Ross Anderson

Results: 117



#Item
1Cryptography / Cyberwarfare / Computer security / Clipper chip / Key escrow / Crypto Wars / Strong cryptography / National Security Agency / Escrow / Computer network / Encryption / Secure communication

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
2

To: Monica A. Neronha, Vice President, Legal Services, Blue Cross Blue Shield of Rhode Island, Patrick Ross, Government Affairs Manager, Tufts Health Plan, and Philip N. Anderson, Associate General Counsel, United Health

Add to Reading List

Source URL: www.ohic.ri.gov

Language: English - Date: 2016-06-14 16:48:58
    3

    Bitcoin Redux Ross Anderson, Ilia Shumailov, Mansoor Ahmed and Alessandro Rietmann Cambridge University Computer Laboratory May 28, 2018 Abstract We study how attempts to regulate cryptocurrencies, or at least to mitigat

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2018-06-05 04:03:01
      4

      How Much is Location Privacy Worth? George Danezis, Stephen Lewis and Ross Anderson University of Cambridge, Computer Laboratory, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom {George Danezis,Stephen.Lewis,Ross

      Add to Reading List

      Source URL: infosecon.net

      Language: English - Date: 2006-03-16 20:15:32
        5

        A birthday present every eleven wallets? The security of customer-chosen banking PINs Joseph Bonneau, S¨oren Preibusch, Ross Anderson Computer Laboratory University of Cambridge {jcb82,sdp36,rja14}@cl.cam.ac.uk

        Add to Reading List

        Source URL: preibusch.de

        Language: English - Date: 2012-03-06 07:30:26
          6

          Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG Abstract. Cryptographic protocols are used in distributed systems to

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          - Date: 2006-07-26 10:17:27
            7

            DigiTally: Piloting Offline Payments for Phones Khaled Baqer Ross Anderson Jeunese Adrienne Payne

            Add to Reading List

            Source URL: www.cl.cam.ac.uk

            - Date: 2017-06-28 16:02:25
              8

              6A Boys Singles Jonesboro @ Allen Park OctoberAndrew Anderson, Greenwood Junius Ross, Little Rock Hall

              Add to Reading List

              Source URL: members.ahsaa.org

              - Date: 2016-10-19 11:00:29
                9

                RGE MICHELAKIS BORUT MIKLAVIC KHING OEI WILLIAM POTTS STUART POWERS PAUL SCHURMAN CRAIG SCORDELLIS ROSS TURNER SAHM ADRANGI SH ED KEITH T. ANDERSON J. KYLE BASS RICHARD BARRERA JONATHAN BERGER NEHAL CHOPRA NANCY DAVIS AL

                Add to Reading List

                Source URL: www.thehedgefundjournal.com

                - Date: 2016-03-03 11:11:32
                  10Computer access control / Exonumia / Token coin / IP address / Anonymous remailer / One-time password / Computer security / Access control / Computing

                  Do You Believe in Tinker Bell? The Social Externalities of Trust Khaled Baqer and Ross Anderson Computer Laboratory, University of Cambridge, UK

                  Add to Reading List

                  Source URL: www.cl.cam.ac.uk

                  Language: English - Date: 2016-02-02 10:23:17
                  UPDATE