Share This Author
Security engineering - a guide to building dependable distributed systems (2. ed.)
- Ross J. Anderson
- Computer Science
In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.
Information hiding-a survey
An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
On the limits of steganography
It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Why information security is hard - an economic perspective
- Ross J. Anderson
- Computer ScienceSeventeenth Annual Computer Security Applications…
- 10 December 2001
The author puts forward a contrary view: information insecurity is at least as much due to perverse incentives as it is due to technical measures.
Attacks on Copyright Marking Systems
A number of attacks are presented that enable the information hidden by copyright marks and other information in digital pictures, video, audio and other multimedia objects to be removed or otherwise rendered unusable.
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
A resurrecting duckling security policy model is presented, which describes secure transient association of a device with multiple serialised owners over the air in a short range wireless channel.
Combining Crypto with Biometrics Effectively
The first practical and secure way to integrate the iris biometric into cryptographic applications is proposed, and an error-free key can be reproduced reliably from genuine iris codes with a 99.5 percent success rate.
Tamper resistance: a cautionary note
It is concluded that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable.
The Economics of Information Security
The economics of information security has recently become a thriving and fast-moving discipline and provides valuable insights into more general areas such as the design of peer-to-peer systems, the optimal balance of effort by programmers and testers, why privacy gets eroded, and the politics of digital rights management.
Serpent: A Proposal for the Advanced Encryption Standard
A new block cipher is proposed that uses S-boxes similar to those of DES in a new structure that simultaneously allows a more rapid avalanche, a more efficient bitslice implementation, and an easy analysis that enables it to be more secure than three-key triple-DES.