Folgen
Tom Chothia
Tom Chothia
Bestätigte E-Mail-Adresse bei cs.bham.ac.uk
Titel
Zitiert von
Zitiert von
Jahr
Finishing the euchromatic sequence of the human genome
International Human Genome Sequencing Consortium
Nature 431 (7011), 931-945, 2004
48732004
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE computer security foundations symposium, 107-121, 2010
1712010
GAZE: a generic framework for the integration of gene-prediction data by dynamic programming
KL Howe, T Chothia, R Durbin
Genome research 12 (9), 1418-1427, 2002
1292002
Statistical measurement of information leakage
K Chatzikokolakis, T Chothia, A Guha
Tools and Algorithms for the Construction and Analysis of Systems: 16th …, 2010
1242010
A traceability attack against e-passports
T Chothia, V Smirnov
Financial Cryptography and Data Security: 14th International Conference, FC …, 2010
1222010
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them
E Marin, D Singelée, FD Garcia, T Chothia, R Willems, B Preneel
Proceedings of the 32nd annual conference on computer security applications …, 2016
1042016
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
942006
A survey of anonymous peer-to-peer file-sharing
T Chothia, K Chatzikokolakis
Embedded and Ubiquitous Computing–EUC 2005 Workshops: EUC 2005 Workshops …, 2005
772005
Time protection: the missing OS abstraction
Q Ge, Y Yarom, T Chothia, G Heiser
Proceedings of the Fourteenth EuroSys Conference 2019, 1-17, 2019
722019
Leakwatch: Estimating information leakage from java programs
T Chothia, Y Kawamoto, C Novakovic
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
682014
An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education
T Chothia, C Novakovic
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
642015
Relay cost bounding for contactless EMV payments
T Chothia, FD Garcia, J De Ruiter, J Van Den Breekel, M Thompson
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
622015
Component connectors with QoS guarantees
F Arbab, T Chothia, S Meng, YJ Moon
Coordination Models and Languages: 9th International Conference …, 2007
622007
A tool for estimating information leakage
T Chothia, Y Kawamoto, C Novakovic
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
592013
A statistical test for information leaks using continuous mutual information
T Chothia, A Guha
2011 IEEE 24th Computer Security Foundations Symposium, 177-190, 2011
562011
From coordination to stochastic models of QoS
F Arbab, T Chothia, R van der Mei, S Meng, YJ Moon, C Verhoef
Coordination Models and Languages: 11th International Conference …, 2009
522009
Type-based distributed access control
T Chothia, D Duggan, J Vitek
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 170-184, 2003
492003
A Framework for Automatically Checking Anonymity with μCRL
T Chothia, S Orzan, J Pang, M Torabi Dashti
Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007
472007
Schedulability of asynchronous real-time concurrent objects
MM Jaghoori, FS de Boer, T Chothia, M Sirjani
The Journal of Logic and Algebraic Programming 78 (5), 402-416, 2009
462009
Breaking all the things—A systematic survey of firmware extraction techniques for IoT devices
S Vasile, D Oswald, T Chothia
Smart Card Research and Advanced Applications: 17th International Conference …, 2019
452019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20