pp. 695-704). Springer.
Desmedt, Y. (2011). Trojan Horses, Computer Viruses, and Worms.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (pp. 1319-1320). Springer.
Desmedt, Y. (2011). Threshold Cryptography.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (pp. 1288-1293). Springer.
Desmedt, Y., Jakimoski, G. (2011). Stream and Multicast Authentication.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (pp. 1260-1263). Springer.
Desmedt, Y., Jakimoski, G. (2011). Broadcast Authentication from an Information Theoretic Perspective.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (pp. 170-171). Springer.
Desmedt, Y., Miyaji, A. (2011). Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments..
Desmedt, Y., Yang, Q. (2011). Perfectly Secure Message Transmission.. In Tilborg, H.C.A.V., Jajodia, S. (Eds.), Encyclopedia of Cryptography and Security (2nd Ed.). (pp. 922-924). Springer.
Doupé, A., Egele, M., Caillat, B., Stringhini, G., Yakin, G., Zand, A., ...Vigna, G. (2011). Hit 'em where it hurts: A live security exercise on Cyber Situational Awareness. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 51-61.
Fischer-Hübner, S., Hopper, N. (Eds.), (2011). Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings. Springer.
Groth, J. (2011). Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments.
Inglesant, P.G., Sasse, M.A. (2011). Information Security as Organizational Power: A framework for re-thinking security policies.
Ioannidis, C., Pym, D.J., Williams, J. (2011). Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach..
Jhawar, R., Inglesant, P.G., Sasse, M.A., Curtois, N.T. (2011). Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN authentication.
Jia, K., Desmedt, Y., Han, L., Wang, X. (2011). Pseudo-Cryptanalysis of Luffa..
Koeberl, P., Li, J., Rajan, A., Vishik, C., Wu, W. (2011). A Practical Device Authentication Scheme Using SRAM PUFs..
Kursawe, K., Danezis, G., Kohlweiss, M. (2011). Privacy-friendly aggregation for the smart-grid. Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings, 175-191. doi:10.1007/978-3-642-22263-4_10
Laqua, S., Sasse, M.A., Greenspan, S., Gates, C. (2011). Do you know dis?: a user study of a knowledge discovery tool for organizations.
Lu, Y., Desmedt, Y. (2011). Improved Distinguishing Attack on Rabbit..
Lu, Y., Desmedt, Y. (2011). Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher..
Mahmood, S., Desmedt, Y. (2011). Poster: preliminary analysis of Google+'s privacy..
Malheiros, M., Jennett, C., Seager, W., Sasse, M. (2011). Trusting to Learn: Trust and Privacy Issues in Serious Games. In McCune, J., Balacheff, B., Perrig, A., Sadeghi, A.-.R., Sasse, A., Beres, Y. (Eds.), Trust and Trustworthy Computing. (pp. 116-130). Springer Berlin / Heidelberg.
Meiklejohn, S., Mowery, K., Checkoway, S., Shacham, H. (2011). The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion..
Mowery, K., Meiklejohn, S., Savage, S. (2011). Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks..
Murdoch, S.J. (2011). Hardened Stateless Session Cookies.
Murdoch, S.J. (2011). Hardened Stateless Session Cookies (Transcript of Discussion).
Rial, A., Danezis, G. (2011). Privacy-preserving smart metering. Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES 2011, Chicago, IL, USA, October 17, 2011, 49-60. doi:10.1145/2046556.2046564
Sasse, M., Schöppner, V., Seibel, S., Becker, K. (2011). Expert database provides support for pipe extrusion. Kunststoffe International, 101 (12), 32-34.
Seager, W., Ruskov, M., Sasse, M.A., Fradinho, M. (2011). Eliciting and modelling expertise for serious games in project management. Entertainment Computing, 2 doi:10.1016/j.entcom.2011.01.002
Shokri, R., Theodorakopoulos, G., Danezis, G., Hubaux, J.P., Le Boudec, J.Y. (2011). Quantifying location privacy: The case of sporadic location exposure. Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings, 57-76. doi:10.1007/978-3-642-22263-4_4
Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G. (2011). The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns..
Stringhini, G., Holz, T., Stone-Gross, B., Kruegel, C., Vigna, G. (2011). BOTMAGNIFIER: Locating Spambots on the Internet..
Troncoso, C., Danezis, G., Kosta, E., Balasch, J., Preneel, B. (2011). PriPAYD: Privacy-friendly pay-as-you-drive insurance. IEEE Trans. Dependable Sec. Comput., 8 742-755. doi:10.1109/TDSC.2010.71
Wang, Y., Desmedt, Y. (2011). Edge-colored graphs with applications to homogeneous faults..
Wang, Y., Desmedt, Y. (2011). Homogeneous Faults, Colored Edge Graphs, and Cover Free Families..
Yang, Q., Desmedt, Y. (2011). Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol.. IACR Cryptology ePrint Archive, 2011 265.
Yang, Q., Desmedt, Y. (2011). Secure Communication in Multicast Graphs..

2010

Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M. (2010). Structure-Preserving Signatures and Commitments to Group Elements.
Atallah, M.J., Hopper, N.J. (Eds.), (2010). Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings. Springer.
Atkinson, R., Bauer, C., Blakley, B., Brassard, G., Buonafalce, A., Bury, J., ...Gillogly, J. (2010). A Tribute to David Kahn. CRYPTOLOGIA, 34 (1), 1-11. doi:10.1080/01611190903408001
Auletta, V., Blundo, C., De Caro, A., De Cristofaro, E., Persiano, G., Visconti, I. (2010). Increasing privacy threats in the cyberspace: the case of Italian e-passports.
Beautement, A., Pym, D.J. (2010). Structured Systems Economics for Security Management..
Beautement, A., Sasse, M.A. (2010). Gathering realistic authentication performance data through field trials.
Beresnevichiene, Y., Pym, D., Shiu, S. (2010). Decision support for systems security investment.
Brostoff, S., Inglesant, P., Sasse, M.A. (2010). Evaluating the usability and security of a graphical one-time PIN system.
Castelluccia, C., De Cristofaro, E., Perito, D. (2010). Private information disclosure from web searches.
Collinson, M., Monahan, B., Pym, D. (2010). Semantics for structured systems modelling and simulation.
Collinson, M., Pym, D. (2010). Erratum: Algebra and logic for access control (Formal Aspects of Computing (2010) 22 (83-104)). Formal Aspects of Computing, 22 (3-4), 483-484. doi:10.1007/s00165-009-0107-x
Collinson, M., Pym, D. (2010). Algebra and logic for access control. Formal Aspects of Computing, 22 (2), 83-104. doi:10.1007/s00165-009-0107-x
Courtois, N.T., Jackson, K., Ware, D. (2010). Fault-Algebraic Attacks on Inner Rounds of DES.
Danezis, G., Aura, T., Chen, S., KIcIman, E. (2010). How to share your favourite search results while preserving privacy and quality. Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings, 273-290. doi:10.1007/978-3-642-14527-8_16
Danezis, G., Diaz, C., Syverson, P. (2010). Systems for anonymous communication. In Rosenberg, B. (Ed.), Handbook of Financial Cryptography and Security. Chapman and Hall/CRC.
Danezis, G., Díaz, C., Syverson, P.F. (2010). Anonymous Communication. In Handbook of Financial Cryptography and Security.. (pp. 341-389). .
Danezis, G., Diaz, C., Troncoso, C., Laurie, B. (2010). Drac: An architecture for anonymous low-volume communications. Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings, 202-219. doi:10.1007/978-3-642-14527-8_12
De Cristofaro, E., Kim, J. (2010). Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization. IEEE Security & Privacy, 8 18-24.
De Cristofaro, E., Kim, J., Tsudik, G. (2010). Linear-complexity private set intersection protocols secure in malicious model.
De Cristofaro, E., Tsudik, G. (2010). Practical private set intersection protocols with linear complexity.
Desmedt, Y., Elkind, E. (2010). Equilibria of plurality voting with abstentions..
Desmedt, Y., Erotokritou, S., Safavi-Naini, R. (2010). Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes..
Desmedt, Y., Gennaro, R., Kurosawa, K., Shoup, V. (2010). A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack. JOURNAL OF CRYPTOLOGY, 23 (1), 91-120. doi:10.1007/s00145-009-9051-4
Diaz, C., Murdoch, S.J., Troncoso, C. (2010). Impact of network topology on anonymity and overhead in low-latency anonymity networks.
Estehghari, S., Desmedt, Y. (2010). Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example..
Fremont, G., Grazzini, S., Sasse, A., BEEHAREE, A. (2010). The SafeTRIP Project: Improving Road Safety for Passenger Vehicles using 2-way Satellite Communications.
Groth, J. (2010). A Verifiable Secret Shuffle of Homomorphic Encryptions. Journal of Cryptology, 23 (4), 546-579. doi:10.1007/s00145-010-9067-9
Groth, J. (2010). Short Pairing-Based Non-interactive Zero-Knowledge Arguments..
Groth, J. (2010). Short Non-interactive Zero-Knowledge Proofs..
Groth, J., Kiayias, A., Lipmaa, H. (2010). Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Inglesant, P.G., Sasse, M.A. (2010). The true cost of unusable password policies: password use in the wild.
Inglesant, P., Sasse, M.A. (2010). Studying Password Use in the Wild: Practical Problems and Possible Solutions.
Jennett, C., Brostoff, S., Malheiros, M., Sasse, M.A. (2010). Investigating loan applicants' perceptions of alternative data items and the effect of incentives on disclosure.
Keval, H., Sasse, M.A. (2010). “ Not the Usual Suspects ” : A Study of Factors Reducing the Effectiveness of CCTV. Security Journal, 23 (2), 134-154.
Loesing, K., Murdoch, S.J., Dingledine, R. (2010). A Case Study on Measuring Statistical Data in the Tor Anonymity Network.
Meiklejohn, S. (2010). Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008.. ACM SIGACT News, 41 (4), 47. doi:10.1145/1907450.1907527
Meiklejohn, S., Erway, C.C., Küpçü, A., Hinkle, T., Lysyanskaya, A. (2010). ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash..
Meiklejohn, S., Shacham, H., Freeman, D.M. (2010). Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.. IACR Cryptology ePrint Archive, 2010 474.
Meiklejohn, S., Shacham, H., Freeman, D.M. (2010). Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures..
Migliardi, M., Stringhini, G. (2010). Travelling Information For Intrusion Prevention Systems..
Mont, M.C., Beresnevichiene, Y., Pym, D., Shiu, S. (2010). Economics of Identity and Access Management: Providing decision support for investments.
Murdoch, S.J. (2010). Destructive Activism: The Double-Edged Sword of Digital Tactics. In Joyce, M. (Ed.), Digital Activism Decoded. IDEA.
Murdoch, S.J., Anderson, R. (2010). Verified by visa and MasterCard SecureCode: Or, how not to design authentication.
Murdoch, S.J., Drimer, S., Anderson, R., Bond, M. (2010). Chip and PIN is broken.
Parkin, S., van Moorsel, A., Inglesant, P., Sasse, M.A. (2010). A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Potente, K., Schöppner, V., Sasse, M., Seibel, S. (2010). Defects during extrusion processes - Recognize, analyze, graduate and eradicate.
Rahaman, A., Sasse, M.A. (2010). A framework for the lived experience of identity. Identity in the Information Society, 3 (3), 605-638. doi:10.1007/s12394-010-0078-3
Rahaman, A., Sasse, M.A. (2010). Human-Centred Identity - From Rhetoric to Reality.
Riegelsberger, J., Sasse, M.A. (2010). Ignore These At Your Peril: Ten principles for trust design.
Ruskov, M., Seager, W., Sasse, M.A. (2010). Persuading Giants to be Wise:An Exploratory Study of Advice Sharing in Online Games.
Sasse, M.A. (2010). Not Seeing the Crime for the Cameras?. COMMUNICATIONS OF THE ACM, 53 (2), 22-25. doi:10.1145/1646353.1646363
Seager, W., Ruskov, M., Sasse, M.A., Fradinho, M. (2010). Eliciting and modelling expertise for serious game design.
Stringhini, G., Kruegel, C., Vigna, G. (2010). Detecting spammers on social networks. 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 1-9.
tags, A.C.S.-.C.A.C.L.B.C.F.R.F.I.D. (2010). Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.
Yang, Q., Desmedt, Y. (2010). Cryptanalysis of Secure Message Transmission Protocols with Feedback..
Yang, Q., Desmedt, Y. (2010). General Perfectly Secure Message Transmission Using Linear Codes..

2009

Auletta, V., Blundo, C., De Cristofaro, E. (2009). HTTP over Bluetooth: a J2ME experience. International Journal On Advances in Telecommunications, 1 57-66.
Beautement, A., Coles, R., Griffin, J., Ioannidis, C., Monahan, B., Pym, D., ...Wonham, M. (2009). Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
Beautement, A., Sasse, A. (2009). The economics of user effort in information security. Computer Fraud & Security, 2009 (10), 8-12. doi:10.1016/S1361-3723(09)70127-7
BEAUTEMENT, A., Sasse, M.A. (2009). The Compliance Budget: The economics of user effort in information security. Computer Fraud & Security, 2009 (10), 8-12. doi:10.1016/S1361-3723(09)70127-7
Bonneau, J., Anderson, J., Danezis, G. (2009). Prying data out of a social network. 2009 International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009, 20-22 July 2009, Athens, Greece, 249-254. doi:10.1109/ASONAM.2009.45
Chadwick, D., Inglesant, P., Shi, L.L., Sasse, M.A. (2009). Writing Security Policies in Natural Language. Public Service Review: Home Affairs, (17),
Collinson, M., Monahan, B., Pym, D. (2009). A Logical and Computational Theory of Located Resource. JOURNAL OF LOGIC AND COMPUTATION, 19 (6), 1207-1244. doi:10.1093/logcom/exp021
Collinson, M., Pym, D. (2009). Algebra and logic for resource-based systems modelling. Mathematical Structures in Computer Science, 19 (5), 959-1027. doi:10.1017/S0960129509990077
Courtois, N. (2009). The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime.. IACR Cryptology ePrint Archive, 2009 137.
Courtois, N., O'Neil, S., Quisquater, J.-.J. (2009). Practical Algebraic Attacks on the Hitag2 Stream Cipher..
Courtois, N.T. (2009). The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime.
Courtois, N.T., O'Neil, S., Quisquater, J.-.J. (2009). Practical Algebraic Attacks on the Hitag2 Stream Cipher in RFID Transponders.
Danezis, G. (2009). Inferring privacy policies for social networking services. Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, 5-10. doi:10.1145/1654988.1654991
Danezis, G. (2009). The Least Privacy-Damaging Centralised Traffic Data Retention Architecture..
Danezis, G. (2009). The Least Privacy-Damaging Centralised Traffic Data Retention Architecture..
Danezis, G., Diaz, C., Käsper, E., Troncoso, C. (2009). The wisdom of crowds: Attacks and optimal constructions. Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, 406-423. doi:10.1007/978-3-642-04444-1_25
Danezis, G., Goldberg, I. (2009). Sphinx: A compact and provably secure mix format. 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May 2009, Oakland, California, USA, 269-282. doi:10.1109/SP.2009.15
Danezis, G., Mittal, P. (2009). SybilInfer: Detecting Sybil Nodes using Social Networks.
Danezis, G., Troncoso, C. (2009). Vida: How to use bayesian inference to de-anonymize persistent communications. Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, 56-72. doi:10.1007/978-3-642-03168-7_4
De Cristofaro, E., Bohli, J.-.M., Westhoff, D. (2009). FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
De Cristofaro, E., Ding, X., Tsudik, G. (2009). Privacy-preserving querying in sensor networks.
De Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G. (2009). Privacy-preserving policy-based information transfer.
Desmedt, Y., Duif, N., van Tilborg, H., Wang, H. (2009). BOUNDS AND CONSTRUCTIONS FOR KEY DISTRIBUTION SCHEMES. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 3 (3), 273-293. doi:10.3934/amc.2009.3.273
Drimer, S., Murdoch, S.J., Anderson, R. (2009). Failures of Tamper-Proofing in PIN Entry Devices. IEEE SECURITY & PRIVACY, 7 (6), 39-45. doi:10.1109/MSP.2009.187
Drimer, S., Murdoch, S.J., Anderson, R. (2009). Optimised to Fail: Card Readers for Online Banking.
Flechais, I., Sasse, M.A. (2009). Stakeholder Involvement, Motivation, Responsibility, Communication: How to Design Usable Security in e-Science. International Journal of Human-Computer Studies, 67 (4), 281-296.
Groth, J. (2009). Linear Algebra with Sub-linear Size Zero-Knowledge Arguments.
Ioannidis, C., Pym, D., Williams, J. (2009). Investments and trade-offs in the economics of information security.
Jia, K., Desmedt, Y., Han, L., Wang, X. (2009). Pseudo-Cryptanalysis of Luffa.. IACR Cryptology ePrint Archive, 2009 224.
Knoche, H., Sasse, M.A. (2009). The Big Picture on Small Screens Delivering Acceptable Video Quality in Mobile TV. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 5 (3), 20:1-20:27. doi:10.1145/1556134.1556137
Laqua, S., Sasse, M.A. (2009). Exploring Blog Spaces: A Study of Blog Reading Experiences using Dynamic Contextual Displays.
Laqua, S., Sasse, M.A., Gates, C., Greenspan, S. (2009). Making Sense of the Unknown: Knowledge Dissemination in Organizations.
Lindqvist, J., Aura, T., Danezis, G., Koponen, T., Myllyniemi, A., Mäki, J., Roe, M. (2009). Privacy-preserving 802.11 access-point discovery. Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, 123-130. doi:10.1145/1514274.1514293
Migliardi, M., Stringhini, G. (2009). A Distributed model for intrusion detection and prevention.
Murdoch, S.J. (2009). Reliability of Chip & PIN evidence in banking disputes. Digital Evidence and Electronic Signature Law Review, 6 98-115. doi:10.14296/deeslr.v6i0.1862
Nicolas T Courtois, S.O.A.J.-.J.Q. (2009). Practical Algebraic Attacks on the Hitag2Stream Cipher.
Sasse, M.A., Johnson, G.I., Briggs, P. (2009). Introducing word processing to novice users: A study of 'procedural' and 'conceptual' approaches. Contemporary Ergonomics 1984-2008: Selected Papers and an Overview of the Ergonomics Society Annual Conference, 146-151.
Sasse, M.A., Karat, C.-.M., Maxion, R.A. (2009). Designing and evaluating usable security and privacy technology..
Tonien, D., Safavi-Naini, R., Nickolas, P., Desmedt, Y. (2009). Unconditionally Secure Approximate Message Authentication.
Troncoso, C., Danezis, G. (2009). The Bayesian traffic analysis of mix networks.
Yang, Q., Desmedt, Y. (2009). Cryptanalysis of Secure Message Transmission Protocols with Feedback.. IACR Cryptology ePrint Archive, 2009 632.

2008

Beautement, A., Sasse, M.A., Wonham, M. (2008). The compliance budget: managing security behaviour in organisations.
Berbain, C., Billet, O., Canteaut, A., Courtois, N., Debraize, B., Gilbert, H., ...Lauradoux, C. (2008). DECIM v2.
Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., ...Minier, M. (2008). Sosemanuk , a Fast Software-Oriented Stream Cipher.
Blundo, C., Cristofaro, E.D., Galdi, C., Persiano, G. (2008). Validating Orchestration of Web Services with BPEL and Aggregate Signatures.
Blundo, C., De Cristofaro, E., Del Sorbo, A., Galdi, C., Persiano, G. (2008). A distributed implementation of the certified information access service.
Callas, J., Desmedt, Y., Nagy, D., Otsuka, A., Quisquater, J.-.J., Yung, M. (2008). Real electronic cash versus academic electronic cash versus paper cash (panel report).
Chadwick, D.W., Shil, L.L., Sasse, M.A., Inglesant, P. (2008). Interface intelligence.
Coles, R., Griffin, J., Johnson, H., Monahan, B., Parkin, S.E., Pym, D., ...van Moorsel, A. (2008). Trust Economics Feasibility Study.
Collinson, M., Pym, D., Robinson, E. (2008). Bunched polymorphism. Mathematical Structures in Computer Science, 18 (6), 1091-1132. doi:10.1017/S0960129508007159
Courtois, N. (2008). Algebraic Attacks on MiFare Crypto-1, London Oyster Card, Dutch OV-Chipcard + Approx. 1 Billion Other RFID Chips.
Courtois, N., Debraize, B. (2008). Algebraic description and simultaneous linear approximations of addition in Snow 2.0..
Courtois, N., Nohl, K., O'Neil, S. (2008). Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards.
Courtois, N.T., Bard, G.V., Bogdanov, A. (2008). Periodic Ciphers with Small Blocks and Cryptanalysis of KeeLoq.
Courtois, N.T., Bard, G.V., Wagner, D. (2008). Algebraic and slide attacks on KeeLoq.
Courtois, N.T., Debraize, B. (2008). Specific S-box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts.
Courtois, N.T., Debraize, B. (2008). Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0..
Cvrček, D., Danezis, G. (2008). Fighting the 'good' internet war. Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers, 3-11. doi:10.1007/978-3-642-22137-8_2
Danezis, G. (2008). Covert communications despite traffic data retention. Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers, 198-214. doi:10.1007/978-3-642-22137-8_27
Danezis, G., Sassaman, L. (2008). How to bypass two anonymity revocation schemes. Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, 187-201. doi:10.1007/978-3-540-70630-4_12
Danezis, G., Syverson, P. (2008). Bridging and fingerprinting: Epistemic attacks on route selection. Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, 151-166. doi:10.1007/978-3-540-70630-4_10
De Mulder, Y., Danezis, G., Batina, L., Preneel, B. (2008). Identification via location-profiling in GSM networks. Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, 23-32. doi:10.1145/1456403.1456409
Desmedt, Y., King, B., Schoenmakers, B. (2008). Revisiting the Karnin, Greene and Hellman bounds.
Desmedt, Y., Lange, T. (2008). Revisiting pairing based group key exchange.
Desmedt, Y., Lipmaa, H., Phan, D.H. (2008). Hybrid Damgard Is CCA1-Secure under the DDH Assumption.
Desmedt, Y., Phan, D.H. (2008). A CCA Secure Hybrid Damgard's ElGamal Encryption.
Desmedt, Y., Wang, Y. (2008). Perfectly Secure Message Transmission Revisited. IEEE TRANSACTIONS ON INFORMATION THEORY, 54 (6), 2582-2595. doi:10.1109/TIT.2008.921676
Drimer, S., Murdoch, S.J., Anderson, R. (2008). Thinking inside the box: System-level failures of tamper proofing.
Groth, J., Ishai, Y. (2008). Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle.
Groth, J., Sahai, A. (2008). Efficient Non-interactive Proof Systems for Bilinear Groups.
Inglesant, P., Sasse, M.A., Chadwick, D., Shi, L.L. (2008). Expressions of Expertness: The Virtuous Circle of Natural Language for Access Control Policy Specification.
Keval, H.U., Sasse, M.A. (2008). Can we ID from CCTV? Image quality in digital CCTV and face identification performance.
Keval, H.U., Sasse, M.A. (2008). To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task..
Knoche, H., Sasse, M.A. (2008). The sweet spot: How people trade off size and definition on mobile devices.
Knoche, H., Sasse, M.A. (2008). Getting the big picture on small screens: Quality of experience in mobile TV. In Ahmad, A.M.A., Ibrahim, I.K. (Eds.), Multimedia Transcoding in Mobile and Wireless Networks. (pp. 31-46). Hershey, PA, USA: IGI Global.
Murdoch, S.J. (2008). On the Origins of a Thesis. International Workshop on Security and Trust Management .
Murdoch, S.J., Anderson, R. (2008). Tools and Technology of Internet Filtering. In Diebert, R., Palfrey, J., Rohozinski, R., Zittrain, J. (Eds.), Access Denied: The Practice and Policy of Global Internet Filtering. MIT Press.
Murdoch, S.J., Watson, R.N.M. (2008). Metrics for security and performance in low-latency anonymity systems.
Oshlyansky, L., Cairns, P., Sasse, A., Harrison, C. (2008). The challenges faced by academia preparing students for industry: What we teach and what we do.
Sasse, M.A. (2008). Comment and analysis: Angela Sasse on the vulnerability of biometric security.
Wang, Y., Desmedt, Y. (2008). Perfectly Secure Message Transmission Revisited..
Zander, S., Murdoch, S.J. (2008). An Improved Clock-skew Measurement Technique for Revealing Hidden Services.

2007

Auletta, V., Blundo, C., De Cristofaro, E. (2007). A J2ME transparent middleware to support HTTP connections over Bluetooth.
Aura, T., Roe, M., Murdoch, S.J. (2007). Securing network location awareness with authenticated DHCP.
Ball, L.J., Sasse, M.A., Sas, C., Ormerod, T.C., Dix, A., Bagnall, P., McEwan, T. (2007). Preface: "HCI... but not as we know it". People and Computers XXI HCI.But Not as We Know It - Proceedings of HCI 2007: The 21st British HCI Group Annual Conference, 1
Blundo, C., De Cristofaro, E. (2007). A Bluetooth-based JXME infrastructure.
Boccolini, G., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., Muster, D., ...Pala, G. (2007). UNIC: A novel bi-directional satellite-based platform to provide TV-centric triple play services.
Boccolini, G., Luise, M., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., ...Sasse, M.A. (2007). A two-way interactive broadband satellite architecture to break the digital divide barrier.
Boccolini, G., Luise, M., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., ...Sasse, M.A. (2007). TV-Centric Technologies To Provide Remote Areas With Two-Way Satellite Broadband Access.
Bond, M. (2007). The dining freemasons (security protocols for secret societies).
Bonhard, P., Sasse, A., Harries, C. (2007). “The Devil You Know Knows Best” – How Online Recommendations Can Benefit From Social Networking.
Borisov, N., Danezis, G., Mittal, P., Tabriz, P. (2007). Denial of service or denial of security?. Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, 92-102. doi:10.1145/1315245.1315258
Chandran, N., Groth, J., Sahai, A. (2007). Ring Signatures of Sub-linear Size Without Random Oracles.
Clayton, R., Murdoch, S.J., Watson, R.N.M. (2007). Ignoring the Great Firewall of China. I/S: A Journal of Law and Policy for the Information Society, 3 (2), 271-296.
Collinson, M., Pym, D., Tofts, C. (2007). Erratum: Errata for Formal Aspects of Computing (2006) 18:495-517 and their consequences (Formal Aspects of Computing (2006) 18 (495-517)). Formal Aspects of Computing, 19 (4), 551-554. doi:10.1007/s00165-007-0047-2
Courtois, N. (2007). CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited.
Courtois, N., Bard, G.V., Jefferson, C. (2007). Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers.
Courtois, N., Bard, G.V., Wagner, D.A. (2007). Algebraic and Slide Attacks on KeeLoq.. IACR Cryptology ePrint Archive, 2007 62.
Courtois, N.T. (2007). How Fast can be Algebraic Attacks on Block Ciphers?.
Courtois, N.T., Bard, G.V. (2007). Algebraic cryptanalysis of the data encryption standard.
Cronin, E., Sherr, M., Blaze, M., Desmedt, Y., Zugenmaier, A., Christianson, B. (2007). Listen too closely and you may be confused.
Damgard, I., Desmedt, Y., Fitzi, M., Nielsen, J.B. (2007). Secure protocols with asymmetric trust.
Danezis, G. (2007). Breaking four mix-related schemes based on Universal Re-encryption. Int. J. Inf. Sec., 6 393-402. doi:10.1007/s10207-007-0033-y
Danezis, G., Clayton, R. (2007). Introducing Traffic Analysis. In Digital Privacy: Theory, Technologies and Practices. CRC Press.
Danezis, G., Diaz, C. (2007). Space-efficient private search with applications to rateless codes. Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, 148-162. doi:10.1007/978-3-540-77366-5_15
Danezis, G., Diaz, C., Faust, S., Kasper, E., Troncoso, C., Preneel, B. (2007). Efficient negative databases from cryptographic hash functions. Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, 423-436. doi:10.1007/978-3-540-75496-1_28
Danezis, G., Diaz, C., Troncoso, C. (2007). Two-sided statistical disclosure attack. Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, 30-44. doi:10.1007/978-3-540-75551-7_3
Danezis, G., Laurie, B. (2007). Private yet abuse resistant open publishing. Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers, 222-243. doi:10.1007/978-3-642-17773-6_28
De Cristofaro, E. (2007). A secure and privacy-protecting aggregation scheme for sensor networks.
Degabriele, J.P., Pym, D. (2007). Economic aspects of a utility computing service.
de Medeiros, B., Stajano, F., Clayton, R., Laurie, B., Burmester, M., Christianson, B., ...Li, J. (2007). Community-centric vanilla-rollback access, or: How I stopped worrying and learned to love my computer.
Desmedt, Y. (2007). Understanding why some network protocols are user-unfriendly.
Desmedt, Y. (2007). Understanding why some network protocols are user-unfriendly.
Desmedt, Y. (2007). Position statement in RFID S&P panel: From relative security to perceived secure.
Desmedt, Y., Jakimoski, G. (2007). Non-degrading erasure-tolerant information authentication with an application to multicast stream authentication over lossy channels.
Desmedt, Y., Kurosawa, K. (2007). A generalization and a variant of two threshold cryptosystems based on factoring.
Desmedt, Y., Lange, T., Burmester, M. (2007). Scalable authenticated tree based group key exchange for ad-hoc groups.
Desmedt, Y., Pieprzyk, J., Steinfeld, R., Wang, H. (2007). On secure multi-party computation in black-box groups.
Diaz, C., Troncoso, C., Danezis, G. (2007). Does additional information always reduce anonymity?. Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, 72-75. doi:10.1145/1314333.1314347
Drimer, S., Murdoch, S.J., U.S.E.N.I.X. (2007). Keep your enemies close: Distance bounding against smartcard relay attacks.
Flechais, I., Mascolo, C., Sasse, M.A. (2007). Integrating security and usability into the requirements and design process. International Journal of Electronic Security and Digital Forensics, 1 (1), 12-26. doi:10.1504/IJESDF.2007.013589
Fuehrmann, C., Pym, D. (2007). On categorical models of classical logic and the Geometry of Interaction. MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 17 (5), 957-1027. doi:10.1017/S0960129507006287
Groth, J. (2007). Fully Anonymous Group Signatures Without Random Oracles.
Groth, J., Lu, S. (2007). Verifiable Shuffle of Large Size Ciphertexts.
Groth, J., Lu, S. (2007). A non-interactive shuffle with pairing based verifiability.
Groth, J., Ostrovsky, R. (2007). Cryptography in the Multi-string Model.
Inglesant, P., Sasse, M.A. (2007). Usability is the best policy: public policy and the lived experience of transport systems in London.
Johnson, M., Laurie, B., Desmedt, Y., Anderson, R., Christianson, B., Roe, M., ...Clayton, R. (2007). Implementing a multi-hat PDA (Transcript of discussion).
Knoche, H., McCarthy, J., Sasse, M.A. (2007). How low can you go? The effect of low resolutions on shot types in mobile TV. Multimedia Tools and Applications, 145-166. doi:10.1007/s11042-006-0076-5
Knoche, H., Papaleo, M., Sasse, M.A., Vanelli-Coralli, A. (2007). The Kindest Cut: Enhancing the User Experience of Mobile TV through Adequate Zooming.
Laqua, S., Bandara, S.U., Sasse, M.A. (2007). GazeSpace: eye gaze controlled content spaces.
Laqua, S., Ogbechie, N., Sasse, M.A. (2007). Contextualizing the Blogosphere: A Comparison ofTraditional and Novel User Interfaces for the Web.
McCusker, G., Pym, D. (2007). A games model of bunched implications.
Murdoch, S.J., Anderson, R. (2007). Shifting borders. Index on Censorship, 36 (4), 156-159. doi:10.1080/03064220701740525
Murdoch, S.J., Zielinski, P. (2007). Sampled traffic analysis by Internet-eXchange-level adversaries.
Pym, D., Taylor, R., Tofts, C. (2007). Public services innovation through technology.
Pym, D., Tofts, C. (2007). Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic. Electronic Notes in Theoretical Computer Science, 172 545-587. doi:10.1016/j.entcs.2007.02.020
Riegelsberger, J., Sasse, A., McCarthy, J.D. (2007). Trust in Mediated Interactions. In Joinson, A., McKenna, K.Y.A.P., T, R., U, D. (Eds.), Oxford Handbook of Internet Psychology. (pp. 53-69). Oxford: Oxford University Press.
Safavi-Naini, R., Wang, S., Desmedt, Y. (2007). Unconditionally secure ring authentication..
Sasse, M.A. (2007). Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A user experience of biometric airport systems. IEEE SECURITY & PRIVACY, 7 78-81.
Seager, W., Knoche, H., Sasse, M.A. (2007). TV-centricity - Requirements gathering for triple play services..
Tabliz, P., Borisov, N., Danezis, G. (2007). Byzantine Attacks on Anonymity Systems. In Digital Privacy: Theory, Technologies and Practices. CRC Press.
Troncoso, C., Danezis, G., Kosta, E., Preneel, B. (2007). PriPAYD: Privacy friendly pay-as-you-drive insurance. Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, 99-107. doi:10.1145/1314333.1314353

2006

(2006). Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers.
(2006). Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers.
Adida, B., Bond, M., Clulow, J., Lin, A., Murdoch, S.J., Anderson, R., Rivest, R. (2006). Phish and Chips: Traditional and New Recipes for Attacking EMV.
Anderson, R., Bond, M., Murdoch, S.J. (2006). Chip and spin. Computer Security Journal, 22 (2), 1-6.
Auletta, V., Blundo, C., De Cristofaro, E., Raimato, G. (2006). A Lightweight Framework for Web Services Invocation over Bluetooth.
Auletta, V., Blundo, C., De Cristofaro, E., Raimato, G. (2006). Performance evaluation of web services invocation over Bluetooth.
Bond, M., Danezis, G. (2006). A pact with the devil. Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006, 77-82. doi:10.1145/1278940.1278952
Bonhard, P., Harries, C., McCarthy, J.D., Sasse, M.A. (2006). Accounting for Taste: Using Profile Similarity to Improve Recommender Systems.
Bonhard, P., Sasse, M.A. (2006). 'Knowing me, knowing you' - using profiles and social networking to improve recommender systems. BT Technology Journal, 24 (3), 84-98.
Burmester, M., Desmedt, Y., Wright, R.N., Yasinsac, A. (2006). Accountable Privacy..
Chadwick, D., Sasse, M.A. (2006). The Virtuous Circle of Expressing Authorisation Policies.
Clayton, R., Murdoch, S.J., Watson, R.N.M. (2006). Ignoring the Great Firewall of China..
Collinson, M., Pym, D. (2006). Bunching for Regions and Locations. Electronic Notes in Theoretical Computer Science, 158 (1), 171-197. doi:10.1016/j.entcs.2006.04.010
Collinson, M., Pym, D., Tofts, C. (2007). Erratum: Errata for Formal Aspects of Computing (2006) 18:495-517 and their consequences (Formal Aspects of Computing (2006) 18 (495-517)). Formal Aspects of Computing, 19 (4), 551-554. doi:10.1007/s00165-007-0047-2
Coron, J.S., Naccache, D., Desmedt, Y., Odlyzko, A., Stern, J.P. (2006). Index calculation attacks on RSA signature and encryption. DESIGNS CODES AND CRYPTOGRAPHY, 38 (1), 41-53. doi:10.1007/s10623-004-5660-y
Courtois, N. (2006). How Fast can be Algebraic Attacks on Block Ciphers ?.
Courtois, N., Bard, G.V. (2006). Algebraic Cryptanalysis of the Data Encryption Standard.. IACR Cryptology ePrint Archive, 2006 402.
Courtois, N., Goubin, L. (2006). Cryptology and Smart Cards: the Way to Go.
Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G. (2006). The value of location information: A European-wide study. Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers, 112-121. doi:10.1007/978-3-642-04904-0_15
Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G. (2006). A study on the value of location privacy. Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, 109-118. doi:10.1145/1179601.1179621
Danezis, G. (2006). Breaking four mix-related schemes based on universal re-encryption. Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, 46-59. doi:10.1007/11836810_4
Danezis, G., Clayton, R. (2006). Route Fingerprinting in Anonymous Communications..
Danezis, G., Golle, P. (2006). Privacy enhancing technologies: Foreword. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4258 LNCS
Danezis, G., Wittneben, B. (2006). The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications..
Desmedt, Y. (2006). A high availability internetwork capable of accommodating compromised routers.
Desmedt, Y., Lange, T. (2006). Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baeck-Zheng. In DiCrescendo, G., Rubin, A.D. (Eds.), Financial Cryptography and Data Security. (pp. 154-159). Berlin/Heidelberg: Springer.
Desmedt, Y., Lange, T., Burmester, M. (2006). Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.. IACR Cryptology ePrint Archive, 2006 443.
Desmedt, Y., Pieprzyk, J., Steinfeld, R., Wang, H. (2006). A non-malleable group key exchange protocol robust against active insiders.
Desmedt, Y., Wang, Y., Burmester, M. (2006). Revisiting colored networks and privacy preserving censorship.
Führmann, C., Pym, D. (2006). Order-enriched categorical models of the classical sequent calculus. Journal of Pure and Applied Algebra, 204 (1), 21-78. doi:10.1016/j.jpaa.2005.03.016
Groth, J. (2006). Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures.
Groth, J., Ostrovsky, R., Sahai, A. (2006). Perfect Non-interactive Zero Knowledge for NP.
Groth, J., Ostrovsky, R., Sahai, A. (2006). Non-interactive Zaps and New Techniques for NIZK.
Jakimoski, G., Desmedt, Y. (2006). A Tree-based Model of Unicast Stream Authentication.. IACR Cryptology ePrint Archive, 2006 89.
Knoche, H., McCarthy, J.D., Sasse, M.A. (2006). A close-up on Mobile TV: The effect of low resolutions on shot types.
Knoche, H., Sasse, M.A. (2006). Breaking the news on mobile TV: user requirements of a popular mobile content..
Knoche, H., Sasse, M.A., McCarthy, J.D. (2006). Reading the Fine Print: The Effect of Text Legibility on Perceived Video Quality in Mobile TV.
Laqua, S., Patel, G., Sasse, M.A. (2006). Personalised Focus-Metaphor Interfaces: An Eye Tracking Study on User Confusion.
Murdoch, S.J. (2006). Hot or not: Revealing hidden services by their clock skew.
Peng, K., Nieto, J.M., Desmedt, Y., Dawson, E. (2006). Klein bottle routing: An alternative to onion routing and mix network.
Pym, D.J. (2006). Journal of Logic and Computation: Editorial. Journal of Logic and Computation, 16 (1), 1-3. doi:10.1093/logcom/exi069
Pym, D., Tofts, C. (2006). A calculus and logic of resources and processes. Formal Aspects of Computing, 18 (4), 495-517. doi:10.1007/s00165-006-0018-z
Sasse, A., Stewart, J., Aftelak, A., Nelissen, H., Ahn, J.Y., Steinhage, A., ...Pollington, D. (2006). User Requirements and Expectations. In Technologies for the Wireless Future: Wireless World Research Forum (WWRF). (pp. 15-58). .
Sasse, M.A., Knoche, H. (2006). Quality in Context - an ecological approach to assessing QoS for mobile TV.
Serjantov, A., Murdoch, S.J. (2006). Message Splitting Against the Partial Adversary..
Tafazolli, R., Uusitalo, M., Sasse, A., Arbanowski, S., Falconer, D., Fettweis, G., ...Sarma, A. (2006). Technologies for the Wireless Future: Wireless World Research Forum (WWRF). .
Wikström, D., Groth, J. (2006). An adaptively secure mix-net without erasures.

2005

(2005). Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings.
(2005). The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES.
Bond, M., Clulow, J., Murdoch, S.J. (2005). Bank Card PIN Mailer Security. UK Cards Association.
Bond, M., Clulow, J., Murdoch, S.J. (2005). PIN Mailer Evaluation Testing. UK Cards Association.
Bond, M., Danezis, G. (2005). The dining freemasons (security protocols for secret societies). Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, 258-265. doi:10.1007/978-3-540-77156-2_32
Bonhard, P., Sasse, M.A. (2005). "I thought it was terrible and everyone else loved it" - A New Perspective for Effective Recommender System Design.
Brostoff, S., Sasse, M.A., Chadwick, D., Cunningham, J., Mbanaso, U., Otenko, S. (2005). "R-What?" Development of a Role-Based Access Control (RBAC) Policy-Writing Tool for e-Scientists. Software Practice and Experience, 35 (9), 835-856. doi:10.1002/spe.691
Burmester, M., Desmedt, Y. (2005). A secure and scalable group key exchange system. Information Processing Letters, 94 (3), 137-143. doi:10.1016/j.ipl.2005.01.003
Camenisch, J., Groth, J. (2005). Group Signatures: Better Efficiency and New Theoretical Aspects.
Collinson, M., Pym, D., Robinson, E. (2005). On bunched polymorphism.
Courtois, N. (2005). Cryptanalysis of Sfinks.. IACR Cryptology ePrint Archive, 2005 243.
Courtois, N. (2005). Feistel Schemes and Bi-Linear Cryptanalysis.. IACR Cryptology ePrint Archive, 2005 251.
Courtois, N., Debraize, B., Garrido, E. (2005). On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions.. IACR Cryptology ePrint Archive, 2005 203.
Courtois, N., Goubin, L. (2005). An Algebraic Masking Method to Protect AES Against Power Attacks.. IACR Cryptology ePrint Archive, 2005 204.
Danezis, G., Anderson, R. (2005). The economics of resisting censorship. IEEE Security & Privacy, 3 45-50. doi:10.1109/MSP.2005.29
Danezis, G., Clulow, J. (2005). Compulsion resistant anonymous communications. Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, 11-25. doi:10.1007/11558859_2
Danezis, G., Díaz, C. (2005). Improving the Decoding Efficiency of Private Search..
Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R. (2005). Sybil-resistant DHT routing. Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, 305-318. doi:10.1007/11555827_18
Danezis, G., Lewis, S., Anderson, R.J. (2005). How Much Is Location Privacy Worth?.
Desmedt, Y. (2005). Potential impacts of a growing gap between theory and practice in information security (Extended abstract).
Desmedt, Y. (2005). Unconditionally private and reliable communication in an untrusted network.
Desmedt, Y. (2005). Robust operations.
Desmedt, Y. (2005). Potential Impacts of a Growing Gap Between Theory and Practice in Information Security..
Desmedt, Y. (2005). Man-in-the-Middle Attack.. In Tilborg, H.C.A.V. (Ed.), Encyclopedia of Cryptography and Security. Springer.
Desmedt, Y. (2005). Relay Attack.. In Tilborg, H.C.A.V. (Ed.), Encyclopedia of Cryptography and Security. Springer.
Desmedt, Y. (2005). Station-to-Station Protocol.. In Tilborg, H.C.A.V. (Ed.), Encyclopedia of Cryptography and Security. Springer.
Desmedt, Y. (2005). Threshold Cryptography.. In Tilborg, H.C.A.V. (Ed.), Encyclopedia of Cryptography and Security. Springer.
Desmedt, Y. (2005). Analyzing Survivable Computation in Critical Infrastructures. In Kumar, V., Srivastava, J., Lazarevic, A. (Eds.), Managing Cyber Threats: Issues, Approaches and Challenges. (pp. 267-280). Springer.
Desmedt, Y. (2005). ElGamal public key encryption. In van Tilborg, H.C.A. (Ed.), Encyclopedia of Cryptography and Security. (pp. 183-). Springer.
Desmedt, Y. (2005). Fiat-Shamir identification protocol and the Fiat-Shamir signature scheme. In van Tilborg, H.C.A. (Ed.), Encyclopedia of Cryptography and Security. (pp. 222-). Springer.
Desmedt, Y. (2005). Trojan horses, computer viruses and worms. In van Tilborg, H.C.A. (Ed.), Encyclopedia of Cryptography and Security. (pp. 627-628). Springer.
Desmedt, Y. (2005). Access structure. In van Tilborg, H.C.A. (Ed.), Encyclopedia of Cryptography and Security. (pp. 7-). Springer.
Desmedt, Y. (2005). Covert Channels. In van Tilborg, H.C.A. (Ed.), Encyclopedia of Cryptography and Security. (pp. 106-107). Springer.
Desmedt, Y. (2005). Deniable encryption. In van Tilborg, H.C.A. (Ed.), Encyclopedia of Cryptography and Security. (pp. 142-143). Springer.
Desmedt, Y. (2005). Knapsack Cryptographic Schemes. In Tilborg, H.V. (Ed.), Encyclopedia of Cryptography and Security. (pp. 333-342). Springer.
Desmedt, Y. (2005). .
Desmedt, Y., Kurosawa, K. (2005). Electronic voting: Starting over?.
Desmedt, Y., Kurosawa, K. (2005). .
Desmedt, Y., Wang, Y. (2005). .
Desmedt, Y., Wang, Y. (2005). .
Desmedt, Y., Wang, Y., Burmester, M. (2005). .
Desmedt, Y., Wang, Y.G., Burmester, M. (2005). A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback.
Desmedt, Y., Wang, Y.G., Safavi-Naini, R., Wang, H.X. (2005). Radio networks with reliable communication.
Desmedt, Y., Wang, Y., Safavi, R., Wang, H. (2005). .
Flechais, I., Riegelsberger, J., Sasse, M.A. (2005). Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems.
Galmiche, D., Méry, D., Pym, D. (2005). The semantics of BI and resource tableaux. Mathematical Structures in Computer Science, 15 (6), 1033-1088. doi:10.1017/S0960129505004858
Groth, J. (2005). Cryptography in Subgroups of Zn*.
Groth, J. (2005). Non-interactive Zero-Knowledge Arguments for Voting.
Inglesant, P., Sasse, M.A. (2005). Situating the transient user: overcomingchallenges in the design of e-governmentsystems.
Inglesant, P., Sasse, M.A. (2005). Usability is a policy issue: Minimising the "Hassle Factor" in mobile payment of the Central London Congestion Charge.
Jakimoski, G., Desmedt, Y. (2005). On Resistance of DES to Related-Key Differential Cryptanalysis.. IACR Cryptology ePrint Archive, 2005 84.
King, B., Desmedt, Y. (2005). Securing Abstention in an Electronic Legislature..
Knoche, H., McCarthy, J.D., Sasse, M.A. (2005). Can small be beautiful?: assessing image resolution requirements for mobile TV.
McCarthy, J.D., Riegelsberger, J., Sasse, M.A. (2005). Commercial uses of eye tracking.
Murdoch, S.J., Danezis, G. (2005). Low-cost traffic analysis of Tor. 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, 183-195. doi:10.1109/SP.2005.12
Murdoch, S.J., Lewis, S. (2005). Embedding covert channels into TCP/IP.
Pym, D. (2005). Journal of Logic and Computation: Editorial. Journal of Logic and Computation, 15 (6), 1-. doi:10.1093/logcom/exh054
Riegelsberger, J., Sasse, A., McCarthy, J.D. (2005). Rich media, poor judgement? A study of media effects on users' trust in expertise.
Riegelsberger, J., Sasse, M.A., McCarthy, J. (2005). Depending on the Kindness of Strangers? Trust Relationships in Ambient Societies..
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2005). The Mechanics of Trust: A Framework for Research and Design. International Journal of Human-Computer Studies, 62 (3), 381-422. doi:10.1016/j.ijhcs.2005.01.001
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2005). Do people trust their eyes more than ears?: media bias in detecting cues of expertise.
Sasse, M.A. (2005). Usability and Trust in Information Systems. In Mansell, R., Collins, B. (Eds.), Trust and Crime in Information Societies. (pp. 319-348). Cheltenham, UK: Edward Elgar.
Sasse, M.A., Flechais, I. (2005). Usable Security: Why Do We Need It? How Do We Get It?. In Cranor, L.F., Garfinkel, S. (Eds.), Security and Usability: Designing secure systems that people can use. (pp. 13-30). Sebastopol, US: O'Reilly.
Scholl, J., Parnes, P., McCarthy, J.D., Sasse, M.A. (2005). Designing a large-scale video chat application.
Van Le, T., Sparr, R., Wernsdorf, R., Desmedt, Y. (2005). Complementation-like and cyclic properties of AES round functions.

2004

(2004). The Inverse S-box and Two Paradoxes of Whitening.
Boardman, R., Sasse, M.A. (2004). “Stuff Goes into the Computer and Doesn’t Come Out”: A Cross-tool Study of Personal Information Management.
Bond, M., Cvrček, D., Murdoch, S.J. (2004). Unwrapping the Chrysalis. University of Cambridge Computer Laboratory.
Burmester, M., Desmedt, Y.G. (2004). Is hierarchical public-key certification the next target for hackers?. Communications of the ACM, 47 (8), 68-74. doi:10.1145/1012037.1012038
Crisler, K., Turner, T., Aftelak, A., Visciola, M., Steinhage, A., Anneroth, M., ...Tscheligi, M. (2004). Considering the User in the Wireless World. IEEE Communications Magazine, 42 (9), 56-62. doi:10.1109/MCOM.2004.1336721
Danezis, G. (2004). The traffic analysis of continuous-time mixes. Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, 35-50. doi:10.1007/11423409_3
Danezis, G., Laurie, B. (2004). Minx: A simple and efficient anonymous packet format. Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, 59-65. doi:10.1145/1029179.1029198
Danezis, G., Serjantov, A. (2004). Statistical Disclosure or Intersection Attacks on Anonymity Systems. Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, 293-308. doi:10.1007/978-3-540-30114-1_21
Desmedt, Y. (2004). .
Desmedt, Y. (2004). .
Desmedt, Y., Burmester, M. (2004). Identity-based key infrastructures (IKI).
Desmedt, Y., Burmester, M. (2004). .
Desmedt, Y., Patel, M.K. (2004). .
Desmedt, Y., Wang, Y. (2004). .
Desmedt, Y., Wang, Y.G. (2004). Analyzing vulnerabilities of critical infrastructures using flows and critical vertices in and/or graphs.
Führmann, C., Pym, D. (2004). On the geometry of interaction for classical logic.
Groth, J. (2004). Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast.
Groth, J. (2004). Evaluating Security of Voting Schemes in the Universal Composability Framework.
Groth, J. (2004). Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems.
Kurosawa, K., Desmedt, Y. (2004). A New Paradigm of Hybrid Encryption Scheme.
Le, T.V., Sparr, R., Wernsdorf, R., Desmedt, Y. (2004). .
McCarthy, J.D., Sasse, M.A., Miras, D. (2004). Sharp or Smooth? Comparing the effects of quantization vs. frame rate for streamed video.
McCarthy, J.D., Sasse, M.A., Riegelsberger, J. (2004). The Geometry of Web Search.
Murdoch, S.J., Zielinski, P. (2004). Covert channels for collusion in online computer games.
Pym, D.J., O'Hearn, P.W., Yang, H. (2004). Possible worlds and resources: The semantics of BI. THEORETICAL COMPUTER SCIENCE, 315 (1), 257-305. doi:10.1016/j.tcs.2003.11.020
Schulzrinne, H., Dimitrova, N., Sasse, M.A., Moon, S.B., Lienhart, R. (Eds.), (2004). Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004. ACM.
Schulzrinne, H., Dimitrova, N., Sasse, M.A., Moon, S.B., Lienhart, R. (Eds.), (2004). MULTIMEDIA ’04: Proceedings of the 12th annual ACM international conference on Multimedia. New York, NY, USA: ACM.
Wilson, G.M., Sasse, M.A. (2004). From doing to being: getting closer to the user experience. Interacting with Computers, 16 (4), 697-705.

2003

(2003). Did Filiol Break AES ?.
(2003). What do DES S-boxes Say to Each Other ?.
Boardman, R., Spence, R., Sasse, M.A. (2003). Too many hierarchies? The daily struggle for control of the workspace.
Brostoff, S., Sasse, M.A. (2003). “Ten strikes and you're out”: Increasing the number of login attempts can improve password usability.
Courtois, N., Meier, W. (2003). Algebraic Attacks on Stream Ciphers with Linear Feedback..
Damgard, I., Groth, J. (2003). Non-interactive and reusable non-malleable commitment schemes.
Damgård, I., Groth, J., Salomonsen, G. (2003). The Theory and Implementation of an Electronic Voting System. In Gritzalis, D. (Ed.), Secure Electronic Voting. (pp. 77-99). Kluwer Academic Publishers.
Danezis, G. (2003). Mix-networks with restricted routes. Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, 1-17. doi:10.1007/978-3-540-40956-4_1
Danezis, G. (2003). Statistical Disclosure Attacks..
Danezis, G. (2003). Statistical disclosure attacks: Traffic confirmation in open environments. IFIP Advances in Information and Communication Technology, 122 421-426. doi:10.1007/978-0-387-35691-4
Danezis, G., Dingledine, R., Mathewson, N. (2003). Mixminion: Design of a type III anonymous remailer protocol. 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA, 2-15. doi:10.1109/SECPRI.2003.1199323
Danezis, G., Sassaman, L. (2003). Heartbeat Traffic to Counter (n-1) Attacks: Red-Green-Black Mixes. Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, 89-93. doi:10.1145/1005140.1005154
Desmedt, Y.G.E. (2003). Public Key Cryptography. Proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2003). New York: Springer-Verlag.
Desmedt, Y., Kurosawa, K., Le, T.V. (2003). Error correcting and complexity aspects of linear secret sharing schemes.
Desmedt, Y., Safavi-Naini, R., Wang, H.X. (2003). Redistribution of mechanical secret shares.
Desmedt, Y., Wang, Y.G. (2003). Efficient zero-knowledge proofs for some practical graph problems.
Flechais, I., Sasse, M.A., Hailes, S. (2003). Bringing Security Home: A Process for Developing Secure and Usable Systems.
Garau, M., Slater, M., Vinayagamoorthy, V., Brogni, A., Steed, A., Sasse, M.A. (2003). The impact of avatar realism and eye gaze control on perceived quality of communication in a shared immersive virtual environment..
Groth, J. (2003). A Verifiable Secret Shuffle of Homomorphic Encryptions.
Harland, J., Pym, D. (2003). Resource-distribution via Boolean Constraints. ACM Transactions on Computational Logic, 4 (1), 56-90. doi:10.1145/601775.601778
Jakimoski, G., Desmedt, Y. (2003). Related-Key Differential Cryptanalysis of 192-Bit Ley{AES} Variants.
Mackenzie, D. (2003). A Game of Chance. New Scientist, 36-40.
McCarthy, J.D., Sasse, M.A., Riegelsberger, J. (2003). Could I have the Menu Please? An Eyetracking Study of Design Conventions.
Monthienvichienchai, R., Sasse, M.A. (2003). Learning from Others' Mistakes Through Computer Supported Vicarious Learning.
Pym, D.J. (2003). Editorial: The 'corner' on semantics. Journal of Logic and Computation, 13 (5), 633-638. doi:10.1093/logcom/13.5.633
Riegelsberger, J., Sasse, M.A. (2003). Designing E-Commerce Applications for Consumer Trust. In Petrovic, O., Ksela, M., Fallenbock, M., Kittl, C. (Eds.), Trust in the Network Economy. (pp. 97-110). Wien, New York: Springer.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). Shiny Happy People Building Trust? Photos on e-commerce Websites and Consumer Trust.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). Trust at First Sight? A Test of Users' Ability to Identify Trustworthy e-commerce Sites.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). The Researcher's Dilemma: Evaluating Trust in Computer Mediated Communications. International Journal of Human-Computer Studies, 58 (6), 759-781. doi:10.1016/S1071-5819(03)00042-9
Sasse, M.A. (2003). Computer Security:Anatomy of a Usability Disaster, and a Plan for Recovery.

2002

(2002). Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings.
Boardman, R., Sasse, M.A., Spence, R. (2002). Life Beyond the Mailbox: A Cross-Tool Perspective on Personal Information Management.
Bruneau, D., Sasse, M.A., McCarthy, J.D. (2002). The Eyes Never Lie: The Use of Eyetracking Data in HCI Research.
Clayton, R., Danezis, G. (2002). Chaffinch: Confidentiality in the face of legal threats. Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, 70-86. doi:10.1007/3-540-36415-3_5
Courtois, N., Pieprzyk, J. (2002). Cryptanalysis of Block Ciphers with Overdefined Systems of Equations.. IACR Cryptology ePrint Archive, 2002 44.
Crisler, K., Anneroth, M., Sasse, M.A., Pulli, P. (2002). A User-Focused ReferenceModel for WirelessSystems Beyond 3G. Eindhoven .
Desmedt, Y. (2002). Is there a Need for Survivable Computation in Critical Infrastructures?. Information Security Technical Report, 7 (2), 11-21. doi:10.1016/S1363-4127(02)02003-4
Desmedt, Y., Burmester, M., Kurosawa, K. (2002). On perfect traitor tracing.
Desmedt, Y., King, B. (2002). Verifiable democracy: A protocol to secure an electronic legislature.
Desmedt, Y., Wang, Y. (2002). Maximum Flows and Critical Vertices in AND/OR Graphs..
Desmedt, Y., Wang, Y. (2002). Perfectly Secure Message Transmission Revisited.. IACR Cryptology ePrint Archive, 2002 128.
Desmedt, Y., Wang, Y. (2002). Perfectly Secure Message Transmission Revisited.
Galmiche, D., Méry, D., Pym, D. (2002). Resource tableaux (extended abstract).
Ishtiaq, S., Pym, D.J. (2002). Kripke resource models of a dependently-typed, bunched λ-calculus. Journal of Logic and Computation, 12 (6), 1061-1104. doi:10.1093/logcom/12.6.1061
Le, T.V., Desmedt, Y. (2002). Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection.
Monthivienchienchai, R., Sasse, M.A., Wheeldon, R. (2002). Educational Metadata: Friendly Fire?. In Hazemi, R., Hailes, S. (Eds.), Support for Authoring and Managing Web-based coursework:. (pp. 203-214). Springer.
Reigelberger, J., Sasse, M.A. (2002). Face It - Photos Don't Make a Web Site Trustworthy.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2002). Eye-catcher or blind spot?.
Sasse, M.A., Monthienivichienchai, R., Harris, C., Ismail, I., Wheeldon, R. (2002). The TACO Project. In Hazemi, R., Hailes, S. (Eds.), Support for Authoring and Managing Web-based coursework. (pp. 139-132). Springer.
Sasse, M.A., Monthienvichienchai, R. (2002). Computer Support for Vicarious Learning.
Serjantov, A., Danezis, G. (2002). Towards an Information Theoretic Metric for Anonymity..
Sheeran, A., Sasse, M.A., Rimmer, J., Wakeman, I. (2002). How Web Browsers Shape User's Understanding of Networks. The Electronic Library, 20 (1), 35-42.
Terveen, L., Wixon, D., Comstoc, E., Sasse, M.A. (2002). Changing the World, Changing Ourselves.

2001

(2001). How web browsers shape users' understanding of networks.
(2001). Conducting audio and video quality assessment based on HCI evaluation principles. ERCIM News, 46 41-42.
(2001). On multivariate signature-only public key cryptosystems.
Adams, A., Sasse, M.A. (2001). Privacy in multimedia communications: protecting users, not just data.
Alexandris, N., Burmester, M., Chrissikopoulos, V., Desmedt, Y. (2001). Designated 2-verifier proofs and their application to electronic commerce.
Bouch, A., Sasse, M.A. (2001). Not all bits have equal value: Investigating users' network QoS requirements.
Bouch, A., Sasse, M.A. (2001). Designing QoS and charging mechanisms: he who pays the service shapes the design.
Bouch, A., Sasse, M.A. (2001). Why value is everything: A user centred approach to network Quality of Service and pricing.
Bouch, A., Wilson, G., Sasse, M.A. (2001). A 3-dimensional approach to measuring end-user quality of service.
Brostoff, S., Sasse, M.A. (2001). Safe and sound: a safety-critical design approach to security.
Clayton, R., Danezis, G., Kuhn, M.G. (2001). Real World Patterns of Failure in Anonymity Systems..
Desmedt, Y., Burmester, M., Seberry, J. (2001). Equitability in Retroactive Data Confiscation versus Proactive Key Escrow.
Garau, M., Slater, M., Bee, S., Sasse, M.A. (2001). The impact of eye gaze on communication using humanoid avatars.
Monthienvichienchai, R., Sasse, M.A., Wheeldon, R. (2001). There's trouble in paradise: problems with educational metadata encountered during the MALTED project.
Monthienvichienchai, R., Sasse, M.A., Wheeldon, R. (2001). Educational metadata - friend or foe?.
Pitt, J.V., Sasse, M.A. (2001). Privacy in collaborative multimedia environments.
Riegelsberger, J., Sasse, M.A. (2001). Trustbuilders and trustbusters: the role of trust cues in interfaces to e-commerce applications.
Sasse, M.A., Brostoff, S., Weirich, D. (2001). Transforming the "weakest link": a human-computer interaction approach to usable and effective security. BT Technology Journal, 19 122-131.
Weirich, D., Sasse, M.A. (2001). Persuasive password security.
Weirich, D., Sasse, M.A. (2001). Pretty good persuasion: A first step towards effective password security for the real world.
Wilson, G., Sasse, M.A. (2001). Straight from the heart: using physiological measurements in the evaluation of multimedia quality.

2000

Adams, C.M., Burmester, M., Desmedt, Y., Reiter, M.K., Zimmermann, P. (2000). Which PKI (public key infrastructure) is the right one? (panel session)..
Alexandris, N., Burmester, M., Chrissikopoulos, V., Desmedt, Y. (2000). Secure linking of customers, merchants and banks in electronic commerce. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 16 (4), 393-401. doi:10.1016/S0167-739X(99)00063-1
Beimel, A., Burmester, M., Desmedt, Y., Kushilevitz, E. (2000). Computing functions of a shared secret. SIAM JOURNAL ON DISCRETE MATHEMATICS, 13 (3), 324-345. doi:10.1137/S0895480195288819
Bouch, A., Sasse, M.A. (2000). The case for predictable media quality in networked multimedia applications.
Bouch, A., Sasse, M.A., DeMeer, H. (2000). Of packets and people: A user-centered approach to quality of service.
Brostoff, S., Sasse, M.A. (2000). Are passfaces more usable than passwords? A field trail investigation.
Burmester, M., Desmedt, Y., Doi, H., Mambo, M., Okamoto, E., Tada, M., Yoshifuji, Y. (2000). A structured ElGamal-type multisignature scheme.
Desmedt, Y., Kurosawa, K. (2000). How to break a practical MIX and design a new one.
Desmedt, Y., Le, T.V. (2000). Moiré cryptography..
Desmedt, Y., Le, T.V., Quisquater, J.J. (2000). Nonbinary audio cryptography.
Kurosawa, K., Yoshida, T., Desmedt, Y. (2000). Inherently large traceability of broadcast encryption scheme.
Rielgelsberger, J., Sasse, M.A. (2000). Trust me, I'm a .com. InterMedia, 28 (4), 23-27.
Rimmer, J., Wakeman, I., Sheeran, L., Sasse, M.A. (2000). Messages from a tangled web.
Sheeran, L., Sasse, M.A., Rimmer, J., Wakeman, I. (2000). Back to basics: is a better understanding of the Internet a precursor for effective use of the web?.
Wang, X.H., Huang, Y., Desmedt, Y., Rine, D. (2000). Enabling secure on-line DNS dynamic update.
Wang, X., Huang, Y., Desmedt, Y., Rine, D. (2000). Enabling Secure On-Line DNS Dynamic Update..
Wang, Y., Desmedt, Y., Burmester, M. (2000). Models For Dependable Computation with Multiple Inputs and Some Hardness Results..
Watson, A., Sasse, M.A. (2000). Distance education via IP videoconferencing: results from a national pilot project.
Watson, A., Sasse, M.A. (2000). The good, the bad and the muffled: the impact of different degradations on internet speech.
Wilson, G.M., Sasse, M.A. (2000). The head or the heart? Measuring the impact of media quality.
Wilson, G.M., Sasse, M.A. (2000). Listen to Your Heart Rate: Counting the Cost of Media Quality.. In Paivia, A. (Ed.), Affective Interactions - Towards a New Generation of Computer Interfaces. (pp. 9-20). Springer-Verlag.
Wilson, G.M., Sasse, M.A. (2000). Investigating the impact of audio degradations on users: subjective vs objective assessment methods.
Wilson, G., Sasse, M.A. (2000). Do users always know what's good for them?Utilising physiological responses to assess media quality.

1999

Adams, A., Sasse, M.A. (1999). Users are not the enemy. Communications of the ACM, 42 (12), 40-46.
Adams, A., Sasse, M.A. (1999). Taming the wolf in sheep's clothing: privacy in multimedia communications.
Adams, A., Sasse, M.A. (1999). Privacy issues in ubiquitous multimedia environments: wake sleeping dogs or let them lie?.
Bouch, A., Sasse, M.A. (1999). Network quality of service – an integrated perspective.
Bouch, A., Sasse, M.A. (1999). Network Quality of Service: what do users need?.
Bouch, A., Sasse, M.A. (1999). It ain't what you charge it's the way that you do it: a users' perspective of network Quality of Service and pricing.
Burmester, M., Desmedt, Y. (1999). Secure communication in an unknown network using certificates.
Burmester, M., Desmedt, Y., Itoh, T., Sakurai, K., Shizuya, H. (1999). Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages..
Desmedt, Y., King, B. (1999). Verifiable democracy.
Desmedt, Y., Wang, Y. (1999). Approximation hardness and secure communication in broadcast channels.
O'Hearn, P.W., Pym, D.J. (1999). The logic of bunched implications. BULLETIN OF SYMBOLIC LOGIC, 5 (2), 215-244. doi:10.2307/421090
Rimmer, J., Wakeman, I., Sheeran, L., Sasse, M.A. (1999). Examining users' repertoire of Internet applications.
Sasse, M.A., Johnson, C. (1999). Human-computer interaction INTERAGT '99 - IFIP TC.13 International Conference on Human-Computer Interaction, 30th August-3rd September 1999, Edinburgh, UK - Editors' preface: A perspective on failure.
Wang, Y.G., Desmedt, Y. (1999). Secure communication in broadcast channels: The answer to Franklin and Wright's question.

1998

Burmester, M., Desmedt, Y., Seberry, J. (1998). Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically) - Extended abstract.
Burmester, M., Desmedt, Y., Seberry, J. (1998). Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)..
Burmester, M., Desmedt, Y., Wang, Y.G. (1998). Using approximation hardness to achieve dependable computation.
Desmedt, Y. (1998). Information-theoretic secure identification.
Desmedt, Y. (1998). Some recent research aspects of threshold cryptography.
Desmedt, Y., Hou, S., Quisquater, J.J. (1998). Audio and optical cryptography.
Desmedt, Y., Hou, S., Quisquater, J.-.J. (1998). Cerebral Cryptography..
Desmedt, Y., King, B., Kishimoto, W., Kurosawa, K. (1998). A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group..
Desmedt, Y., Viswanathan, V. (1998). Unconditionally secure dynamic conference key distribution.
Hardman, V., Sasse, M.A., Kouvelas, I. (1998). Successful multiparty audio communication over the Internet. Communications of the ACM, 41 (5), 74-80. doi:10.1145/274946.274959
Hughes, J., Sasse, M.A. (1998). Design to Instruct: Lessons for Training ThroughInvolving Teachers in Design..
Kurosawa, K., Desmedt, Y. (1998). Optimum traitor tracing and asymmetric schemes.
Kurosawa, K., Yoshida, T., Desmedt, Y., Burmester, M. (1998). Some bounds and a construction for secure broadcast encryption.
Sasse, M.A., Clark, L., Perkins, C. (1998). Piloting IP multicast conferencing over SuperJANET: the PIPVIC Project.
Sasse, M.A., Harris, C., Ismail, I., Monthienvichienchai, P. (1998). Support for authoring and managing web-based coursework: the TACO Project. In Hazemi, R., Hailes, S., Wilbur, S. (Eds.), The Digital University: Reinventing the Academy. (pp. 155-175). Berlin: Springer-Verlag.
Watson, A., Sasse, M.A. (1998). Measuring perceived quality of speech and video in multimedia conferencing applications.

1997

Adams, A., Sasse, M.A., Lunt, P. (1997). Making Passwords Secure and Usable.
Burmester, M., Desmedt, Y., Piper, F., Walker, M. (1997). A General Zero-Knowledge Scheme..
Clark, L., Sasse, M.A. (1997). Conceptual Design Reconsidered: The Case of the Internet Session Directory Tool.
Hughes, J., Sasse, M.A. (1997). Internet Multimedia Conferencing - Results from the ReLaTe Project.
Kirstein, P.T., Bennett, R. (1997). Recent Activities in the MERCI Conferencing Project.
Perkins, C., Hardman, V., Kouvelas, I., Sasse, M.A. (1997). Multicast Audio: The Next Generation.
Watson, A., Sasse, M.A. (1997). Multimedia Conferencing via Multicast: Determining the Quality of Service Required by the End User.

1996

Blackburn, S.R., Burmester, M., Desmedt, Y., Wild, P.R. (1996). Efficient multiplicative sharing schemes.
Burmester, M., Desmedt, Y. (1996). Efficient and Secure Conference-Key Distribution..
Burmester, M., Desmedt, Y., Itoh, T., Sakurai, K., Shizuya, H., Yung, M. (1996). A Progress Report on Subliminal-Free Channels..
Desmedt, Y. (1996). Simmons' protocol is not free of subliminal channels.
Sasse, A., Watson, A. (1996). Remote language teaching over SuperJANET: The ReLaTe project. IEE Colloquium (Digest), (148),
Sasse, A., Watson, A. (1996). Remote Language Teaching over SuperJANET: The ReLaTe project. IEE Colloquium (Digest), (148),
Sasse, M.A., Cunningham, J., Winder, R.L. (Eds.), (1996). People and Computers XI, Proceedings of HCI ’96. Springer.
Watson, A., Sasse, A. (1996). Assessing the usability and effectiveness of a remote language teaching system.
Watson, A., Sasse, M.A. (1996). Evaluating audio and video quality in low-cost multimedia conferencing systems. INTERACTING WITH COMPUTERS, 8 (3), 255-275. doi:10.1016/0953-5438(96)01032-6

1995

Desmedt, Y. (1995). Extending Reed-Solomon codes to modules.
Desmedt, Y. (1995). Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract)..
Desmedt, Y., DiCrescenzo, G., Burmester, M. (1995). Multiplicative non-abelian sharing schemes and their application to threshold cryptography.
Hardman, V., Sasse, M.A., Handley, M., Watson, A. (1995). Reliable audio for use over the Internet.
Kirstein, P., Handley, M., Sasse, A., Clayman, S. (1995). Recent activities in the MICE conferencing project.

1994

(1994). Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings.
Bilting, U., Sasse, M.A., Schulz, C.-.D., Turletti, T. (1994). International Research Seminars through Multimedia Conferencing: Experiences from the MICE project..
Burmester, M., Desmedt, Y. (1994). A Secure and Efficient Conference Key Distribution System (Extended Abstract)..
Desmedt, Y. (1994). Threshold cryptography.. European Transactions on Telecommunications, 5 (4), 449-458. doi:10.1002/ett.4460050407
Desmedt, Y., Frankel, Y. (1994). Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group..
Handley, M.J., Kirstein, P.T., Angela Sasse, M. (1994). Multimedia integrated conferencing for European researchers: experiences form the MICE project. IEE Colloquium (Digest), (59),
Sasse, M.A., Bilting, U., Schulz, C.D., Turletti, T. (1994). Remote Seminars through Multimedia Conferencing:Experiences from the MICE project.
Sasse, M.A., Handley, M.J. (1994). Workstation-based multimedia conferencing: experiences from the MICE project.
SASSE, M.A., HANDLEY, M.J., ISMAIL, N.M. (1994). Coping with Complexity and Interference - Design Issues in Multimedia Conferencing Systems.

1993

Desmedt, Y. (1993). Computer security by redefining what a computer is..
Desmedt, Y., Burmester, M. (1993). Towards Practical "Proven Secure" Authenticated Key Distribution..
Handley, M., Kirstein, P.T., Sasse, M.A. (1993). Multimedia Integrated Conferencing for European Researchers (MICE): Piloting Activities and the Conference Management and Multiplexing Centre..
Sasse, M.A., Handley, M.J., Chuang, S.C. (1993). Support for Collaborative Authoring via Email - The MESSIE Environment.

1992

BURMESTER, M., DESMEDT, Y. (1992). ZERO-KNOWLEDGE BASED IDENTIFICATION - FROM A THEORETICAL CONCEPT TOWARDS A PRACTICAL TOKEN. IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 13 479-485.
BURMESTER, M., DESMEDT, Y. (1992). ZERO-KNOWLEDGE BASED IDENTIFICATION - FROM A THEORETICAL CONCEPT TOWARDS A PRACTICAL TOKEN.
BURMESTER, M., DESMEDT, Y., BETH, T. (1992). EFFICIENT ZERO-KNOWLEDGE IDENTIFICATION SCHEMES FOR SMART CARDS. COMPUTER JOURNAL, 35 (1), 21-29. doi:10.1093/comjnl/35.1.21
Davida, G.I., Desmedt, Y. (1992). Passports and visas versus IDs..
DESMEDT, Y. (1992). BREAKING THE TRADITIONAL COMPUTER SECURITY RESEARCH BARRIERS.
DESMEDT, Y. (1992). BREAKING THE TRADITIONAL COMPUTER SECURITY RESEARCH BARRIERS. LECTURE NOTES IN COMPUTER SCIENCE, 648 125-138.
Desmedt, Y. (1992). Treshold Cryptosystems (invited talk)..
Desmedt, Y. (1992). Breaking the Traditional Computer Security Barriers..
DESMEDT, Y., FRANKEL, Y. (1992). SHARED GENERATION OF AUTHENTICATORS AND SIGNATURES.
DESMEDT, Y., FRANKEL, Y. (1992). SHARED GENERATION OF AUTHENTICATORS AND SIGNATURES. LECTURE NOTES IN COMPUTER SCIENCE, 576 457-469.
DESMEDT, Y., FRANKEL, Y., YUNG, M. (1992). MULTIRECEIVER MULTISENDER NETWORK SECURITY - EFFICIENT AUTHENTICATED MULTICAST FEEDBACK.
Desmedt, Y., Landrock, P., Lenstra, A.K., McCurley, K.S., Odlyzko, A.M., Rueppel, R.A., Smid, M.E. (1992). The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel)..
Desmedt, Y., Seberry, J. (1992). Practical Proven Secure Authentication with Arbitration..
Frankel, Y., Desmedt, Y. (1992). Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract)..
Frankel, Y., Desmedt, Y., Burmester, M. (1992). Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract)..

1991

Bengio, S., Brassard, G., Desmedt, Y., Goutier, C., Quisquater, J.-.J. (1991). Secure Implementations of Identification Systems..
Beth, T., Desmedt, Y. (1991). Identification Tokens - or: Solving the Chess Grandmaster Problem..
BETH, T., DESMEDT, Y. (1991). IDENTIFICATION TOKENS OR - SOLVING THE CHESS GRANDMASTER PROBLEM. LECTURE NOTES IN COMPUTER SCIENCE, 537 169-176.
BURMESTER, M., DESMEDT, Y. (1991). BROADCAST INTERACTIVE PROOFS.
BURMESTER, M., DESMEDT, Y. (1991). BROADCAST INTERACTIVE PROOFS. LECTURE NOTES IN COMPUTER SCIENCE, 547 81-95.
Burmester, M., Desmedt, Y. (1991). Broadcast Interactive Proofs (Extended Abstract)..
BURMESTER, M.V.D., DESMEDT, Y. (1991). ALL LANGUAGES IN NP HAVE DIVERTIBLE ZERO-KNOWLEDGE PROOFS AND ARGUMENTS UNDER CRYPTOGRAPHIC ASSUMPTIONS. LECTURE NOTES IN COMPUTER SCIENCE, 473 1-10.
DAVIDA, G., DESMEDT, Y., PERALTA, R. (1991). ON THE IMPORTANCE OF MEMORY RESOURCES IN THE SECURITY OF KEY EXCHANGE PROTOCOLS. LECTURE NOTES IN COMPUTER SCIENCE, 473 11-15.
Desmedt, Y., Burmester, M. (1991). An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers..
Desmedt, Y., Frankel, Y. (1991). Shared Generation of Authenticators and Signatures (Extended Abstract)..
Desmedt, Y.G. (1991). THE “A” CIPHER DOES NOT NECESSARILY STRENGTHEN SECURITY. Cryptologia, 15 (3), 203-206. doi:10.1080/0161-119191865867
DESMEDT, Y., YUNG, M. (1991). ARBITRATED UNCONDITIONALLY SECURE AUTHENTICATION CAN BE UNCONDITIONALLY PROTECTED AGAINST ARBITER ATTACKS.
DESMEDT, Y., YUNG, M. (1991). ARBITRATED UNCONDITIONALLY SECURE AUTHENTICATION CAN BE UNCONDITIONALLY PROTECTED AGAINST ARBITER ATTACKS. LECTURE NOTES IN COMPUTER SCIENCE, 537 177-188.
Desmedt, Y., Yung, M. (1991). Weakness of Undeniable Signature Schemes (Extended Abstract)..
DESMEDT, Y., YUNG, M.T. (1991). WEAKNESSES OF UNDENIABLE SIGNATURE SCHEMES.
DESMEDT, Y., YUNG, M.T. (1991). WEAKNESSES OF UNDENIABLE SIGNATURE SCHEMES. LECTURE NOTES IN COMPUTER SCIENCE, 547 205-220.
Quisquater, J.-.J., Desmedt, Y. (1991). Chinese Lotto as an Exhaustive Code-Breaking Machine..
Sasse, M.A. (1991). How to t(r)ap user's mental models..

1990

BURMESTER, M.V.D., DESMEDT, Y., PIPER, F., WALKER, M. (1990). A GENERAL ZERO-KNOWLEDGE SCHEME.
DAVIDA, G., DESMEDT, Y., PERALTA, R. (1990). A KEY DISTRIBUTION-SYSTEM BASED ON ANY 1-WAY FUNCTION.
Davida, G.I., Desmedt, Y. (1990). Cryptography Based Data Security..
DESMEDT, Y. (1990). PROTECTING AGAINST ABUSES OF CRYPTOSYSTEMS IN PARTICULAR IN THE CONTEXT OF VERIFICATION OF PEACE TREATIES.
DESMEDT, Y. (1990). ABUSES IN CRYPTOGRAPHY AND HOW TO FIGHT THEM.
DESMEDT, Y. (1990). ABUSES IN CRYPTOGRAPHY AND HOW TO FIGHT THEM. LECTURE NOTES IN COMPUTER SCIENCE, 403 375-389.
DESMEDT, Y., FRANKEL, Y. (1990). THRESHOLD CRYPTOSYSTEMS.
DESMEDT, Y., FRANKEL, Y. (1990). THRESHOLD CRYPTOSYSTEMS. LECTURE NOTES IN COMPUTER SCIENCE, 435 307-315.
Desmedt, Y., Yung, M. (1990). Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract)..

1989

Burmester, M., Desmedt, Y., Piper, F., Walker, M. (1989). A General Zero-Knowledge Scheme (Extended Abstract)..
Davida, G.I., Desmedt, Y., Matt, B.J. (1989). Defending Systems against Viruses through Cryptographic Authentication..
Davida, G.I., Desmedt, Y., Peralta, R. (1989). A Key Distribution System Based On Any One-Way Function (Extended Abstract)..
Desmedt, Y. (1989). Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context..

1988

Davida, G.I., Desmedt, Y. (1988). Passports and Visas Versus IDS (Extended Abstract)..
DESMEDT, Y. (1988). SOCIETY AND GROUP ORIENTED CRYPTOGRAPHY - A NEW CONCEPT. LECTURE NOTES IN COMPUTER SCIENCE, 293 120-127.
DESMEDT, Y. (1988). SUBLIMINAL-FREE AUTHENTICATION AND SIGNATURE. LECTURE NOTES IN COMPUTER SCIENCE, 330 23-33.
Desmedt, Y. (1988). Subliminal-Free Authentication and Signature (Extended Abstract)..
DESMEDT, Y., GOUTIER, C., BENGIO, S. (1988). SPECIAL USES AND ABUSES OF THE FIAT-SHAMIR PASSPORT PROTOCOL. LECTURE NOTES IN COMPUTER SCIENCE, 293 21-39.

1987

DESMEDT, Y. (1987). IS THERE AN ULTIMATE USE OF CRYPTOGRAPHY (EXTENDED ABSTRACT). LECTURE NOTES IN COMPUTER SCIENCE, 263 459-463.
DESMEDT, Y., QUISQUATER, J.J. (1987). PUBLIC-KEY SYSTEMS BASED ON THE DIFFICULTY OF TAMPERING (IS THERE A DIFFERENCE BETWEEN DES AND RSA). LECTURE NOTES IN COMPUTER SCIENCE, 263 111-117.

1986

Cloetens, H., Desmedt, Y., Bierens, L., Vandewalle, J., Govaerts, R. (1986). Additional Properties in the S-Boxes of the DES..
DESMEDT, Y. (1986). UNCONDITIONALLY SECURE AUTHENTICATION SCHEMES AND PRACTICAL AND THEORETICAL CONSEQUENCES. LECTURE NOTES IN COMPUTER SCIENCE, 218 42-55.
Desmedt, Y. (1986). Is There an ultimate Use of Cryptography?.
Desmedt, Y., Hoornaert, F., Quisquater, J.-.J. (1986). Several Exhaustive Key Search Machines and DES..
DESMEDT, Y., ODLYZKO, A.M. (1986). A CHOSEN TEXT ATTACK ON THE RSA CRYPTOSYSTEM AND SOME DISCRETE LOGARITHM SCHEMES. LECTURE NOTES IN COMPUTER SCIENCE, 218 516-522.
QUISQUATER, J.J., DESMEDT, Y., DAVIO, M. (1986). THE IMPORTANCE OF GOOD KEY SCHEDULING SCHEMES (HOW TO MAKE A SECURE DES SCHEME WITH LESS-THAN-OR-EQUAL-TO-48 BIT KEYS). LECTURE NOTES IN COMPUTER SCIENCE, 218 537-542.

1985

DAVIO, M., DESMEDT, Y., QUISQUATER, J.J. (1985). PROPAGATION CHARACTERISTICS OF THE DES. LECTURE NOTES IN COMPUTER SCIENCE, 209 62-73.
DELSARTE, P., DESMEDT, Y., ODLYZKO, A., PIRET, P. (1985). FAST CRYPTANALYSIS OF THE MATSUMOTO-IMAI PUBLIC KEY SCHEME. LECTURE NOTES IN COMPUTER SCIENCE, 209 142-149.
Quisquater, J.-.J., Desmedt, Y., Davio, M. (1985). The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys)..

1984

Davio, M., Desmedt, Y., Goubert, J., Hoornaert, F., Quisquater, J.-.J. (1984). Efficient Hardware and Software Implementations for the DES..
Desmedt, Y., Quisquater, J.-.J., Davio, M. (1984). Dependence of Output on Input in DES: Small Avalanche Characteristics..
Desmedt, Y., Vandewalle, J., Govaerts, R. (1984). A critical analysis of the security of knapsack public-key algorithms..
Govaerts, R., Desmedt, Y., Vandewalle, J. (1984). Cryptography: How to Attack, What to Protect?.
Hoornaert, F., Goubert, J., Desmedt, Y. (1984). Efficient Hardware Implementation of the DES..

1983

Davio, M., Desmedt, Y., Fosseprez, M., Govaerts, R., Hulsbosch, J., Neutjens, P., ...Wouters, P. (1983). Analytical Characteristics of the DES..
DESMEDT, Y., VANDEWALLE, J., GOVAERTS, R. (1983). LINEAR ALGEBRA AND EXTENDED MAPPINGS GENERALIZE PUBLIC KEY CRYPTOGRAPHIC KNAPSACK ALGORITHMS. ELECTRONICS LETTERS, 19 (10), 379-381. doi:10.1049/el:19830262

1982

DESMEDT, Y., VANDEWALLE, J., GOVAERTS, R. (1982). HOW ITERATIVE TRANSFORMATIONS CAN HELP TO CRACK THE MERKLE-HELLMAN CRYPTOGRAPHIC SCHEME. ELECTRONICS LETTERS, 18 (21), 910-911. doi:10.1049/el:19820620

This page was generated automatically.