Author: Frank Stajano
Publications
Co-authors
Productive Colleagues
Publications
Rehman, Kasim, Stajano, Frank, Coulouris, George (2007): An Architecture for Interactive Context-Aware Applications. In IEEE Pervasive Computing, 6 (1) pp. 73-80. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.5
Wong, Ford-Long, Stajano, Frank (2007): Multichannel Security Protocols. In IEEE Pervasive Computing, 6 (4) pp. 31-39. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.76
Stajano, Frank (2005): RFID is x-ray vision. In Communications of the ACM, 48 (9) pp. 31-33. https://dl.acm.org/doi/10.1145/1081992.1082015
Rehman, Kasim, Stajano, Frank, Coulouris, George (2002): Interfacing with the invisible computer. In: Proceedings of the Second Nordic Conference on Human-Computer Interaction October 19-23, 2002, Aarhus, Denmark. pp. 213-216. https://portal.acm.org/citation.cfm?doid=572020.572048
Rehman, Kasim, Stajano, Frank, Coulouris, George (2005): Visually Interactive Location-Aware Computing. In: Beigl, Michael, Intille, Stephen S., Rekimoto, Jun, Tokuda, Hideyuki (eds.) UbiComp 2005 Ubiquitous Computing - 7th International Conference September 11-14, 2005, Tokyo, Japan. pp. 177-194. https://dx.doi.org/10.1007/11551201_11
Beresford, Alastair R., Stajano, Frank (2004): Mix Zones: User Privacy in Location-aware Services. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops PerCom 2004 Workshops 14-17 March, 2004, Orlando, FL, USA. pp. 127-131. https://csdl.computer.org/comp/proceedings/percomw/2004/2106/00/21060127abs.htm
Wong, Ford-Long, Stajano, Frank (2006): Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies. In: PerCom 2006 - 4th IEEE Conference on Pervasive Computing and Communications Workshops 13-17 March, 2006, Pisa, Italy. pp. 246-250. https://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.98
Church, Luke, Anderson, Jonathan, Bonneau, Joesph, Stajano, Frank (2009): Privacy stories: confidence in privacy behaviors through end user programming. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 20. https://doi.acm.org/10.1145/1572532.1572559