skip to content

Department of Computer Science and Technology

  • Professor of Security and Privacy
  • Head, Academic Centre of Excellence in Cyber Security Research
  • Fellow, Trinity College

Ceci n'est pas ma page web (as Magritte might have said).

My real web page is at http://frank.stajano.com

Biography

Frank Stajano is Full Professor of Security and Privacy at the University of Cambridge, where he is also the Head of the GCHQ-endorsed Academic Centre of Excellence in Cyber Security Research. He is a Fellow of Trinity College, Cambridge, where he shares a room with Nobel laureate astrophysicist Didier Queloz. He holds a PhD in Computer Science from the University of Cambridge and a Laurea (Master) in electronic engineering from La Sapienza University of Rome. He received a prestigious ERC grant for his Pico project, a more usable and more secure alternative to passwords. His broad research goal is to make the digital society safe, secure and fair for non-geeks. His research interests include security, privacy and usability. A pioneer of IoT security, he published the book “Security for Ubiquitous Computing” for Wiley in 2002 and two of his scientific articles on this topic have over one thousand and two thousand citations respectively. To address the skills shortage in cyber, he founded and hosted national (Inter-ACE) and international (C2C aka Cambridge2Cambridge) cyber security competitions, the latter with MIT. He now serves on the steering committee of the new C2C (Country2Country) that runs under the auspices of the INCS-CoE. Before and alongside his academic career he has been a research scientist at Google, Toshiba, Oracle, Olivetti and AT&T and therefore his research retains a strong practical orientation. He is the CEO and co-founder of Cambridge Cyber, a security consultancy offering strategic advice, training and penetration testing services (open for business: givenname at cambridgecyber.com). At Cambridge he has taught a variety of courses spanning the whole spectrum from assembly language, hardware design and computer architecture to digital communications, algorithms and computer security. He makes his lectures freely available to all on his youtube channel, FrankStajanoExplains.com. He loves explaining complex ideas and helping others reach a "lightbulb" moment. A published author and a popular public speaker, he has given invited talks in four continents and he is fluent in three languages. In his spare time he is a comics scholar with several books to his credit. A 4th dan in kendo, he trains regularly in Japan and teaches the Way of the Japanese sword at the University of Cambridge.

Themes

Teaching

I run a Youtube channel, Frank Stajano Explains (.com), for students of computer science and for younger people whom I hope to inspire to become students of computer science in the future. The same lectures I give to my Cambridge students are now available to everyone in the world, at no charge. Check it out and subscribe!

Publications

See my real web page or google scholar, which is less accurate but has citation counts.

Conference proceedings

  • Stajano, F., 2023. Sleepwalking into disaster? Requirements engineering for digital cash Proceedings of Security Protocols Workshop 2023,
  • Stajano, F. and Bauer, L., 2020. Message from the Euro SP 2020 Program Chairs Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020,
    Doi: http://doi.org/10.1109/EuroSP48549.2020.00005
  • Piessens, F. and Stajano, F., 2019. Message from the program chairs Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019,
    Doi: http://doi.org/10.1109/EuroSP.2019.00006
  • Stajano, F., 2017. Red button and yellow button: Usable security for lost security tokens (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10368 LNCS
    Doi: http://doi.org/10.1007/978-3-319-62033-6_20
  • Stajano, F., 2017. Assuring the safety of asymmetric social protocols (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10476 LNCS
    Doi: http://doi.org/10.1007/978-3-319-71075-4_6
  • Gligor, V. and Stajano, F., 2017. Assuring the safety of asymmetric social protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10476 LNCS
    Doi: http://doi.org/10.1007/978-3-319-71075-4_5
  • Krol, KK., Aebischer, S., Llewellyn-Jones, D., Dettoni, C. and Stajano, F., 2017. Seamless Authentication with Pico
  • Aebischer, S., Dettoni, C., Jenkinson, G., Krol, KK., Llewellyn-Jones, D., Masui, T. and Stajano, F., 2017. Pico in the Wild: Replacing Passwords, One Site at a Time
    Doi: http://doi.org/10.14722/eurousec.2017.23017
  • Goldberg, I., Jenkinson, G. and Stajano, F., 2016. Low-cost mitigation against cold boot attacks for an authentication token Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9696
    Doi: 10.1007/978-3-319-39555-5_3
  • Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. and Anderson, J., 2015. Security protocols XXIII: 23rd International workshop Cambridge, UK, march 31 - april 2, 2015 revised selected papers Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9379
  • Stajano, F., Christianson, B., Lomas, M., Jenkinson, G., Payne, J., Spencer, M. and Stafford-Fraser, Q., 2015. Pico without public keys Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9379
    Doi: 10.1007/978-3-319-26096-9_21
  • Stajano, F., 2015. Pico without public keys (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9379
    Doi: 10.1007/978-3-319-26096-9_22
  • Stajano, F., Spencer, M., Jenkinson, G. and Stafford-Fraser, Q., 2015. Password-manager friendly (PMF): Semantic annotations to improve the effectiveness of password managers Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9393 LNCS
    Doi: 10.1007/978-3-319-24192-0_4
  • Millican, J. and Stajano, F., 2015. SAVVIcode: Preventing mafia attacks on visual code authentication schemes (short paper) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9393 LNCS
    Doi: 10.1007/978-3-319-24192-0_10
  • Aloteibi, S. and Stajano, F., 2014. On the value of hybrid security testing Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7061
    Doi: 10.1007/978-3-662-45921-8_30
  • Anderson, J. and Stajano, F., 2014. On storing private keys in the cloud Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7061
    Doi: 10.1007/978-3-662-45921-8_16
  • Christianson, B., Shafarenko, A., Stajano, F. and Wong, FL., 2014. Relay-proof channels using UWB lasers Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7061
    Doi: http://doi.org/10.1007/978-3-662-45921-8_8
  • Stafford-Fraser, Q., Stajano, F., Warrington, C., Jenkinson, G., Spencer, M. and Payne, J., 2014. To have and have not: Variations on secret sharing to model user presence UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing,
    Doi: 10.1145/2638728.2641705
  • Anderson, R. and Stajano, F., 2014. It’s the anthropology, stupid! Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7061
    Doi: 10.1007/978-3-662-45921-8_20
  • Bonneau, J., Herley, C., van Oorschot, PC. and Stajano, F., 2012. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
    Doi: 10.1109/SP.2012.44
  • Stannard, O. and Stajano, FM., 2012. Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Security Protocols 2012: Security Protocols XX,
    Doi: http://doi.org/10.1007/978-3-642-35694-0_24
  • 2011. Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers Security Protocols Workshop, v. 7114
  • Choudary, O., 2011. Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion). Security Protocols Workshop, v. 7114
  • Stajano, F., 2011. Pico: No more passwords! Proc. Security Protocols Workshop 2011, v. 7114
  • Anderson, J., Bonneau, J. and Stajano, F., 2010. Inglorious Installers: Security in the Application Marketplace. WEIS,
  • 2010. Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010 WISEC,
  • Stajano, F., Wong, FL. and Christianson, B., 2010. Multichannel Protocols to Prevent Relay Attacks FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, v. 6052
  • Church, L., Anderson, J., Bonneau, J. and Stajano, F., 2009. Privacy stories: confidence in privacy behaviors through end user programming. SOUPS,
  • Anderson, J., Diaz, C., Bonneau, J. and Stajano, F., 2009. Privacy-Enabling Social Networking Over Untrusted Networks 2ND ACM SIGCOMM WORKSHOP ON ONLINE SOCIAL NETWORKS (WOSN 09),
  • Johnson, M. and Stajano, F., 2009. Usability of Security Management: Defining the Permissions of Guests SECURITY PROTOCOLS, v. 5087
  • Church, L., Anderson, J., Bonneau, J. and Stajano, F., 2009. Privacy stories Proceedings of the 5th Symposium on Usable Privacy and Security,
    Doi: http://doi.org/10.1145/1572532.1572559
  • Roman, BA., Chatzigeorgiou, I., Wassell, IJ. and Stajano, F., 2009. Evaluation of Multi-Carrier Burst Contention and IEEE 802.11 with fading during channel sensing. PIMRC,
  • Stajano, F., Cvrcek, D. and Lewis, M., 2008. Steel, cast iron and concrete: Security engineering for real world wireless sensor networks APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, v. 5037
  • Roman, B., Stajano, F., Wassell, I. and Cottingham, D., 2008. Multi-carrier burst contention (MCBC): Scalable medium access control for wireless networks WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7,
  • Christianson, B., Stajano, F., Laurie, B., de Medeiros, B., Roe, M. and Danezis, G., 2007. Anonymous context based role activation mechanism (Transcript of discussion) SECURITY PROTOCOLS, v. 4631
  • Wong, FL., Lin, M., Nagaraja, S., Wassell, I. and Stajano, F., 2007. Evaluation framework of location privacy of wireless mobile systems with arbitrary beam pattern CNSR 2007: Proceedings of the Fifth Annual Conference on Communication Networks and Services Research,
  • Bond, M., Anderson, R., Aura, T., Christianson, B., Stajano, F., Blaze, M., Danezis, G., Roe, M., Zugenmaier, A., Desmedt, Y. and Laurie, B., 2007. The dining freemasons (security protocols for secret societies) SECURITY PROTOCOLS, v. 4631
  • Johnson, M., Laurie, B., Desmedt, Y., Anderson, R., Christianson, B., Roe, M., Bond, M., Aura, T., Lomas, M., Clayton, R., Stajano, F., Nikander, P. and de Medeiros, B., 2007. Implementing a multi-hat PDA (Transcript of discussion) SECURITY PROTOCOLS, v. 4631
  • Wong, FL., Stajano, F. and Clulow, J., 2007. Repairing the bluetooth pairing protocol SECURITY PROTOCOLS, v. 4631
  • Stajano, F., 2007. Repairing the bluetooth pairing protocol SECURITY PROTOCOLS, v. 4631
  • 2007. Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings ESAS, v. 4572
  • Wong, FL. and Stajano, F., 2007. Multi-channel protocols SECURITY PROTOCOLS, v. 4631
  • Kim, J., Beresford, AR. and Stajano, F., 2007. Towards a security policy for ubiquitous healthcare systems (Position paper) Ubiquitous Convergence Technology, v. 4412
  • de Medeiros, B., Stajano, F., Clayton, R., Laurie, B., Burmester, M., Christianson, B., Desmedt, Y., Roe, M. and Li, J., 2007. Community-centric vanilla-rollback access, or: How I stopped worrying and learned to love my computer SECURITY PROTOCOLS, v. 4631
  • 2007. Ubiquitous Convergence Technology, First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers ICUCT, v. 4412
  • Gligor, V., Stajano, F., Foley, S., Anderson, R., Bond, M., Desmedt, Y. and Burmester, M., 2007. On the evolution of adversary models in security protocols (or know your friend and foe alike) (tanscript of discussion) SECURITY PROTOCOLS, v. 4631
  • Laurie, B., Stajano, F., Danezis, G., Christianson, B. and Clayton, R., 2007. Safer scripting through precompilation SECURITY PROTOCOLS, v. 4631
  • Johnson, M. and Stajano, F., 2007. Implementing a multi-hat PDA SECURITY PROTOCOLS, v. 4631
  • Wong, FL. and Stajano, F., 2006. Multi-channel protocols for group key agreement in arbitrary topologies Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Proceedings,
  • Bohm, D., Lamming, M., Mayo, RN., Morgan, J., Zhang, K., Blaze, M., Roe, M., Clayton, R., Christianson, B., Aura, T., Stajano, F., Danezis, G., Mitchell, C., Lomas, M., Gligor, V. and Bond, M., 2006. Controlling who tracks me Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
  • Stajano, F., 2006. One user, many hats; and, sometimes, no hat: Towards a secure yet usable PDA SECURITY PROTOCOLS, v. 3957
  • Rehman, K., Stajano, F. and Coulouris, G., 2005. Visually interactive location-aware computing UBICOMP 2005: UBIQUITOUS COMPUTING, PROCEEDINGS, v. 3660
  • Pablo, V., Glenford, EM., Frank, S., Jon, C. and Carlos, JB., 2005. A Practical Approach for 4G Systems: Deployment of Overlay Networks TRIDENTCOM,
  • Vidales, P., Mapp, GE., Stajano, F., Crowcroft, J. and Bernardos, CJ., 2005. A Practical Approach for 4G Systems: Deployment of Overlay Networks. TRIDENTCOM,
    Doi: 10.1109/TRIDNT.2005.4
  • Wong, FL. and Stajano, F., 2005. Location privacy in Bluetooth SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, v. 3813
  • Beresford, AR. and Stajano, F., 2004. Mix zones: User privacy in location-aware services SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
  • Stajano, F., 2004. One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion). Security Protocols Workshop, v. 3957
  • Stajano, F., 2004. Security in pervasive computing SECURITY IN PERVASIVE COMPUTING, v. 2802
  • Stajano, F., 2004. Will your digital butlers betray you? WPES,
  • Stajano, F., 2004. Security for Ubiquitous Computing. ICISC, v. 3506
  • Stajano, F., 2003. The security challenges of ubiquitous computing CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, v. 2779
  • Stajano, F., 2003. Security for whom? The shifting security assumptions of pervasive computing SOFTWARE SECURITY - THEORIES AND SYSTEMS, v. 2609
  • Stajano, F. and Isozaki, H., 2002. Security issues for Internet appliances 2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT) WORKSHOPS, PROCEEDINGS,
  • Nakajima, T., Ishikawa, H., Tokunaga, E. and Stajano, F., 2002. Technology challenges for building Internet-scale ubiquitous computing PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS,
  • Rehman, K., Stajano, F. and Coulouris, G., 2002. Interfacing with the invisible computer. NordiCHI,
  • Stajano, F., 2000. The Resurrecting Duckling - What Next? Security Protocols Workshop, v. 2133
  • Stajano, F., 2000. The Resurrecting Duckling - What Next? (Transcript of Discussion). Security Protocols Workshop, v. 2133
  • Stajano, F. and Anderson, R., 2000. The resurrecting duckling: Security issues for ad-hoc wireless networks SECURITY PROTOCOLS, v. 1796
  • Stajano, F., Morris, B., Christianson, B., Gligor, V., Anderson, R., Roe, M., Blaze, M. and Wheeler, D., 2000. The resurrecting duckling SECURITY PROTOCOLS, v. 1796
  • Sasaki, R., Stajano, F., Roe, M., Bergadano, F., Christianson, B., Gollman, D., Kuhn, M., Blaze, M. and Needham, R., 2000. Internet-marks SECURITY PROTOCOLS, v. 1796
  • Stajano, F., 2000. The resurrecting duckling (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 1796
    Doi: http://doi.org/10.1007/10720107_25
  • Roe, M., Anderson, R., Blaze, M., Morris, B., Stajano, F., Christianson, B., Gligor, V. and Wheeler, D., 2000. Security Protocols - 7th International Workshop Cambridge, UK, April 1999 - Proceedings - Transcript of concluding discussion SECURITY PROTOCOLS, v. 1796
  • Stajano, F. and Anderson, R., 2000. The cocaine auction protocol: On the power of anonymous broadcast INFORMATION HIDING, PROCEEDINGS, v. 1768
  • STAJANO, F. and WALKER, R., 1995. Taming the complexity of distributed multimedia applications USENIX ASSOCIATION - PROCEEDINGS OF THE TCL/TK WORKSHOP,
  • PANCACCINI, G. and STAJANO, F., 1991. MEDIA COMPOSITION AND SYNCHRONIZATION ASPECTS IN AN INTERACTIVE MULTIMEDIA AUTHORING ENVIRONMENT HUMAN ASPECTS IN COMPUTING, v. 18
  • Llewellyn-Jones, D., Jenkinson, G. and Stajano, F., Explicit Delegation Using Configurable Cookies Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10368 LNCS
    Doi: http://doi.org/10.1007/978-3-319-62033-6_17
  • Goldberg, I., Jenkinson, G., Llewellyn-Jones, D. and Stajano, F., Red Button and Yellow Button: Usable Security for Lost Security Tokens Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10368 LNCS
    Doi: http://doi.org/10.1007/978-3-319-62033-6_19
  • Stajano, FM., Jenkinson, G., Payne, J., Spencer, M., Stafford-Fraser, Q. and Warrington, C., Bootstrapping adoption of the Pico password replacement system Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers,
    Doi: http://doi.org/10.1007/978-3-319-12400-1_17
  • Jenkinson, G., Spencer, M., Warrington, C. and Stajano, FM., I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers,
    Doi: http://doi.org/10.1007/978-3-319-12400-1_19
  • Glass, B., Jenkinson, G., Liu, Y., Sasse, MA. and Stajano, FM., The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions
    Doi: http://doi.org/10.14722/eurousec.2016.23007
  • Krol, K., Llewellyn-Jones, D., Aebischer, S., Dettoni, C. and Stajano, FM., Intentionality and agency in security
  • Stajano, FM. and Lomas, M., User Authentication for the Internet of Things
  • Book chapters

  • Stajano, F., 2023. Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion)
    Doi: http://doi.org/10.1007/978-3-031-43033-6_2
  • Stajano, F., 2023. Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper)
    Doi: http://doi.org/10.1007/978-3-031-43033-6_1
  • Anderson, J. and Stajano, F., 2013. Not That Kind of Friend
    Doi: 10.1007/978-3-642-36213-2_37
  • Stajano, F., 2010. Security Issues in Ubiquitous Computing
    Doi: http://doi.org/10.1007/978-0-387-93808-0_11
  • Stajano, F. and Crowcroft, J., 2003. The Butt of the Iceberg: Hidden Security Problems of Ubiquitous Systems
    Doi: http://doi.org/10.1007/0-306-48706-3_6
  • Stajano, F., 2001. The Resurrecting Duckling — What Next?
    Doi: 10.1007/3-540-44810-1_28
  • Journal articles

  • Stajano, F., Matyáš, V., Christianson, B. and Anderson, J., 2023. Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 14186 LNCS
  • Benzel, T. and Stajano, F., 2020. IEEE Euro S&P: The Younger Sibling across the Pond following in Oakland's Footsteps IEEE Security and Privacy, v. 18
    Doi: http://doi.org/10.1109/MSEC.2020.2980180
  • Payne, J., Jenkinson, G., Stajano, F., Sasse, MA. and Spencer, M., 2016. Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Proceedings 2016 Workshop on Usable Security,
    Doi: http://doi.org/10.14722/usec.2016.23003
  • Bonneau, J., Herley, C., Van Oorschot, PC. and Stajano, F., 2015. Passwords and the evolution of imperfect authentication Communications of the ACM, v. 58
    Doi: http://doi.org/10.1145/2699390
  • Jenkinson, G., Spencer, M., Warrington, C. and Stajano, F., 2014. I bought a new security token and all i got was this lousy phish—relay attacks on visual code authentication schemes Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8809
    Doi: 10.1007/978-3-319-12400-1_19
  • Stajano, F., Jenkinson, G., Payne, J., Spencer, M., Stafford-Fraser, Q. and Warrington, C., 2014. Bootstrapping adoption of the pico password replacement system Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8809
    Doi: 10.1007/978-3-319-12400-1_17
  • Stajano, F., 2014. Bootstrapping adoption of the pico password replacement system (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8809
    Doi: http://doi.org/10.1007/978-3-319-12400-1_18
  • Anderson, J. and Stajano, F., 2013. Not that kind of friend misleading divergences between online social networks and real-world social protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7028 LNCS
    Doi: 10.1007/978-3-642-36213-2_37
  • Anderson, J. and Stajano, F., 2013. Must social networking conflict with privacy? IEEE Security and Privacy, v. 11
    Doi: http://doi.org/10.1109/MSP.2013.23
  • Claycomb, B. and Stajano, F., 2013. WRIT 2013 workshop introduction Proceedings - IEEE CS Security and Privacy Workshops, SPW 2013,
    Doi: http://doi.org/10.1109/SPW.2013.6
  • Christianson, B., Malcolm, J., Stajano, F., Anderson, J. and Bonneau, J., 2013. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8263 LNCS
  • Anderson, R., Bond, M., Choudary, O., Murdoch, SJ. and Stajano, F., 2012. Might financial cryptography kill financial innovation? - The curious case of EMV Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7035 LNCS
    Doi: 10.1007/978-3-642-27576-0_18
  • Stajano, F., 2012. Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7622 LNCS
    Doi: http://doi.org/10.1007/978-3-642-35694-0_25
  • Stannard, O. and Stajano, F., 2012. Am i in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7622 LNCS
    Doi: http://doi.org/10.1007/978-3-642-35694-0_24
  • Christianson, B., Malcolm, J., Stajano, F. and Anderson, J., 2012. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7622 LNCS
  • Anderson, R., Bond, M., Choudary, O., Murdoch, SJ. and Stajano, F., 2012. Might financial cryptography kill financial innovation? - The curious case of EMV Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7035 LNCS
  • Stajano, F. and Wilson, P., 2011. Understanding Scam Victims: Seven Principles for Systems Security COMMUN ACM, v. 54
    Doi: http://doi.org/10.1145/1897852.1897872
  • Stajano, F. and Clayton, R., 2011. Cyberdice: Peer-to-peer gambling in the presence of cheaters Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 6615 LNCS
    Doi: http://doi.org/10.1007/978-3-642-22137-8_9
  • Stajano, F., 2011. Cyberdice (transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 6615 LNCS
    Doi: http://doi.org/10.1007/978-3-642-22137-8_10
  • Christianson, B., Malcolm, J., Crispo, B. and Stajano, F., 2011. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
  • Stajano, F., 2011. Pico: No more passwords! (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
    Doi: http://doi.org/10.1007/978-3-642-25867-1_7
  • Stajano, F., 2011. Pico: No more passwords! Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
    Doi: http://doi.org/10.1007/978-3-642-25867-1_6
  • Choudary, O. and Stajano, F., 2011. Make noise and whisper: A solution to relay attacks Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
    Doi: http://doi.org/10.1007/978-3-642-25867-1_26
  • Anderson, J., Stajano, F. and Watson, RNM., 2011. How to keep bad papers out of conferences (with minimum reviewer effort) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
  • Anderson, J., Stajano, F. and Watson, RNM., 2011. How to keep bad papers out of conferences (with minimum reviewer effort) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
    Doi: http://doi.org/10.1007/978-3-642-25867-1_34
  • Wetzel, S., Stajano, F. and Nita-Rotaru, C., 2010. WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security: Foreword WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security,
  • Stajano, F., Hoult, N., Wassell, I., Bennett, P., Middleton, C. and Soga, K., 2010. Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure AD HOC NETW, v. 8
    Doi: 10.1016/j.adhoc.2010.04.002
  • Bonneau, J., Anderson, J., Anderson, R. and Stajano, F., 2009. Eight friends are enough: Social graph approximation via public listings Proceedings of the 2nd ACM EuroSys Workshop on Social Network Systems, SNS '09,
    Doi: 10.1145/1578002.1578005
  • Stajano, F., 2009. Foot-driven computing: our first glimpse of location privacy issues. ACM SIGSPATIAL Special, v. 1
    Doi: 10.1145/1567253.1567259
  • Stajano, F., 2009. Privacy in the era of genomics netWorker, v. 13
    Doi: http://doi.org/10.1145/1655737.1655749
  • Roman, BA., Chatzigeorgiou, I., Wassell, IJ. and Stajano, F., 2009. Evaluation of multi-carrier burst contention and IEEE 802.11 with fading during channel sensing IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC,
    Doi: 10.1109/PIMRC.2009.5450007
  • Stajano, F., Bianchi, L., Liò, P. and Korff, D., 2008. Forensic genomics: Kin privacy, driftnets and other open questions Proceedings of the ACM Conference on Computer and Communications Security,
    Doi: 10.1145/1456403.1456407
  • Stajano, F. and Tygar, D., 2007. Message from the Workshop Co-organisers Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007,
    Doi: http://doi.org/10.1109/PERCOMW.2007.72
  • Stajano, F., Kim, HJ., Chae, JS. and Kim, SD., 2007. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics: Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 4412 LNCS
  • Rehman, K., Stajano, F. and Coulouris, G., 2007. An architecture for interactive context-aware applications IEEE PERVAS COMPUT, v. 6
  • Wong, F-L. and Stajano, F., 2007. Multichannel Security Protocols. IEEE Pervasive Comput., v. 6
    Doi: http://doi.org/10.1109/MPRV.2007.76
  • Pashalidis, A., Mitchell, CJ., Christianson, B., Wright, R., Danezis, G., Aura, T., Blaze, M., Claytol, R., Stajano, F. and Pfitzmann, B., 2006. Limits to anonymity when using credentials Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
  • Gligor, V., Aura, T., Eronen, P., Mitchell, C., Arkko, J., Serjantov, A., Anderson, R., Lomas, M., Stajano, F. and Burmester, M., 2006. Security of emergent properties in ad-hoc networks Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
    Doi: http://doi.org/10.1007/11861386_30
  • Juels, A. and Stajano, F., 2006. Message from the workshop Co-chairs Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006, v. 2006
    Doi: http://doi.org/10.1109/PERCOMW.2006.87
  • Lomas, M., Malcolm, J., Stajano, F., Roe, M., Eronen, P., Clayton, R., Matyas, V., Anderson, R., Danezis, G., Christianson, B., Aura, T., Wheeler, D., Massacci, F., Popescu, B., Mitchell, C., Blaze, M. and Gligor, V., 2006. Why are we authenticating Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
    Doi: http://doi.org/10.1007/11861386_35
  • Popescu, BC., Crispo, B., Tanenbaum, AS., Blaze, M., Christianson, B., Stajano, F., Anderson, R., Mitchell, C., Roe, M., Mayo, B., Massacci, F., Ozment, A., Bond, M., Danezis, G. and Murdoch, S., 2006. Safe and private data sharing with turtle: Friends team-up and beat the system Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957
  • Blaze, M., Mitchell, C., Stajano, F., Massacci, F., Lomas, M., Clayton, R., Christianson, B., Gligor, V., Serjantov, A. and Anderson, R., 2006. Toward a broader view of security protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
  • Stajano, F., 2005. Viewpoint - RFID is X-ray vision COMMUN ACM, v. 48
  • Stajano, F., 2005. RFID is x-ray vision. Commun. ACM, v. 48
    Doi: 10.1145/1081992.1082015
  • Vidales, P., Baliosian, J., Serrat, J., Mapp, G., Stajano, F. and Hopper, A., 2005. Autonomic system for mobility support in 4G networks IEEE J SEL AREA COMM, v. 23
    Doi: 10.1109/JSAC.2005.857198
  • Stajano, F. and Thomas, R., 2005. Proceedings of the 3rd Int'l Conf. on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops): Workshop on pervasive computing and communications security (persec '05) message from the workshop co-chairs Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops, v. 2005
  • Stajano, F., 2004. Security in Pervasive Computing: (Abstract of invited talk) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 2802
    Doi: http://doi.org/10.1007/978-3-540-39881-3_3
  • Beresford, AR. and Stajano, F., 2003. Location privacy in pervasive computing IEEE PERVAS COMPUT, v. 2
  • Stajano, F. and Anderson, R., 2002. The resurrecting duckling: Security issues for ubiquitous computing COMPUTER,
  • Stajano, F. and Anderson, R., 2002. The Resurrecting Duckling: security issues for ubiquitous computing Computer, v. 35
    Doi: http://doi.org/10.1109/mc.2002.1012427
  • Anderson, RJ., Stajano, F. and Lee, J-H., 2001. Security policies. Adv. Comput., v. 55
    Doi: 10.1016/S0065-2458(01)80030-9
  • Anderson, R., Stajano, F. and Lee, JH., 2001. Security policies ADV COMPUT, v. 55
  • Stajano, F. and Jones, A., 1998. The thinnest of clients ACM SIGMOBILE Mobile Computing and Communications Review, v. 2
    Doi: http://doi.org/10.1145/1321400.1321403
  • Aebischer, S., Dettoni, C., Jenkinson, G., Krol, K., Llewellyn-Jones, D., Masui, T. and Stajano, F., Deploying authentication in the wild: Towards greater ecological validity in security usability studies Journal of Cybersecurity,
    Doi: http://doi.org/10.1093/cybsec/tyaa010
  • Books

  • Anderson, J., Stajano, F., Christianson, B. and Matyáš, V., 2020. Preface
  • Matyáš, V., Švenda, P., Stajano, F., Christianson, B. and Anderson, J., 2018. Preface
    Doi: http://doi.org/10.1017/CBO9780511625848.001
  • Anderson, J., Christianson, B., Matyas, V. and Stajano, F., 2017. Preface
  • Stajano, F., Anderson, J., Christianson, B. and Matyáš, V., 2017. Preface
  • Stajano, F., Mjølsnes, SF., Jenkinson, G. and Thorsheim, P., 2016. Preface
    Doi: http://doi.org/10.1007/978-3-319-29938-9
  • Matyáš, V., Švenda, P., Christianson, B., Malcolm, J., Stajano, F. and Anderson, J., 2015. Preface
  • Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F. and Anderson, J., 2014. Preface
    Doi: http://doi.org/10.1007/978-3-319-12400-1
  • Internet publications

  • Stajano, F., Home Page
  • Contact Details

    Room: 
    SN15
    Office phone: 
    email preferred but 67013
    Email: 

    frank.stajano--vicarypage@cl.cam.ac.uk