Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456 Frank Stajano's Things
Please read this before mailing me, and this if you want to become my student. Contact information is at the bottom of the page.
I am a tenured Senior Lecturer at
the Computer Laboratory of
the University of Cambridge, where
I am a member of
the Security
group and of
the Digital Technology
Group (previously Laboratory for Communication
Engineering). Previously I was with
the Department of Engineering,
where in 2000 I was appointed to
the ARM Lectureship in Ubiquitous
Computing Systems. In other universities they might say "associate
professor" for this kind of post.
Please read this if
you want to become my student.
Before becoming a full-time academic I was a research scientist in
industry. I was made a Toshiba
Fellow and I worked in the research labs of Toshiba, AT&T Laboratories,
Oracle and Olivetti. The last three were actually the same lab, an
exciting centre of excellence and creativity, now sadly closed. You may read more about some
of our interesting research in my book and I have made the relevant section
freely downloadable.
I love Japan, I used to live in Japan and I maintain close
relationships with Japan, particularly with the Toshiba Corporate Research
and Development Center in Kawasaki and with Keio University.
My book
Security for Ubiquitous
Computing (Wiley, 2002; 0-470-84493-0) is about the brave new
world in which all sorts of everyday objects contain embedded
networked microprocessors. Bluetooth, Wi-Fi and all that stuff are
just the beginning, and the security implications of the new scenario
haven't been worked out in depth yet. Sounds interesting? Grab a copy
and you'll like it. All those who read it say very good things about
it. You may obtain it from the usualonlinesuspects
or from your local bookstore. The
book's own page has more details.
I am a popular public speaker and have given about 30 invited or
keynote talks at international events (not counting the regular
presentations of my academic papers). Highlights include my keynote at
CHES
2003 in Germany, where the other two keynote speakers
were Adi
Shamir
and Hans
Dobbertin, and the one at ICISC 2004 in Korea, where the other
keynote speaker was Mike
Reiter.
I offer consultancy services to industry on various topics within
my domains of expertise, ranging from system security to creativity
and innovation through to strategic research planning.
In my spare time I am a comics scholar with a
particular interest in Disney material. I have
coauthored a couple of books and several book chapters and articles on
this subject. I also talk to authors on my
new comics podcast.
I have a strong interest in kendo (Japanese swordsmanship). Since
October 2002 I am the leader
of Tsurugi Bashi, the kendo
dojo of the University of Cambridge. I am 3rd dan and
a BKA-licenced "regional coach"
(meaning that I run courses to train and license other kendo
instructors). I haven't kept an exact count but by now a few hundred
people started kendo as my students. Seven of them (Michael Gratzke,
Theo Rutter, Jake Barber, Adam Jackson, Min Lin, Daisy Chen and
Mikyung Jang) now hold Dan grades; one of them
even started a new
dojo. During my tenure as dojo leader, Cambridge has defeated
Oxford five consecutive times at the annual Varsity match.
I am
totally addicted to
my Powerball:
hi-tech gadget, RSI antidote, exercise machine... By far the best toy
I've had in years!
(Legend: if you are viewing this with CSS enabled,
these are books or book chapters and these are programs. The rest is mostly papers.)
Frank Stajano and Richard Clayton. Cyberdice: peer-to-peer
gambling in the presence of cheaters. Proceedings of 16th Security
Protocols Workshop, Cambridge, UK, 16-18 April 2008. To appear in
Springer
LNCS. (Unrevised
preprint for the moment.)
Ford Long Wong and Frank Stajano,
"Multichannel Security
Protocols", in IEEE Pervasive Computing, Special Issue on
Security and Privacy, 6(4):31-39, Oct-Dec 2007.
Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore
(Eds.),
Security and Privacy in Ad-hoc and Sensor Networks 4th
European Workshop, ESAS 2007, Cambridge, UK, July 2-3,
2007. Proceedings. Springer Lecture Notes in Computer Science
volume 4572.
Frank Stajano, Hyoung Joong Kim, Jong-Suk Chae, Seong-Dong Kim
(Eds.), Ubiquitous Convergence Technology, First International
Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006,
Revised Selected Papers. Springer Lecture Notes in Computer
Science volume 4412.
Chris Reed, John Hall, Ross Younger,
Ari Krakauer, Martin Thorpe, Ben Waine, Katie Bebbington, Ciaran
McNulty, Matthew Slyman, Dominic Crowhurst, Matt Cobley, Alfredo
Gregorio, Andrei
Serjantov, Jacob Nevins, Theo Honohan, Ben Mansell, Alastair Beresford, Richard Sharp, David Scott.
Pretty women (all-time
favourite: Monica
Bellucci) (There are people who find pictures
of undressed women offensive. If you belong to this category, please
do not follow these links.)
Air conditioning as a replacement for opening the windows
Books and articles written in a complicated way in the mistaken belief that this will make readers think that the author is more clever than them (when I read such junk I only think that the author is an idiot who doesn't understand his own stuff well enough to be capable to explain it clearly to me)
Cars, especially traffic jams and parking problems
2005: Pablo Vidales, Javier Baliosian, Joan Serrat, Glenford Mapp, Frank
Stajano, Andy Hopper, "Autonomic System
for Mobility Support in 4G Networks", in IEEE Journal On
Selected Areas In Communications, December 2005.
2005: Francesco Stajano,
"Addio, Romano!",
in
DDF(R)appet, June 2005, fanzine of the
Danish Donaldist society.
2005: Frank Stajano,
"RFID
is
X-ray vision",
University of Cambridge Computer Laboratory Technical Report
645. Revised write-up of keynote talk I gave at the first workshop in
the International
Workshop Series on RFID, Tokyo, Japan, November 2004. A condensed
version, featuring some prudish censorship courtesy of the
CACM editors, appears in the September 2005 issue of Communications
of the ACM.
2005: Pablo Vidales, Glenford Mapp, Frank Stajano, Jon Crowcroft,
Carlos Jesus Bernardos,
"A Practical
Approach for 4G Systems: Deployment of Overlay Networks", in
Proceedings of Testbeds and Research Infrastructures for the
DEvelopment of NeTworks and COMmunities / TRIDENTCOM 2005. (Best
paper award)
2002: Frank Stajano and Yutaka Sata, "Personalized reminder service", Japanese patent application P2002-12052 (in Japanese), 2002.
2001: Frank Stajano and Hiroshi Isozaki, "Apparatus for managing software and method of installing software", Japanese patent application P2001-315815 (in Japanese), 2001.
2001: Security
Policies (with Ross Anderson and
Jong-Hyeon Lee; book chapter in
Advances in Computers vol 55, Academic Press, 2001.)
2000: A personal homage to Carl
Barks, the great comics storyteller, creator of Uncle Scrooge and
Gyro Gearloose, who died on 2000-08-25 at age 99.
2000: A set of flash cards to practice the Japanese hiragana and
katakana syllabaries (Frank's
do-it-yourself kana cards). (If you are
interested in this sort of thing then you might have liked the very
elegant, and equally
free, Digital
Kana Flashcards created by Shane Hope; but the web page has now
disappeared.)
2000: The Resurrecting
Duckling -- What Next? (presented at,
and in the proceedings of, the 8th International Workshop on Security
protocols, Lecture Notes in Computer Science, Springer-Verlag,
2000-04-05.)
2000: Il
falsario contro il crittologo: sicurezza per la lotteria
informatizzata ("The Forger vs. the
Cryptologist: Security Issues for the Computerised Lottery", in
Italian. Invited paper presented at, and in the proceedings of, the 40th
conference of the Italian Statistical Society, Florence, Italy,
2000-04-26.)
1999: The Resurrecting Duckling:
Security Issues for Ad-hoc Wireless Networks (with Ross Anderson; presented at, and in the proceedings of,
the 7th International Workshop on Security protocols, Lecture Notes in
Computer Science, Springer-Verlag. A later version appears in the
proceedings of the 3rd AT&T Software Symposium.)
1998: A design for my Cambridge University
business card which several colleagues have
already requested and used for themselves. If you are browsing from
*.cam.ac.uk, I'll let you download my Word
file so you can use it too. It has my photograph, so the recipient
remembers who the hell this came from, and the fingerprints of my PGP keys (I've had PGP fingerprints on my business
cards since 1994, and greasy fingerprints on them since a lot before
that!). I'm pleased with the result, but Word is a big mess, especially
when you have to edit the sideways text. Maybe one day I'll write a program
to generate the postscript directly -- but don't hold your breath.
1998:
HTML pretty-print
1997: Restituire l'anima
rubata (in Notiziario GAF, issue 3,
Dec 1997; reprinted, with much better illustrations, in Comic Art 161,
April 1998)
1997: Don Rosa e il
Rinascimento disneyano (with Leonardo
Gori and Alberto Becattini; the first book in the world about the
American Disney comics author Don Rosa. In Italian.)
1997: A few self-generating programs that now live in
Eli
Biham's collection.
1996-7: a chapter
in The Art of Giorgio
Cavazzano (edited by Luca Boschi; a great
book about the Italian Disney comics author Giorgio Cavazzano. In
Italian.)
1994: Writing Tcl Programs in the Medusa environment
1992: Manuale Modem (tells you what
you can do with a modem from a user's perspective, with particular emphasis
on the "community spirit" of bulletin boards. Became the standard
textbook introduction to Fidonet in
Italy and was broadcast by RAI (Italy's state-owned TV broadcasting
company) over their telesoftware channel. In Italian.)
1991: Media Composition and Synchronization Aspects in an Interactive Multimedia
Authoring Environment (with Gianluca Pancaccini; in Proceedings of the Fourth International Conference on Human-Computer Interaction, Stuttgart, Germany, 1991, published by Elsevier.)
IPC9 aka 9th International
Python Conference (5-8 March 2001, Long Beach, CA, USA)
IPC10 aka 10th International
Python Conference (4-7 February 2002, Alexandria, VA, USA)
IWSAWC 2002
aka The 2nd International Workshop on Smart Appliances and Wearable
Computing (2 July 2002, Vienna, Austria)
Mobicom
2002 aka The Eighth ACM International Conference on Mobile
Computing and Networking (23-28 September 2002, Atlanta, GA, USA)
WiSe aka
Workshop on Wireless Security (28 September 2002, Atlanta, GA, USA)
SPC 2003 aka 1st
International Conference on Security in Pervasive Computing (12-14
March 2003, Boppard, Germany)
PerSec 2004 aka
First IEEE International Workshop on Pervasive Computing and
Communication Security, held in conjunction with PerCom 2004 (14-17 March 2004,
Orlando, FL, USA)
ICDCS 2004
aka 24th International Conference on Distributed Computing Systems
(23-26 March 2004, Tokyo, Japan)
Uk-Ubinet
2004 aka 2nd UK-UbiNet Workshop, Security, trust, privacy and
theory for ubiquitous computing (5-7th May 2004, Cambridge, UK)
ESAS
2004 aka 1st European Workshop on Security in Ad-Hoc and Sensor
Networks (5-6 August 2004, Heidelberg, Germany)
Mobiquitous 2004 aka
First Annual International Conference on Mobile and Ubiquitous
Systems: Networking and Services (22-25 August 2004, Boston, MA, USA)
UCS 2004
aka 2nd International Symposium on Ubiquitous Computing Systems (8-9
November 2004, Tokyo, Japan)
PerSec 2005 aka 2nd IEEE
International Workshop on Pervasive Computing and Communication
Security, held in conjunction with PerCom 2005 (8-12 March 2005, Hawaii,
USA) (Program co-chair)
SPC 2005 aka 2nd Conference
on Security in Pervasive Computing (6-8 April 2005, Boppard, Germany)
LoCa 2005 aka
International Workshop on Location- and Context-Awareness, in
cooperation with Pervasive
2005 (12-13 May 2005, Oberpfaffenhofen near Munich, Germany)
TSPUC 2005 aka
First International Workshop on Trust, Security and Privacy for
Ubiquitous Computing (13 June 2005, Taormina, Italy), affiliated with
IEEE WOWMOM 2005
PerSec 2006 aka 3rd IEEE
International Workshop on Pervasive Computing and Communication
Security, held in conjunction with PerCom 2006 (13-17 March 2006,
Pisa, Italy) (Program co-chair)
HPCC-06 aka The Second
International Conference on High Performance Computing and
Communications (13-15 September 2006, Munich, Germany) (Program
vice-chair)
ESAS 2006 aka Third
European Workshop on Security and Privacy in Ad Hoc and Sensor
Networks (20-21 September 2006, Hamburg, Germany)
UCS 2006 aka 2006
International Symposium on Ubiquitous Computing Systems (11-13 October
2006, Seoul, Korea)
ICUCT 2006 aka International
Conference on Ubiquitous Convergence Technology (6-8 December 2006,
Jeju, Korea) (Technical Program co-chair)
PerSec 2007 aka 4th IEEE
International Workshop on Pervasive Computing and Communication
Security, held in conjunction with PerCom 2007 (26 March 2007, New
York, USA) (Program co-chair)
PerCom 2007 aka 5th Annual
IEEE International Conference on Pervasive Computing and
Communications, (26-30 March 2007, New York, USA)
ESAS 2007 aka Fourth
European Workshop on Security and Privacy in Ad Hoc and Sensor
Networks (2-3 July 2007, Cambridge, UK) (General chair)
SecureComm 2007 aka
Third International Conference on Security and Privacy in
Communication Networks (17-21 September 2007, Nice,
France)
WiSec 2008
aka First ACM Conference on Wireless Network Security (31 March - 2
April 2008, Alexandria, VA, USA)
I encourage you to submit papers to those of the events above
for which the submission date is still in the future. The Calls for
Papers are available from the links.
The netpbm man pages (227
pages, 425 kB) in a legible and easily printable format. This is not funny
(sorry) but it's nevertheless damn useful. I was fed up with not being able
to read the man pages from windows and so I did the conversion (groff,
distiller etc) once and for all.
Frank Stajano, Dr. Ing., Ph.D.
Computer Laboratory
University of Cambridge
William Gates Building
15 JJ Thomson Avenue
Cambridge CB3 0FD
United Kingdom
Fax: +44 1223 334611
Telephone contact is generally not encouraged but, if you are a
friend or if you have a good reason, with a little homework you can
find my number in the departmental directory. Don't, if you're a
salesperson, or I may be rude to you.
Time zone info: the UK uses the UTC+0 time zone and goes to UTC+1
during the summer (actually from the last Sunday in March to the last
Sunday in October); most other EU countries, instead, are on UTC+1 and
UTC+2 respectively, but the change is synchronised, so the time
difference with Central Europe is now always 1 hour (this used to be
different). Japan is on UTC+9 and, in its wisdom, stays there all year
long.
These days, I get a lot of email. A long time ago I used to reply
to almost every message. I soon stopped doing that, but for many years
I kept on carefully reading every message. In the late 1990s I stopped
doing that too, because of spam: initially it was a big shock for me
to delete stuff without having read it ("what if it was important?"),
but then I got over it. Nowadays I ask the Bayesian filter in
Thunderbird (not as good as the wonderful
Python-powered Spambayes, but
more conveniently accessible) to throw away messages on my behalf
without even showing them to me. The stuff that gets through I usually
read, except if it's too long or if it contains Microsoft attachments.
DON'T send me Microsoft attachments, which are
notorious virus vehicles; ideally, if you want to be kind, please
don't send me any attachments at all. Unless I already know you have a
good reason for sending it to me, mail with attachments may be
discarded unread, or actually not even downloaded from the server. I
am happiest when people send me plain text or, at most, a pointer to a
pdf.
Even after all this filtering, I still get way too much mail. I
write over 10 replies per workday (often many more), but course I
can't hope to keep up with an influx that is an order of magnitude
larger. As Joachim Posegga once
wrote, "response time tends to be an exponential function of message
length".
If you want to write to me because you want to become my student at
Cambridge, please read this helpful and
instructive page. If you don't (and I will be able to tell from
your message) I might just silently ignore you; or, if you're lucky,
just point you again to this page.
Having said all that, my email address is fms27@cam.ac.uk. No point in
obfuscating it, as it's already on way too many spam lists.
I use and encourage the use of PGP (or its free equivalent GPG, to
which I even once contributed a
minor bug fix). My PGP keys are on the
keyservers. I prefer to receive encrypted mail messages as inline
ascii-armoured text as opposed to attachments.
HTML advice of the day: don't misuse tables for page layout purposes and,
above all, avoid browser-specific crap!
"With HTML 4.0, any Web
application can be vendor independent. There really is no
excuse for tying yourselves or your partners to proprietary
solutions."
--Tim Berners-Lee, inventor of the World Wide Web