Follow
Tom Chothia
Tom Chothia
Verified email at cs.bham.ac.uk
Title
Cited by
Cited by
Year
Finishing the euchromatic sequence of the human genome
International Human Genome Sequencing Consortium
Nature 431 (7011), 931-945, 2004
46832004
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE computer security foundations symposium, 107-121, 2010
1662010
GAZE: a generic framework for the integration of gene-prediction data by dynamic programming
KL Howe, T Chothia, R Durbin
Genome research 12 (9), 1418-1427, 2002
1262002
Statistical measurement of information leakage
K Chatzikokolakis, T Chothia, A Guha
International Conference on Tools and Algorithms for the Construction and …, 2010
1212010
A traceability attack against e-passports
T Chothia, V Smirnov
International Conference on Financial Cryptography and Data Security, 20-34, 2010
1202010
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them
E Marin, D Singelée, FD Garcia, T Chothia, R Willems, B Preneel
Proceedings of the 32nd annual conference on computer security applications …, 2016
932016
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
892006
A survey of anonymous peer-to-peer file-sharing
T Chothia, K Chatzikokolakis
International Conference on Embedded and Ubiquitous Computing, 744-755, 2005
762005
Leakwatch: Estimating information leakage from java programs
T Chothia, Y Kawamoto, C Novakovic
European Symposium on Research in Computer Security, 219-236, 2014
642014
Relay cost bounding for contactless EMV payments
T Chothia, FD Garcia, J Ruiter, J Breekel, M Thompson
International Conference on Financial Cryptography and Data Security, 189-206, 2015
602015
Time protection: the missing OS abstraction
Q Ge, Y Yarom, T Chothia, G Heiser
Proceedings of the Fourteenth EuroSys Conference 2019, 1-17, 2019
582019
Component connectors with QoS guarantees
F Arbab, T Chothia, S Meng, YJ Moon
International Conference on Coordination Languages and Models, 286-304, 2007
582007
An Offline Capture The {Flag-Style} Virtual Machine and an Assessment of Its Value for Cybersecurity Education
T Chothia, C Novakovic
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
552015
A tool for estimating information leakage
T Chothia, Y Kawamoto, C Novakovic
International Conference on Computer Aided Verification, 690-695, 2013
552013
A statistical test for information leaks using continuous mutual information
T Chothia, A Guha
2011 IEEE 24th Computer Security Foundations Symposium, 177-190, 2011
532011
From coordination to stochastic models of QoS
F Arbab, T Chothia, R Mei, S Meng, YJ Moon, C Verhoef
International Conference on Coordination Languages and Models, 268-287, 2009
492009
Type-based distributed access control
T Chothia, D Duggan, J Vitek
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 170-184, 2003
492003
A Framework for Automatically Checking Anonymity with μCRL
T Chothia, S Orzan, J Pang, M Torabi Dashti
International Symposium on Trustworthy Global Computing, 301-318, 2006
472006
Schedulability of asynchronous real-time concurrent objects
MM Jaghoori, FS de Boer, T Chothia, M Sirjani
The Journal of Logic and Algebraic Programming 78 (5), 402-416, 2009
452009
Q-automata: Modelling the resource usage of concurrent components
T Chothia, J Kleijn
Electronic Notes in Theoretical Computer Science 175 (2), 153-167, 2007
432007
The system can't perform the operation now. Try again later.
Articles 1–20