• Publications
  • Influence
Security engineering - a guide to building dependable distributed systems (2. ed.)
Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Expand
Information hiding-a survey
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptibleExpand
Why information security is hard - an economic perspective
  • R. Anderson
  • Computer Science
  • Seventeenth Annual Computer Security Applications…
  • 10 December 2001
According to one common view, information security comes down to technical measures. Expand
On the limits of steganography
In this paper, we clarify what steganography is and what it can do. Expand
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. Expand
Combining Crypto with Biometrics Effectively
We propose the first practical and secure way to integrate the iris biometric into cryptographic applications. Expand
Tamper resistance: a cautionary note
An increasing number of systems from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems -- someExpand
Aurasium: Practical Policy Enforcement for Android Applications
The increasing popularity of Google's mobile platform Android makes it the prime target of the latest surge in mobile malware. Expand
Serpent: A Proposal for the Advanced Encryption Standard
We propose a new block cipher as a candidate for the Advanced Encryption Standard. Expand
Optical Fault Induction Attacks
We describe a new class of attacks on secure microcontrollers and smartcards. Expand