Location privacy in pervasive computing AR Beresford, F Stajano IEEE Pervasive computing 2 (1), 46-55, 2003 | 2234 | 2003 |
The resurrecting duckling F Stajano International workshop on security protocols, 183-194, 1999 | 1944 | 1999 |
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes J Bonneau, C Herley, PC Van Oorschot, F Stajano 2012 IEEE symposium on security and privacy, 553-567, 2012 | 1404 | 2012 |
Mix zones: User privacy in location-aware services AR Beresford, F Stajano IEEE Annual conference on pervasive computing and communications workshops …, 2004 | 742 | 2004 |
Security for Ubiquitous Computing F Stajano Security for Ubiquitous Computing, 2002 | 523 | 2002 |
Passwords and the evolution of imperfect authentication J Bonneau, C Herley, PC Van Oorschot, F Stajano Communications of the ACM 58 (7), 78-87, 2015 | 352 | 2015 |
Understanding scam victims: seven principles for systems security F Stajano, P Wilson Communications of the ACM 54 (3), 70-75, 2011 | 270 | 2011 |
The resurrecting duckling—what next? F Stajano International Workshop on Security Protocols, 204-214, 2000 | 257 | 2000 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 253* | 2006 |
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure F Stajano, N Hoult, I Wassell, P Bennett, C Middleton, K Soga Ad Hoc Networks 8 (8), 872-888, 2010 | 216 | 2010 |
The resurrecting duckling: security issues for ubiquitous computing F Stajano, R Anderson Computer 35 (4), supl22-supl26, 2002 | 213 | 2002 |
Pico: No more passwords! F Stajano International Workshop on Security Protocols, 49-81, 2011 | 190 | 2011 |
Eight friends are enough: social graph approximation via public listings J Bonneau, J Anderson, R Anderson, F Stajano Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009 | 173 | 2009 |
Autonomic system for mobility support in 4G networks P Vidales, J Baliosian, J Serrat, G Mapp, F Stajano, A Hopper IEEE Journal on Selected Areas in Communications 23 (12), 2288-2304, 2005 | 124 | 2005 |
Privacy-enabling social networking over untrusted networks J Anderson, C Diaz, J Bonneau, F Stajano Proceedings of the 2nd ACM workshop on Online social networks, 1-6, 2009 | 120 | 2009 |
The cocaine auction protocol: On the power of anonymous broadcast F Stajano, R Anderson Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000 | 99 | 2000 |
Location privacy in bluetooth FL Wong, F Stajano European Workshop on Security in Ad-hoc and Sensor Networks, 176-188, 2005 | 79 | 2005 |
The Thinnest of Clients: Controlling it all via cellphone F Stajano, A Jones ACM SIGMOBILE Mobile Computing and Communications Review 2 (4), 46-53, 1998 | 71 | 1998 |
Privacy stories: confidence in privacy behaviors through end user programming. L Church, J Anderson, J Bonneau, F Stajano SOUPS, 2009 | 64 | 2009 |
Multichannel security protocols FL Wong, F Stajano IEEE Pervasive Computing 6 (4), 31-39, 2007 | 64 | 2007 |