Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Frank Stajano's Things
[go: Go Back, main page]

Holding a wonderful
katana in the workshop of sword polisher Roberto Candido, in Tsurumi,
Yokohama-shi, Japan.

Frank Stajano
(filologo disneyano --- visit my comics podcast)

Hello and welcome to my home on the web!

Please read this before mailing me, and this if you want to become my student.
Contact information is at the bottom of the page.

I am a tenured Senior Lecturer at the Computer Laboratory of the University of Cambridge, where I am a member of the Security group and of the Digital Technology Group (previously Laboratory for Communication Engineering). Previously I was with the Department of Engineering, where in 2000 I was appointed to the ARM Lectureship in Ubiquitous Computing Systems. In other universities they might say "associate professor" for this kind of post. Please read this if you want to become my student.

Before becoming a full-time academic I was a research scientist in industry. I was made a Toshiba Fellow and I worked in the research labs of Toshiba, AT&T Laboratories, Oracle and Olivetti. The last three were actually the same lab, an exciting centre of excellence and creativity, now sadly closed. You may read more about some of our interesting research in my book and I have made the relevant section freely downloadable.

I love Japan, I used to live in Japan and I maintain close relationships with Japan, particularly with the Toshiba Corporate Research and Development Center in Kawasaki and with Keio University.

me, holding my book My book Security for Ubiquitous Computing (Wiley, 2002; 0-470-84493-0) is about the brave new world in which all sorts of everyday objects contain embedded networked microprocessors. Bluetooth, Wi-Fi and all that stuff are just the beginning, and the security implications of the new scenario haven't been worked out in depth yet. Sounds interesting? Grab a copy and you'll like it. All those who read it say very good things about it. You may obtain it from the usual online suspects or from your local bookstore. The book's own page has more details.

I am a popular public speaker and have given about 30 invited or keynote talks at international events (not counting the regular presentations of my academic papers). Highlights include my keynote at CHES 2003 in Germany, where the other two keynote speakers were Adi Shamir and Hans Dobbertin, and the one at ICISC 2004 in Korea, where the other keynote speaker was Mike Reiter.

I offer consultancy services to industry on various topics within my domains of expertise, ranging from system security to creativity and innovation through to strategic research planning.

In my spare time I am a comics scholar with a particular interest in Disney material. I have coauthored a couple of books and several book chapters and articles on this subject. I also talk to authors on my new comics podcast.

I have a strong interest in kendo (Japanese swordsmanship). Since October 2002 I am the leader of Tsurugi Bashi, the kendo dojo of the University of Cambridge. I am 3rd dan and a BKA-licenced "regional coach" (meaning that I run courses to train and license other kendo instructors). I haven't kept an exact count but by now a few hundred people started kendo as my students. Seven of them (Michael Gratzke, Theo Rutter, Jake Barber, Adam Jackson, Min Lin, Daisy Chen and Mikyung Jang) now hold Dan grades; one of them even started a new dojo. During my tenure as dojo leader, Cambridge has defeated Oxford five consecutive times at the annual Varsity match.

Powerball TechnoI am totally addicted to my Powerball: hi-tech gadget, RSI antidote, exercise machine... By far the best toy I've had in years!

Things I... | am | 've written recently | teach | like | don't like | 've created, written or built | am on the program committee of | keep on my web page | said


Things I am

Things I've written recently(latest first)

(Legend: if you are viewing this with CSS enabled, these are books or book chapters and these are programs. The rest is mostly papers.)

Older ones are listed further down.

Things I teach

Courses and projects

I used to run the Computer and Communications Technology Reading Club, perhaps better known as the LCE Monday Meetings.

PhD students I supervise(d)

Undergraduate students I supervise(d)

Part II Computer Security (Computer Laboratory)

Lent 1999:
Chris Reed, John Hall, Ross Younger, Ari Krakauer, Martin Thorpe, Ben Waine, Katie Bebbington, Ciaran McNulty, Matthew Slyman, Dominic Crowhurst, Matt Cobley, Alfredo Gregorio, Andrei Serjantov, Jacob Nevins, Theo Honohan, Ben Mansell, Alastair Beresford, Richard Sharp, David Scott.
Lent 2000:
Siraj Khaliq, Julian Brown, George Danezis, Mark Shinwell, Patrick Wynn, Bruno Bowden, Justin Siu, Paul Gotch.

3rd year project (Computer Laboratory)

1999-2000:
George Danezis.

4th year project (Engineering)

2002-2003:
Julian Dale, David Stern, Mark Victory.
2003-2004:
Grant Oddoye.
2004-2005:
Peng Yuan Fan, Arun Rakhra.

Things I like

Things I don't like

Things I've created, written or built (many of which you may have for free from here)

(Legend: see above.)

Things I am (or have been) on the program committee of

  1. IPC9 aka 9th International Python Conference (5-8 March 2001, Long Beach, CA, USA)
  2. IPC10 aka 10th International Python Conference (4-7 February 2002, Alexandria, VA, USA)
  3. IWSAWC 2002 aka The 2nd International Workshop on Smart Appliances and Wearable Computing (2 July 2002, Vienna, Austria)
  4. Mobicom 2002 aka The Eighth ACM International Conference on Mobile Computing and Networking (23-28 September 2002, Atlanta, GA, USA)
  5. WiSe aka Workshop on Wireless Security (28 September 2002, Atlanta, GA, USA)
  6. SPC 2003 aka 1st International Conference on Security in Pervasive Computing (12-14 March 2003, Boppard, Germany)
  7. PerSec 2004 aka First IEEE International Workshop on Pervasive Computing and Communication Security, held in conjunction with PerCom 2004 (14-17 March 2004, Orlando, FL, USA)
  8. ICDCS 2004 aka 24th International Conference on Distributed Computing Systems (23-26 March 2004, Tokyo, Japan)
  9. Uk-Ubinet 2004 aka 2nd UK-UbiNet Workshop, Security, trust, privacy and theory for ubiquitous computing (5-7th May 2004, Cambridge, UK)
  10. ESAS 2004 aka 1st European Workshop on Security in Ad-Hoc and Sensor Networks (5-6 August 2004, Heidelberg, Germany)
  11. Mobiquitous 2004 aka First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (22-25 August 2004, Boston, MA, USA)
  12. UCS 2004 aka 2nd International Symposium on Ubiquitous Computing Systems (8-9 November 2004, Tokyo, Japan)
  13. PerSec 2005 aka 2nd IEEE International Workshop on Pervasive Computing and Communication Security, held in conjunction with PerCom 2005 (8-12 March 2005, Hawaii, USA) (Program co-chair)
  14. SPC 2005 aka 2nd Conference on Security in Pervasive Computing (6-8 April 2005, Boppard, Germany)
  15. LoCa 2005 aka International Workshop on Location- and Context-Awareness, in cooperation with Pervasive 2005 (12-13 May 2005, Oberpfaffenhofen near Munich, Germany)
  16. TSPUC 2005 aka First International Workshop on Trust, Security and Privacy for Ubiquitous Computing (13 June 2005, Taormina, Italy), affiliated with IEEE WOWMOM 2005
  17. PerSec 2006 aka 3rd IEEE International Workshop on Pervasive Computing and Communication Security, held in conjunction with PerCom 2006 (13-17 March 2006, Pisa, Italy) (Program co-chair)
  18. HPCC-06 aka The Second International Conference on High Performance Computing and Communications (13-15 September 2006, Munich, Germany) (Program vice-chair)
  19. ESAS 2006 aka Third European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (20-21 September 2006, Hamburg, Germany)
  20. UCS 2006 aka 2006 International Symposium on Ubiquitous Computing Systems (11-13 October 2006, Seoul, Korea)
  21. ICUCT 2006 aka International Conference on Ubiquitous Convergence Technology (6-8 December 2006, Jeju, Korea) (Technical Program co-chair)
  22. PerSec 2007 aka 4th IEEE International Workshop on Pervasive Computing and Communication Security, held in conjunction with PerCom 2007 (26 March 2007, New York, USA) (Program co-chair)
  23. PerCom 2007 aka 5th Annual IEEE International Conference on Pervasive Computing and Communications, (26-30 March 2007, New York, USA)
  24. ESAS 2007 aka Fourth European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (2-3 July 2007, Cambridge, UK) (General chair)
  25. SecureComm 2007 aka Third International Conference on Security and Privacy in Communication Networks (17-21 September 2007, Nice, France)
  26. WiSec 2008 aka First ACM Conference on Wireless Network Security (31 March - 2 April 2008, Alexandria, VA, USA)
  27. WiSec 2009 aka Second ACM Conference on Wireless Network Security (16 - 18 March 2009, Zurich, Switzerland)

I encourage you to submit papers to those of the events above for which the submission date is still in the future. The Calls for Papers are available from the links.

Things I keep on my web page

...and sometimes on my door; many items here are in the form of little A4 posters that you can print and attach to your own door too!

Things I said (in theory I should wait to be dead before putting this up, but...)


Contact Information

Frank Stajano, Dr. Ing., Ph.D.
Computer Laboratory
University of Cambridge
William Gates Building
15 JJ Thomson Avenue
Cambridge CB3 0FD
United Kingdom

Fax: +44 1223 334611

Telephone contact is generally not encouraged but, if you are a friend or if you have a good reason, with a little homework you can find my number in the departmental directory. Don't, if you're a salesperson, or I may be rude to you.

Time zone info: the UK uses the UTC+0 time zone and goes to UTC+1 during the summer (actually from the last Sunday in March to the last Sunday in October); most other EU countries, instead, are on UTC+1 and UTC+2 respectively, but the change is synchronised, so the time difference with Central Europe is now always 1 hour (this used to be different). Japan is on UTC+9 and, in its wisdom, stays there all year long.

Email

These days, I get a lot of email. A long time ago I used to reply to almost every message. I soon stopped doing that, but for many years I kept on carefully reading every message. In the late 1990s I stopped doing that too, because of spam: initially it was a big shock for me to delete stuff without having read it ("what if it was important?"), but then I got over it. Nowadays I ask the Bayesian filter in Thunderbird (not as good as the wonderful Python-powered Spambayes, but more conveniently accessible) to throw away messages on my behalf without even showing them to me. The stuff that gets through I usually read, except if it's too long or if it contains Microsoft attachments.

DON'T send me Microsoft attachments, which are notorious virus vehicles; ideally, if you want to be kind, please don't send me any attachments at all. Unless I already know you have a good reason for sending it to me, mail with attachments may be discarded unread, or actually not even downloaded from the server. I am happiest when people send me plain text or, at most, a pointer to a pdf.

Even after all this filtering, I still get way too much mail. I write over 10 replies per workday (often many more), but course I can't hope to keep up with an influx that is an order of magnitude larger. As Joachim Posegga once wrote, "response time tends to be an exponential function of message length".

If you want to write to me because you want to become my student at Cambridge, please read this helpful and instructive page. If you don't (and I will be able to tell from your message) I might just silently ignore you; or, if you're lucky, just point you again to this page.

Having said all that, my email address is fms27@cam.ac.uk. No point in obfuscating it, as it's already on way too many spam lists.

I use and encourage the use of PGP (or its free equivalent GPG, to which I even once contributed a minor bug fix). My PGP keys are on the keyservers. I prefer to receive encrypted mail messages as inline ascii-armoured text as opposed to attachments.


HTML advice of the day: don't misuse tables for page layout purposes and, above all, avoid browser-specific crap!

"With HTML 4.0, any Web application can be vendor independent. There really is no excuse for tying yourselves or your partners to proprietary solutions."
--Tim Berners-Lee, inventor of the World Wide Web

Valid HTML 4.0! (recheck) Valid CSS! (recheck) Best Viewed With Any Browser