Ross J. Anderson
#4,463
Most Influential Person Now
British computer scientist, cryptographer
Ross J. Anderson's AcademicInfluence.com Rankings
Ross J. Andersoncomputer-science Degrees
Computer Science
#433
World Rank
#450
Historical Rank
Database
#1527
World Rank
#1602
Historical Rank
Download Badge
Computer Science
Why Is Ross J. Anderson Influential?
(Suggest an Edit or Addition)According to Wikipedia, Ross John Anderson is a researcher, author, and industry consultant in security engineering. He is Professor of Security Engineering at the Department of Computer Science and Technology, University of Cambridge where he is part of the University's security group.
Ross J. Anderson's Published Works
Published Works
- Information hiding-a survey (1999) (2811)
- Security engineering - a guide to building dependable distributed systems (2. ed.) (2001) (1470)
- On the limits of steganography (1998) (1462)
- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks (1999) (1453)
- Tamper resistance: a cautionary note (1996) (1159)
- Attacks on Copyright Marking Systems (1998) (1020)
- Why information security is hard - an economic perspective (2001) (882)
- Optical Fault Induction Attacks (2002) (833)
- Low Cost Attacks on Tamper Resistant Devices (1997) (787)
- The Economics of Information Security (2006) (757)
- Combining Crypto with Biometrics Effectively (2006) (615)
- Measuring the Cost of Cybercrime (2012) (534)
- Why cryptosystems fail (1994) (466)
- Aurasium: Practical Policy Enforcement for Android Applications (2012) (461)
- Serpent: A Proposal for the Advanced Encryption Standard (1998) (456)
- Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations (1998) (312)
- Key infection: smart trust for smart dust (2004) (304)
- Two remarks on public key cryptology (2002) (293)
- The Economics of Online Crime (2009) (266)
- Serpent: A New Block Cipher Proposal (1998) (253)
- Robustness Principles for Public Key Protocols (1995) (235)
- The Eternity Service (1996) (228)
- Chip and PIN is Broken (2010) (227)
- Combining cryptography with biometrics effectively (2005) (224)
- Temporal node centrality in complex networks. (2012) (223)
- Improving smart card security using self-timed circuits (2002) (221)
- Evaluation of copyright marking systems (1999) (217)
- Cryptographic Processors-A Survey (2006) (217)
- The Steganographic File System (1998) (204)
- How Much Is Location Privacy Worth? (2005) (203)
- The Resurrecting Duckling: security issues for ubiquitous computing (2002) (189)
- Programming Satan's Computer (1995) (188)
- A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs (2012) (186)
- Stretching the Limits of Steganography (1996) (186)
- Information hiding-A survey : Identification and protection of multimedia information (1999) (185)
- Sybil-Resistant DHT Routing (2005) (182)
- Why cryptosystems fail (1993) (180)
- The memorability and security of passwords – some empirical results (2000) (166)
- A new family of authentication protocols (1998) (165)
- On a new way to read data from memory (2002) (159)
- Minding your p's and q's (1996) (158)
- Information Security Economics - and Beyond (2007) (154)
- Security in open versus closed systems - the dance of Boltzmann (2002) (147)
- Two Practical and Provably Secure Block Ciphers: BEARS and LION (1996) (141)
- Eight friends are enough: social graph approximation via public listings (2009) (137)
- Cryptography and competition policy: issues with 'trusted computing' (2003) (133)
- Who Controls the off Switch? (2010) (130)
- Chameleon - A New Kind of Stream Cipher (1997) (127)
- Chip and Skim: Cloning EMV Cards with the Pre-play Attack (2012) (126)
- PIN skimmer: inferring PINs through the camera and microphone (2013) (125)
- TIGER: A Fast New Hash Function (1996) (122)
- NetCard - A Practical Electronic-Cash System (1996) (122)
- API-Level Attacks on Embedded Systems (2001) (120)
- Rendezvous: A search engine for binary code (2013) (116)
- Information security: where computer science, economics and psychology meet (2009) (95)
- Balanced self-checking asynchronous logic for smart card applications (2003) (92)
- Searching for the Optimum Correlation Attack (1994) (92)
- How to Build Robust Shared Control Systems (1998) (92)
- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast (1999) (91)
- Thinking Inside the Box: System-Level Failures of Tamper Proofing (2008) (88)
- On the Security Economics of Electricity Metering (2010) (87)
- Optimised to Fail: Card Readers for Online Banking (2009) (87)
- Liability and Computer Security: Nine Principles (1994) (84)
- Centrality prediction in dynamic human contact networks (2012) (83)
- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication (2010) (77)
- On the Reliability of Electronic Payment Systems (1996) (65)
- Security Economics and European Policy (2008) (65)
- The XenoService { A Distributed Defeat for Distributed Denial of Service (2000) (65)
- Fast Exclusion of Errant Devices from Vehicular Networks (2008) (63)
- Measuring the changing cost of cybercrime (2019) (62)
- New Strategies for Revocation in Ad-Hoc Networks (2007) (61)
- Tools and Technology of Internet Filtering (2008) (57)
- Murphy’s law, the fitness of evolving species, and the limits of software reliability (1999) (55)
- Security Economics and Critical National Infrastructure (2009) (53)
- UEPS - A Second Generation Electronic Wallet (1992) (47)
- What You Get is What You C: Controlling Side Effects in Mainstream C Compilers (2018) (45)
- The snooping dragon: social-malware surveillance of the Tibetan movement (2009) (44)
- Social Authentication: Harder Than It Looks (2012) (44)
- The Newton Channel (1996) (43)
- Fortifying key negotiation schemes with poorly chosen passwords (1994) (42)
- Reading this may harm your computer: The psychology of malware warnings (2014) (40)
- Economics and Internet Security: A Survey of Recent Analytical, Empirical, and Behavioral Research (2011) (37)
- EMV: why payment systems fail (2014) (37)
- Technical perspectiveA chilly sense of security (2009) (36)
- Don’t Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards (2016) (36)
- Resilience of the Internet Interconnection Ecosystem (2011) (35)
- The Classification of Hash Functions (1993) (33)
- The Protection of Substation Communications (2009) (33)
- Attack on server assisted authentication protocols (1992) (32)
- The economics of resisting censorship (2005) (31)
- Security policies (2001) (31)
- Weaknesses of copyright marking systems (1998) (31)
- Security Protocols and Evidence: Where Many Payment Systems Fail (2014) (29)
- The Economics of Information Security : A Survey and Open Questions (2006) (29)
- The Case for Serpent (2000) (29)
- An Experimental Evaluation of Robustness of Networks (2013) (29)
- The Correctness of Crypto Transaction Sets (2000) (28)
- On Fibonacci Keystream Generators (1994) (28)
- Serpent: A Flexible Block Cipher With Maximum Assurance (1998) (28)
- How Certification Systems Fail: Lessons from the Ware Report (2012) (27)
- Guest Editors' Introduction: Economics of Information Security (2005) (27)
- On the Security of Digital Tachographs (1998) (26)
- Practical RSA trapdoor (1993) (26)
- We will make you like our research: The development of a susceptibility-to-persuasion scale (2014) (26)
- It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud (2015) (25)
- Authentication for Resilience: The Case of SDN (2013) (25)
- Protecting domestic power-line communications (2006) (25)
- Can We Fix the Security Economics of Federated Authentication? (2011) (24)
- How to cheat at the lottery (or, massively parallel requirements engineering) (1999) (24)
- Soft Tempest { An Opportunity for NATO (1999) (24)
- The Man-in-the-Middle Defence (2009) (23)
- Closing the phishing hole: fraud, risk, and nonbanks (2007) (23)
- Why bouncing droplets are a pretty good model of quantum mechanics (2014) (23)
- Confidentiality and connecting for health. (2008) (21)
- Key management for substations: Symmetric keys, public keys or no keys? (2011) (21)
- HPF: A comparison of performance and programming style (1995) (21)
- The Economics of Censorship Resistance (2004) (21)
- Solving a Class of Stream Ciphers (1990) (20)
- Algorithmic Game Theory: Incentives and Information Security (2007) (20)
- The Grenade Timer: Fortifying the Watchdog Timer Against Malicious Mobile Code (2000) (20)
- Information Hiding: an Annotated Bibliography (1999) (20)
- Crypto in Europe - Markets, Law and Policy (1995) (20)
- Serpent and Smartcards (1998) (19)
- An Update on the BMA Security Policy (1997) (17)
- Smart meter security : a survey (2011) (16)
- Certification and evaluation: A security economics perspective (2009) (15)
- Cryptographic credit control in pre-payment metering systems (1995) (15)
- Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings (1996) (14)
- Shifting Borders (2007) (14)
- Tree Functions and Cipher Systems (1991) (14)
- The Formal Verification of a Payment System (1999) (14)
- Faster attack on certain stream ciphers (1993) (13)
- Phish and Chips Traditional and New Recipes for Attacking EMV (2006) (13)
- Under threat: patient confidentiality and NHS computing (2006) (13)
- Be Prepared: The EMV Preplay Attack (2015) (13)
- On dealing with adversaries fairly (2004) (12)
- The GCHQ Protocol and Its Problems (1997) (12)
- International comparison of bank fraud reimbursement: customer perceptions and contractual terms (2016) (12)
- Position Statement in RFID S&P Panel: RFID and the Middleman (2007) (11)
- Secure Books: Protecting the Distribution of Knowledge (1997) (11)
- The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web (1998) (10)
- RFID and the Middleman (2007) (10)
- Collaborating with the Enemy on Network Management (2014) (10)
- Robbing the Bank with a Theorem Prover - (Abstract) (2007) (10)
- Making security sustainable (2018) (9)
- Security economics: a personal perspective (2012) (9)
- Failures of Tamper-Proofing in PIN Entry Devices (2009) (9)
- Protocol Analysis, Composability and Computation (2004) (9)
- Maxwell's fluid model of magnetism (2015) (8)
- Protecting Embedded Systems - The Next Ten Years (2001) (8)
- Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV (2011) (8)
- The Correctness of Crypto Transaction Sets (Discussion) (2000) (7)
- Jikzi: A New Framework for Secure Publishing (1999) (7)
- The Initial Costs and Maintenance Costs of Protocols (2005) (6)
- Risk and Privacy Implications of Consumer Payment Innovation in the Connected Age (2012) (6)
- Why quantum computing is hard - and quantum cryptography is not provably secure (2013) (6)
- Violation of Bell's inequality in fluid mechanics (2013) (6)
- Do You Believe in Tinker Bell? The Social Externalities of Trust (2015) (5)
- Jikzi - a new framework for security policy, trusted publishing and electronic commerce (2000) (5)
- The Dancing Bear: A New Way of Composing Ciphers (2004) (5)
- DigiTally: Piloting Offline Payments for Phones (2017) (5)
- Towards a security architecture for substations (2011) (4)
- Dynamic Topologies for Robust Scale-Free Networks (2008) (4)
- On the Security of the EMV Secure Messaging API (Extended Abstract) (2007) (4)
- What We Can Learn from API Security (2003) (4)
- Are payment card contracts unfair (2016) (4)
- SMAPs: Short Message Authentication Protocols (2016) (4)
- Internet Security (2013) (3)
- Are Payment Card Contracts Unfair? (Short Paper) (2016) (3)
- Silver Bullet Talks with Ross Anderson (2007) (3)
- Reconciling Multiple Objectives - Politics or Markets? (2017) (3)
- A Modern Rotor Machine (1993) (3)
- Software Security: State of the Art (2007) (2)
- System Security for Cyborgs (2005) (2)
- Number 641 Computer Laboratory UCAM-CL-TR-641 ISSN 1476-2986 Cryptographic processors – a survey (2005) (2)
- Collaborating with the Enemy on Network Management (Transcript of Discussion) (2014) (2)
- How brain type influences online safety WORKING PAPER (2009) (2)
- Be prepared: The EMV pre-play attack (2015) (2)
- Tamper Resistance (1999) (2)
- Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion) (2011) (2)
- Cloud computing security ( 8 / 8 ) Nigori : Storing secrets in the cloud (2)
- Tiger: a Fast New Hash Function 1 Motivation and Design Requirements (1996) (1)
- Image Steganography based on a Parameterized Canny Edge Detection Algorithm (2016) (1)
- Privacy and security: Making security sustainable (2018) (1)
- Covert and Deniable Communications (2018) (1)
- Security, Functionality and Scale? (2008) (1)
- The Dependability of Computer Evidence (1995) (1)
- Privacy for Tigers (2018) (1)
- It's the Anthropology, Stupid! (2010) (1)
- Connecting for health. (2008) (1)
- Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion) (2015) (1)
- Protocol Governance: The Elite, or the Mob? (2012) (1)
- Imagine the future : hundreds of embedded computers per person , all cooperating via ad hoc wireless networks . What will the security implications be ? 22 (0)
- Risk: remarks - Review and commentary on "Closing the phishing hole: fraud, risk, and nonbanks" by Ross Anderson (2007) (0)
- Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only) (2016) (0)
- (or, Massively Parallel Requirements Engineering) (1999) (0)
- Economics and psychology of security ( 2 / 11 ) Security economics (2013) (0)
- On the el ia bi I i ty of Electronic Payment Syst (1996) (0)
- The Trust Economy of Brief Encounters (2009) (0)
- Author ' s personal copy Centrality prediction in dynamic human contact networks (2012) (0)
- On the Importance of Trusted Distribution and Authentic Channels for the Distribution of Medical Knowledge (1997) (0)
- Attacks based on communication Attack based on SMS & MMS (0)
- The Millennium Bug – Reasons not to Panic (1999) (0)
- Chapter 21 1 Internet Security (2012) (0)
- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed? (2012) (0)
- SMAPs: Short Message Authentication Protocols (Transcript of Discussion) (2016) (0)
- Security Issues of PIN Based Payment Systems (2002) (0)
- Digital signature (2003) (0)
- What Next After Anonymity? (Transcript of Discussion) (2008) (0)
- What Next after Anonymity? (2008) (0)
- A Generation-based Text Steganography Method using SQL Queries (2018) (0)
- Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion) (2017) (0)
- Claims Involving Electronic Payment Systems (2002) (0)
- Cryptology: Where Is the New Frontier? (2011) (0)
- It's the Anthropology, Stupid! (Transcript of Discussion) (2010) (0)
- Fast Software Encryption: Cambridge Security Workshop, Cambridge, U.K., December 9 - 11, 1993. Proceedings (1994) (0)
- Papers on Smartcard Engineering Making Smartcard Systems Robust (0)
- Please, steal my money! The psychology of Auction Fraud: Or0441 (2016) (0)
- Free speech online and offline (2002) (0)
- A new Relational Watermarking Scheme Resilient to Additive Attacks (2020) (0)
- The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion) (2004) (0)
- Economics of Information Security the Economics of Resisting Censorship (0)
- The Dependability of Complex Socio-technical Systems (2011) (0)
- Protocol Governance: The Elite, or the Mob? (Transcript of Discussion) (2012) (0)
- Susceptibility to Persuasion–II Scale (2019) (0)
This paper list is powered by the following services:
Other Resources About Ross J. Anderson
What Schools Are Affiliated With Ross J. Anderson?
Ross J. Anderson is affiliated with the following schools: