2023 - Research.com Computer Science in United Kingdom Leader Award
The scientist’s investigation covers issues in Computer security, Cryptography, Internet privacy, Telescope and Public-key cryptography. The Computer security study combines topics in areas such as Government and Copy protection. He has included themes like Security token, Mobile phone, Information protection policy, Code and Protocol in his Cryptography study.
His Internet privacy research is multidisciplinary, relying on both Cognitive password, Password psychology, Password policy, Data security and Password. His study looks at the relationship between Telescope and topics such as Detector, which overlap with Cosmic ray, Astrophysics, Computational physics and Ultra-high-energy cosmic ray. His work deals with themes such as Information hiding, Steganography tools, Steganography and Covert channel, which intersect with Public-key cryptography.
His primary areas of study are Computer security, Internet privacy, Cryptography, Cryptographic protocol and Telescope. His Computer security research integrates issues from Payment and The Internet. His work on Government expands to the thematically related Internet privacy.
His biological study spans a wide range of topics, including Security token, Theoretical computer science and Key. He has included themes like Ultra-high-energy cosmic ray, Cosmic ray and Detector in his Telescope study. Much of his study explores Information security relationship to Security information and event management.
His primary scientific interests are in Computer security, Internet privacy, Telescope, Cosmic ray and Astrophysics. His work deals with themes such as Adversarial system and Payment, which intersect with Computer security. His studies deal with areas such as Payment card, Cybercrime, The Internet and Persuasion as well as Internet privacy.
His study in The Internet is interdisciplinary in nature, drawing from both Government, Enforcement, Law enforcement and Mandate. Ross Anderson works mostly in the field of Astrophysics, limiting it down to concerns involving Anisotropy and, occasionally, Isotropy. His work in Chip and PIN addresses subjects such as Authentication, which are connected to disciplines such as Cryptography.
Ross Anderson mainly investigates Astrophysics, Telescope, Cosmic ray, Internet privacy and Computer security. His work on Sky is typically connected to Neutron flux as part of general Astrophysics study, connecting several disciplines of science. His Cosmic ray research is multidisciplinary, relying on both Detector and Anisotropy.
He combines subjects such as Cybercrime, The Internet, Persuasion, Malware and Appeal with his study of Internet privacy. Many of his studies involve connections with topics such as Payment and Computer security. His Payment study incorporates themes from Pre-play attack and Vulnerability.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Information hiding-a survey
F.A.P. Petitcolas;R.J. Anderson;M.G. Kuhn.
Proceedings of the IEEE (1999)
On the limits of steganography
R.J. Anderson;F.A.P. Petitcolas.
IEEE Journal on Selected Areas in Communications (1998)
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Frank Stajano;Frank Stajano;Ross J. Anderson.
international workshop on security (1999)
Tamper resistance: a cautionary note
Ross Anderson;Markus Kuhn.
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2 (1996)
Attacks on Copyright Marking Systems
Fabien A. P. Petitcolas;Ross J. Anderson;Markus G. Kuhn.
information hiding (1998)
Why information security is hard - an economic perspective
annual computer security applications conference (2001)
Optical Fault Induction Attacks
Sergei P. Skorobogatov;Ross J. Anderson.
cryptographic hardware and embedded systems (2002)
Low Cost Attacks on Tamper Resistant Devices
Ross J. Anderson;Markus G. Kuhn.
international workshop on security (1997)
Venous thromboembolic complications (VTE) in children: first analyses of the Canadian Registry of VTE
M Andrew;M David;M Adams;K Ali.
Why cryptosystems fail
computer and communications security (1993)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: