Conference proceedings
Stajano, F., 2023. Sleepwalking into disaster? Requirements engineering for digital cash Proceedings of Security Protocols Workshop 2023,
Aebischer, S., Dettoni, C., Jenkinson, G., Krol, KK., Llewellyn-Jones, D., Masui, T. and Stajano, F., 2017. Pico in the Wild: Replacing Passwords, One Site at a Time
Doi: http://doi.org/10.14722/eurousec.2017.23017
Stajano, F., 2017. Red button and yellow button: Usable security for lost security tokens (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10368 LNCS
Doi: http://doi.org/10.1007/978-3-319-62033-6_20
Stajano, F., 2017. Assuring the safety of asymmetric social protocols (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10476 LNCS
Doi: http://doi.org/10.1007/978-3-319-71075-4_6
Krol, KK., Aebischer, S., Llewellyn-Jones, D., Dettoni, C. and Stajano, F., 2017. Seamless Authentication with Pico
Gligor, V. and Stajano, F., 2017. Assuring the safety of asymmetric social protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10476 LNCS
Doi: http://doi.org/10.1007/978-3-319-71075-4_5
Goldberg, I., Jenkinson, G. and Stajano, F., 2016. Low-cost mitigation against cold boot attacks for an authentication token Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9696
Doi: 10.1007/978-3-319-39555-5_3
Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. and Anderson, J., 2015. Security protocols XXIII: 23rd International workshop Cambridge, UK, march 31 - april 2, 2015 revised selected papers Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9379
Stajano, F., Christianson, B., Lomas, M., Jenkinson, G., Payne, J., Spencer, M. and Stafford-Fraser, Q., 2015. Pico without public keys Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9379
Doi: 10.1007/978-3-319-26096-9_21
Stajano, F., 2015. Pico without public keys (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9379
Doi: 10.1007/978-3-319-26096-9_22
Stajano, F., Spencer, M., Jenkinson, G. and Stafford-Fraser, Q., 2015. Password-manager friendly (PMF): Semantic annotations to improve the effectiveness of password managers Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9393 LNCS
Doi: 10.1007/978-3-319-24192-0_4
Millican, J. and Stajano, F., 2015. SAVVIcode: Preventing mafia attacks on visual code authentication schemes (short paper) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9393 LNCS
Doi: 10.1007/978-3-319-24192-0_10
Stafford-Fraser, Q., Stajano, F., Warrington, C., Jenkinson, G., Spencer, M. and Payne, J., 2014. To have and have not: Variations on secret sharing to model user presence UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing,
Doi: 10.1145/2638728.2641705
Anderson, R. and Stajano, F., 2014. It’s the anthropology, stupid! Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7061
Doi: 10.1007/978-3-662-45921-8_20
Aloteibi, S. and Stajano, F., 2014. On the value of hybrid security testing Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7061
Doi: 10.1007/978-3-662-45921-8_30
Anderson, J. and Stajano, F., 2014. On storing private keys in the cloud Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7061
Doi: 10.1007/978-3-662-45921-8_16
Christianson, B., Shafarenko, A., Stajano, F. and Wong, FL., 2014. Relay-proof channels using UWB lasers Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7061
Doi: http://doi.org/10.1007/978-3-662-45921-8_8
Stannard, O. and Stajano, FM., 2012. Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Security Protocols 2012: Security Protocols XX,
Doi: http://doi.org/10.1007/978-3-642-35694-0_24
Bonneau, J., Herley, C., van Oorschot, PC. and Stajano, F., 2012. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
Doi: 10.1109/SP.2012.44
Stajano, F., 2011. Pico: No more passwords! Proc. Security Protocols Workshop 2011, v. 7114
2011. Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers Security Protocols Workshop, v. 7114
Choudary, O., 2011. Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion). Security Protocols Workshop, v. 7114
Stajano, F., Wong, FL. and Christianson, B., 2010. Multichannel Protocols to Prevent Relay Attacks FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, v. 6052
Anderson, J., Bonneau, J. and Stajano, F., 2010. Inglorious Installers: Security in the Application Marketplace. WEIS,
2010. Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010 WISEC,
Anderson, J., Diaz, C., Bonneau, J. and Stajano, F., 2009. Privacy-Enabling Social Networking Over Untrusted Networks 2ND ACM SIGCOMM WORKSHOP ON ONLINE SOCIAL NETWORKS (WOSN 09),
Johnson, M. and Stajano, F., 2009. Usability of Security Management: Defining the Permissions of Guests SECURITY PROTOCOLS, v. 5087
Roman, BA., Chatzigeorgiou, I., Wassell, IJ. and Stajano, F., 2009. Evaluation of Multi-Carrier Burst Contention and IEEE 802.11 with fading during channel sensing. PIMRC,
Church, L., Anderson, J., Bonneau, J. and Stajano, F., 2009. Privacy stories: confidence in privacy behaviors through end user programming. SOUPS,
Roman, B., Stajano, F., Wassell, I. and Cottingham, D., 2008. Multi-carrier burst contention (MCBC): Scalable medium access control for wireless networks WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7,
Stajano, F., Cvrcek, D. and Lewis, M., 2008. Steel, cast iron and concrete: Security engineering for real world wireless sensor networks APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, v. 5037
Wong, FL., Stajano, F. and Clulow, J., 2007. Repairing the bluetooth pairing protocol SECURITY PROTOCOLS, v. 4631
Stajano, F., 2007. Repairing the bluetooth pairing protocol SECURITY PROTOCOLS, v. 4631
Wong, FL. and Stajano, F., 2007. Multi-channel protocols SECURITY PROTOCOLS, v. 4631
2007. Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings ESAS, v. 4572
de Medeiros, B., Stajano, F., Clayton, R., Laurie, B., Burmester, M., Christianson, B., Desmedt, Y., Roe, M. and Li, J., 2007. Community-centric vanilla-rollback access, or: How I stopped worrying and learned to love my computer SECURITY PROTOCOLS, v. 4631
Kim, J., Beresford, AR. and Stajano, F., 2007. Towards a security policy for ubiquitous healthcare systems (Position paper) Ubiquitous Convergence Technology, v. 4412
Gligor, V., Stajano, F., Foley, S., Anderson, R., Bond, M., Desmedt, Y. and Burmester, M., 2007. On the evolution of adversary models in security protocols (or know your friend and foe alike) (tanscript of discussion) SECURITY PROTOCOLS, v. 4631
2007. Ubiquitous Convergence Technology, First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers ICUCT, v. 4412
Laurie, B., Stajano, F., Danezis, G., Christianson, B. and Clayton, R., 2007. Safer scripting through precompilation SECURITY PROTOCOLS, v. 4631
Johnson, M. and Stajano, F., 2007. Implementing a multi-hat PDA SECURITY PROTOCOLS, v. 4631
Christianson, B., Stajano, F., Laurie, B., de Medeiros, B., Roe, M. and Danezis, G., 2007. Anonymous context based role activation mechanism (Transcript of discussion) SECURITY PROTOCOLS, v. 4631
Wong, FL., Lin, M., Nagaraja, S., Wassell, I. and Stajano, F., 2007. Evaluation framework of location privacy of wireless mobile systems with arbitrary beam pattern CNSR 2007: Proceedings of the Fifth Annual Conference on Communication Networks and Services Research,
Bond, M., Anderson, R., Aura, T., Christianson, B., Stajano, F., Blaze, M., Danezis, G., Roe, M., Zugenmaier, A., Desmedt, Y. and Laurie, B., 2007. The dining freemasons (security protocols for secret societies) SECURITY PROTOCOLS, v. 4631
Johnson, M., Laurie, B., Desmedt, Y., Anderson, R., Christianson, B., Roe, M., Bond, M., Aura, T., Lomas, M., Clayton, R., Stajano, F., Nikander, P. and de Medeiros, B., 2007. Implementing a multi-hat PDA (Transcript of discussion) SECURITY PROTOCOLS, v. 4631
Bohm, D., Lamming, M., Mayo, RN., Morgan, J., Zhang, K., Blaze, M., Roe, M., Clayton, R., Christianson, B., Aura, T., Stajano, F., Danezis, G., Mitchell, C., Lomas, M., Gligor, V. and Bond, M., 2006. Controlling who tracks me Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
Stajano, F., 2006. One user, many hats; and, sometimes, no hat: Towards a secure yet usable PDA SECURITY PROTOCOLS, v. 3957
Wong, FL. and Stajano, F., 2006. Multi-channel protocols for group key agreement in arbitrary topologies Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Proceedings,
Pablo, V., Glenford, EM., Frank, S., Jon, C. and Carlos, JB., 2005. A Practical Approach for 4G Systems: Deployment of Overlay Networks TRIDENTCOM,
Vidales, P., Mapp, GE., Stajano, F., Crowcroft, J. and Bernardos, CJ., 2005. A Practical Approach for 4G Systems: Deployment of Overlay Networks. TRIDENTCOM,
Doi: 10.1109/TRIDNT.2005.4
Wong, FL. and Stajano, F., 2005. Location privacy in Bluetooth SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, v. 3813
Rehman, K., Stajano, F. and Coulouris, G., 2005. Visually interactive location-aware computing UBICOMP 2005: UBIQUITOUS COMPUTING, PROCEEDINGS, v. 3660
Stajano, F., 2004. Will your digital butlers betray you? WPES,
Stajano, F., 2004. Security for Ubiquitous Computing. ICISC, v. 3506
Beresford, AR. and Stajano, F., 2004. Mix zones: User privacy in location-aware services SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
Stajano, F., 2004. One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion). Security Protocols Workshop, v. 3957
Stajano, F., 2004. Security in pervasive computing SECURITY IN PERVASIVE COMPUTING, v. 2802
Stajano, F., 2003. Security for whom? The shifting security assumptions of pervasive computing SOFTWARE SECURITY - THEORIES AND SYSTEMS, v. 2609
Stajano, F., 2003. The security challenges of ubiquitous computing CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, v. 2779
Nakajima, T., Ishikawa, H., Tokunaga, E. and Stajano, F., 2002. Technology challenges for building Internet-scale ubiquitous computing PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS,
Rehman, K., Stajano, F. and Coulouris, G., 2002. Interfacing with the invisible computer. NordiCHI,
Stajano, F. and Isozaki, H., 2002. Security issues for Internet appliances 2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT) WORKSHOPS, PROCEEDINGS,
Stajano, F. and Anderson, R., 2000. The resurrecting duckling: Security issues for ad-hoc wireless networks SECURITY PROTOCOLS, v. 1796
Stajano, F., Morris, B., Christianson, B., Gligor, V., Anderson, R., Roe, M., Blaze, M. and Wheeler, D., 2000. The resurrecting duckling SECURITY PROTOCOLS, v. 1796
Stajano, F., 2000. The resurrecting duckling (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 1796
Doi: http://doi.org/10.1007/10720107_25
Sasaki, R., Stajano, F., Roe, M., Bergadano, F., Christianson, B., Gollman, D., Kuhn, M., Blaze, M. and Needham, R., 2000. Internet-marks SECURITY PROTOCOLS, v. 1796
Roe, M., Anderson, R., Blaze, M., Morris, B., Stajano, F., Christianson, B., Gligor, V. and Wheeler, D., 2000. Security Protocols - 7th International Workshop Cambridge, UK, April 1999 - Proceedings - Transcript of concluding discussion SECURITY PROTOCOLS, v. 1796
Stajano, F. and Anderson, R., 2000. The cocaine auction protocol: On the power of anonymous broadcast INFORMATION HIDING, PROCEEDINGS, v. 1768
Stajano, F., 2000. The Resurrecting Duckling - What Next? Security Protocols Workshop, v. 2133
Stajano, F., 2000. The Resurrecting Duckling - What Next? (Transcript of Discussion). Security Protocols Workshop, v. 2133
STAJANO, F. and WALKER, R., 1995. Taming the complexity of distributed multimedia applications USENIX ASSOCIATION - PROCEEDINGS OF THE TCL/TK WORKSHOP,
PANCACCINI, G. and STAJANO, F., 1991. MEDIA COMPOSITION AND SYNCHRONIZATION ASPECTS IN AN INTERACTIVE MULTIMEDIA AUTHORING ENVIRONMENT HUMAN ASPECTS IN COMPUTING, v. 18
Stajano, FM., Jenkinson, G., Payne, J., Spencer, M., Stafford-Fraser, Q. and Warrington, C., Bootstrapping adoption of the Pico password replacement system Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers,
Doi: http://doi.org/10.1007/978-3-319-12400-1_17
Jenkinson, G., Spencer, M., Warrington, C. and Stajano, FM., I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers,
Doi: http://doi.org/10.1007/978-3-319-12400-1_19
Glass, B., Jenkinson, G., Liu, Y., Sasse, MA. and Stajano, FM., The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions
Doi: http://doi.org/10.14722/eurousec.2016.23007
Krol, K., Llewellyn-Jones, D., Aebischer, S., Dettoni, C. and Stajano, FM., Intentionality and agency in security
Stajano, FM. and Lomas, M., User Authentication for the Internet of Things
Llewellyn-Jones, D., Jenkinson, G. and Stajano, F., Explicit Delegation Using Configurable Cookies Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10368 LNCS
Doi: http://doi.org/10.1007/978-3-319-62033-6_17
Goldberg, I., Jenkinson, G., Llewellyn-Jones, D. and Stajano, F., Red Button and Yellow Button: Usable Security for Lost Security Tokens Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 10368 LNCS
Doi: http://doi.org/10.1007/978-3-319-62033-6_19
Stajano, F. and Urquhart, E., Acceleration of core post-quantum cryptography primitive on open-source silicon platform through hardware/software co-design Proc. Cryptography and Network Security 2024,
Book chapters
Journal articles
Stajano, F., Matyáš, V., Christianson, B. and Anderson, J., 2023. Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 14186 LNCS
Payne, J., Jenkinson, G., Stajano, F., Sasse, MA. and Spencer, M., 2016. Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Proceedings 2016 Workshop on Usable Security,
Doi: http://doi.org/10.14722/usec.2016.23003
Bonneau, J., Herley, C., Van Oorschot, PC. and Stajano, F., 2015. Passwords and the evolution of imperfect authentication Communications of the ACM, v. 58
Doi: http://doi.org/10.1145/2699390
Stajano, F., 2014. Bootstrapping adoption of the pico password replacement system (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8809
Doi: http://doi.org/10.1007/978-3-319-12400-1_18
Jenkinson, G., Spencer, M., Warrington, C. and Stajano, F., 2014. I bought a new security token and all i got was this lousy phish—relay attacks on visual code authentication schemes Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8809
Doi: 10.1007/978-3-319-12400-1_19
Stajano, F., Jenkinson, G., Payne, J., Spencer, M., Stafford-Fraser, Q. and Warrington, C., 2014. Bootstrapping adoption of the pico password replacement system Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8809
Doi: 10.1007/978-3-319-12400-1_17
Anderson, J. and Stajano, F., 2013. Not that kind of friend misleading divergences between online social networks and real-world social protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7028 LNCS
Doi: 10.1007/978-3-642-36213-2_37
Claycomb, B. and Stajano, F., 2013. WRIT 2013 workshop introduction Proceedings - IEEE CS Security and Privacy Workshops, SPW 2013,
Doi: http://doi.org/10.1109/SPW.2013.6
Christianson, B., Malcolm, J., Stajano, F., Anderson, J. and Bonneau, J., 2013. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8263 LNCS
Stajano, F., 2012. Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7622 LNCS
Doi: http://doi.org/10.1007/978-3-642-35694-0_25
Stannard, O. and Stajano, F., 2012. Am i in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7622 LNCS
Doi: http://doi.org/10.1007/978-3-642-35694-0_24
Christianson, B., Malcolm, J., Stajano, F. and Anderson, J., 2012. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7622 LNCS
Anderson, R., Bond, M., Choudary, O., Murdoch, SJ. and Stajano, F., 2012. Might financial cryptography kill financial innovation? - The curious case of EMV Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7035 LNCS
Anderson, R., Bond, M., Choudary, O., Murdoch, SJ. and Stajano, F., 2012. Might financial cryptography kill financial innovation? - The curious case of EMV Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7035 LNCS
Doi: 10.1007/978-3-642-27576-0_18
Stajano, F. and Clayton, R., 2011. Cyberdice: Peer-to-peer gambling in the presence of cheaters Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 6615 LNCS
Doi: http://doi.org/10.1007/978-3-642-22137-8_9
Stajano, F., 2011. Cyberdice (transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 6615 LNCS
Doi: http://doi.org/10.1007/978-3-642-22137-8_10
Christianson, B., Malcolm, J., Crispo, B. and Stajano, F., 2011. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
Stajano, F., 2011. Pico: No more passwords! (Transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
Doi: http://doi.org/10.1007/978-3-642-25867-1_7
Stajano, F., 2011. Pico: No more passwords! Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
Doi: http://doi.org/10.1007/978-3-642-25867-1_6
Choudary, O. and Stajano, F., 2011. Make noise and whisper: A solution to relay attacks Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
Doi: http://doi.org/10.1007/978-3-642-25867-1_26
Anderson, J., Stajano, F. and Watson, RNM., 2011. How to keep bad papers out of conferences (with minimum reviewer effort) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
Anderson, J., Stajano, F. and Watson, RNM., 2011. How to keep bad papers out of conferences (with minimum reviewer effort) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7114 LNCS
Doi: http://doi.org/10.1007/978-3-642-25867-1_34
Wetzel, S., Stajano, F. and Nita-Rotaru, C., 2010. WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security: Foreword WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security,
Stajano, F., Hoult, N., Wassell, I., Bennett, P., Middleton, C. and Soga, K., 2010. Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure AD HOC NETW, v. 8
Doi: 10.1016/j.adhoc.2010.04.002
Stajano, F., 2009. Foot-driven computing: our first glimpse of location privacy issues. ACM SIGSPATIAL Special, v. 1
Doi: 10.1145/1567253.1567259
Roman, BA., Chatzigeorgiou, I., Wassell, IJ. and Stajano, F., 2009. Evaluation of multi-carrier burst contention and IEEE 802.11 with fading during channel sensing IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC,
Doi: 10.1109/PIMRC.2009.5450007
Bonneau, J., Anderson, J., Anderson, R. and Stajano, F., 2009. Eight friends are enough: Social graph approximation via public listings Proceedings of the 2nd ACM EuroSys Workshop on Social Network Systems, SNS '09,
Doi: 10.1145/1578002.1578005
Stajano, F., Bianchi, L., Liò, P. and Korff, D., 2008. Forensic genomics: Kin privacy, driftnets and other open questions Proceedings of the ACM Conference on Computer and Communications Security,
Doi: 10.1145/1456403.1456407
Rehman, K., Stajano, F. and Coulouris, G., 2007. An architecture for interactive context-aware applications IEEE PERVAS COMPUT, v. 6
Stajano, F. and Tygar, D., 2007. Message from the Workshop Co-organisers Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007,
Doi: http://doi.org/10.1109/PERCOMW.2007.72
Stajano, F., Kim, HJ., Chae, JS. and Kim, SD., 2007. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics: Preface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 4412 LNCS
Juels, A. and Stajano, F., 2006. Message from the workshop Co-chairs Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006, v. 2006
Doi: http://doi.org/10.1109/PERCOMW.2006.87
Lomas, M., Malcolm, J., Stajano, F., Roe, M., Eronen, P., Clayton, R., Matyas, V., Anderson, R., Danezis, G., Christianson, B., Aura, T., Wheeler, D., Massacci, F., Popescu, B., Mitchell, C., Blaze, M. and Gligor, V., 2006. Why are we authenticating Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
Doi: http://doi.org/10.1007/11861386_35
Popescu, BC., Crispo, B., Tanenbaum, AS., Blaze, M., Christianson, B., Stajano, F., Anderson, R., Mitchell, C., Roe, M., Mayo, B., Massacci, F., Ozment, A., Bond, M., Danezis, G. and Murdoch, S., 2006. Safe and private data sharing with turtle: Friends team-up and beat the system Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957
Blaze, M., Mitchell, C., Stajano, F., Massacci, F., Lomas, M., Clayton, R., Christianson, B., Gligor, V., Serjantov, A. and Anderson, R., 2006. Toward a broader view of security protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
Pashalidis, A., Mitchell, CJ., Christianson, B., Wright, R., Danezis, G., Aura, T., Blaze, M., Claytol, R., Stajano, F. and Pfitzmann, B., 2006. Limits to anonymity when using credentials Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
Gligor, V., Aura, T., Eronen, P., Mitchell, C., Arkko, J., Serjantov, A., Anderson, R., Lomas, M., Stajano, F. and Burmester, M., 2006. Security of emergent properties in ad-hoc networks Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 3957 LNCS
Doi: http://doi.org/10.1007/11861386_30
Vidales, P., Baliosian, J., Serrat, J., Mapp, G., Stajano, F. and Hopper, A., 2005. Autonomic system for mobility support in 4G networks IEEE J SEL AREA COMM, v. 23
Doi: 10.1109/JSAC.2005.857198
Stajano, F. and Thomas, R., 2005. Proceedings of the 3rd Int'l Conf. on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops): Workshop on pervasive computing and communications security (persec '05) message from the workshop co-chairs Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops, v. 2005
Stajano, F., 2005. Viewpoint - RFID is X-ray vision COMMUN ACM, v. 48
Stajano, F., 2004. Security in Pervasive Computing: (Abstract of invited talk) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 2802
Doi: http://doi.org/10.1007/978-3-540-39881-3_3
Beresford, AR. and Stajano, F., 2003. Location privacy in pervasive computing IEEE PERVAS COMPUT, v. 2
Stajano, F. and Anderson, R., 2002. The resurrecting duckling: Security issues for ubiquitous computing COMPUTER,
Anderson, R., Stajano, F. and Lee, JH., 2001. Security policies ADV COMPUT, v. 55
Aebischer, S., Dettoni, C., Jenkinson, G., Krol, K., Llewellyn-Jones, D., Masui, T. and Stajano, F., Deploying authentication in the wild: Towards greater ecological validity in security usability studies Journal of Cybersecurity,
Doi: http://doi.org/10.1093/cybsec/tyaa010
Books
Anderson, J., Stajano, F., Christianson, B. and Matyáš, V., 2020. Preface
Anderson, J., Christianson, B., Matyas, V. and Stajano, F., 2017. Preface
Stajano, F., Anderson, J., Christianson, B. and Matyáš, V., 2017. Preface
Matyáš, V., Švenda, P., Christianson, B., Malcolm, J., Stajano, F. and Anderson, J., 2015. Preface
Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F. and Anderson, J., 2014. Preface
Doi: http://doi.org/10.1007/978-3-319-12400-1
Internet publications