Name
Affiliation
Papers
STEVEN J. MURDOCH
Univ Cambridge, Cambridge, England
36
Collaborators
Citations 
PageRank 
78
806
57.90
Referers 
Referees 
References 
1752
643
329
Search Limit
1001000
Title
Citations
PageRank
Year
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited00.342021
Transparency Enhancing Technologies to Make Security Protocols Work for Humans.00.342019
VAMS: Verifiable Auditing of Access to Confidential Data.00.342018
Scanning the Internet for Liveness.20.392018
Are Payment Card Contracts Unfair? (Short Paper).00.342016
A Framework for the Game-theoretic Analysis of Censorship Resistance.00.342016
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture.100.502016
SoK: Making Sense of Censorship Resistance Systems.40.372016
Ad-Blocking and Counter Blocking: A Slice of the Arms Race.150.892016
Do You See What I See? Differential Treatment of Anonymous Users.120.652016
Insecure by Design: Protocols for Encrypted Phone Calls.10.352016
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization431.472015
Be Prepared: The EMV Preplay Attack10.362015
Security Protocols and Evidence: Where Many Payment Systems Fail.91.032014
EMV: why payment systems fail.90.732014
Quantifying and Measuring Anonymity20.372013
Towards a Theory of Application Compartmentalisation.00.342013
Might financial cryptography kill financial innovation? --- the curious case of EMV50.672011
A case study on measuring statistical data in the tor anonymity network341.912010
Chip and PIN is Broken362.812010
Impact of network topology on anonymity and overhead in low-latency anonymity networks60.432010
Failures of Tamper-Proofing in PIN Entry Devices30.542009
Optimised to Fail: Card Readers for Online Banking423.542009
Hardened stateless session cookies20.562008
Hardened stateless session cookies (transcript of discussion)00.342008
An improved clock-skew measurement technique for revealing hidden services381.742008
Metrics for Security and Performance in Low-Latency Anonymity Systems321.342008
What next after anonymity?00.342008
Sampled traffic analysis by internet-exchange-level adversaries923.912007
Securing network location awareness with authenticated DHCP.70.542007
Keep your enemies close: distance bounding against smartcard relay attacks1037.102007
Hot or not: revealing hidden services by their clock skew785.622006
Ignoring the great firewall of china767.492006
Embedding covert channels into TCP/IP1227.842005
Message splitting against the partial adversary60.872005
Covert channels for collusion in online computer games161.132004