Richard Clayton's Publications
- Richard Clayton:
Do Zebras get more Spam than Aardvarks?
Fifth Conference on Email and Anti-Spam, CEAS 2008, Mountain View, CA, USA, Aug 21--22 2008.
- R.G. Clegg, M.S. Withall, A.W. Moore, I.W. Phillips, D.J. Parish, M. Rio, R. Landa, H. Haddadi, K. Kyriakopoulos, J. Auge, R. Clayton and D. Salmon:
Challenges in the capture and dissemination of measurements from high-speed networks
IET Communications, Special Issue on Simulation, Analysis and Measurement of Broadband Network Traffic [TO APPEAR]
- Ross Anderson, Rainer Boehme, Richard Clayton, Tyler Moore:
Security Economics and European Policy.
Seventh Annual Workshop on Economics and Information Security, WEIS08, Dartmouth NH, USA, June 25--28 2008.
- Tyler Moore and Richard Clayton:
The Impact of Incentives on Notice and Take-down.
Seventh Annual Workshop on Economics and Information Security, WEIS08, Dartmouth NH, USA, June 25--28 2008.
- Frank Stajano and Richard Clayton:
Cyberdice: peer-to-peer gambling in the presence of cheaters.
Security Protocols Workshop 2008. Cambridge, UK, 16--18 April 2008.
- Ross Anderson, Rainer Boehme, Richard Clayton, Tyler Moore:
Security Economics and the Internal Market.
European Network and Information Security Agency, January 2008.
- Tyler Moore and Richard Clayton:
Evaluating the Wisdom of Crowds in Assessing Phishing Websites.
12th International Financial Cryptography and Data Security Conference (FC08). Cozumel, Mexico, January 28--31, 2008.
- Tyler Moore and Richard Clayton:
Examining the Impact of Website Take-Down on Phishing.
APWG eCrime Researchers Summit, Pittsburgh PA, USA, October 4--5 2007.
- Richard Clayton, Stephen J. Murdoch and Robert N.M. Watson:
Ignoring the Great Firewall of China.
I/S A Journal of Law and Policy for the Information Society, 3(2), Fall 2007, pp: 273--298.
- Richard Clayton:
Email Traffic: a quantitative snapshot.
Fourth Conference on Email and Anti-Spam, CEAS 2007, Mountain View, CA, USA, Aug 2--3 2007.
- Tyler Moore and Richard Clayton:
An Empirical Analysis of the Current State of Phishing Attack and Defence.
Sixth Annual Workshop on Economics and Information Security, WEIS07, Pittsburgh PA, USA, June 7--8 2007.
- Richard Clayton:
Can CLI be trusted ?
Information Security Technical Report, Elsevier. 12(2), 2007, pp. 74--79.
- George Danezis and Richard Clayton:
Introducing Traffic Analysis.
in:
Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati (Editors):
Digital Privacy: Theory, Technologies, and Practices, Auerbach Publications, Nov 2007.
- George Danezis and Richard Clayton:
Route Fingerprinting in Anonymous Communications.
Sixth IEEE International Conference on Peer-to-Peer Computing, Cambridge UK, 6--8 September 2006.
- Ross Anderson, Ian Brown, Richard Clayton, Terri Dowty, Douwe Korff and Eileen Munro:
Children's Databases -- Safety and Privacy.
A report for the Information Commissioner, FIPR, August 2006
- Richard Clayton:
Using Early Results from the 'spamHINTS' Project to Estimate an ISP Abuse Team's Task.
Third Conference on Email and Anti-Spam (CEAS 2006), Mountain View CA, USA, July 28--29 2006.
- Richard Clayton:
The Rising Tide: DDoS by Defective Designs.
Second Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'06), San Jose CA, USA, 7 July 2006.
- Richard Clayton, Stephen J. Murdoch and Robert N.M. Watson:
Ignoring the Great Firewall of China.
Sixth Workshop on Privacy Enhancing Technologies, Cambridge UK, 28--30 June 2006.
- Richard Clayton:
Anonymity and Traceability in Cyberspace.
Technical Report UCAM-CL-TR-653, University of Cambridge Computer Laboratory, November 2005.
- Richard Clayton:
Stopping Outgoing Spam by Examining Incoming Server Logs.
Second Conference on Email and Anti-Spam (CEAS 2005), Stanford CA, USA, July 21--22 2005.
- Andrei Serjantov and Richard Clayton:
Modelling Incentives for Email Blocking Strategies.
Fourth Annual Workshop on Economics and Information Security, WEIS05, Boston MA, USA, June 2--3 2005.
- Richard Clayton:
Failures in a Hybrid Content Blocking System.
In George Danezis and David Martin, editors, Privacy Enhancing Technologies, Fifth International Workshop, PET 2005, Cavtat, Croatia, May 30--June 1 2005, volume 3856 of LNCS, pages 78--92, Springer Verlag.
- Richard Clayton:
Insecure Real-World Authentication Protocols (or Why Phishing is so Profitable).
Thirteenth International Workshop on Security Protocols, Cambridge, UK, April 20--22 2005.
- Richard Clayton:
Who'd phish from the summit of Kilimanjaro?
In Andrew S. Patrick and Moti Yung, editors, Financial Cryptography and Data Security: Ninth International Conference FC 2005, Roseau, The Commonwealth of Dominica, February 28--March 3 2005, volume 3570 of LNCS, pages 91--92, Springer Verlag.
- Richard Clayton:
Stopping Spam by Extrusion Detection
First Conference on Email and Anti-Spam (CEAS 2004), Mountain View CA, USA, July 30--31 2004.
- Ben Laurie and Richard Clayton:
Proof-of-Work Proves Not to Work
Third Annual Workshop on Economics and Information Security, WEIS04, Minneapolis MN, May 13--14 2004.
- Richard Clayton:
Improving Onion Notation
In Roger Dingledine, editor, Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26--28 2003, volume 2760 of LNCS, pages 81--87, Springer Verlag.
- Ellis Weinberger, Richard Clayton and Ross Anderson:
A Security Policy for a Digital Repository
National Preservation Office Journal, 11, October 2002, pages 12--13.
- Richard Clayton and George Danezis:
Chaffinch: Confidentiality in the Face of Legal Threats
In Fabien A. P. Petitcolas, editor, Information Hiding Workshop (IH 2002) Noordwijkerhout, The Netherlands, October 7--9 2002, volume 2578 of LNCS, pages 70--86, Springer Verlag.
- Richard Clayton and Mike Bond:
Experience Using a Low-Cost FPGA Design to Crack DES Keys
In Burton S. Kaliski Jr., Çetin K. Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems -- CHES 2002, Redwood Shores CA, USA, August 13--15 2002, volume 2523 of LNCS, pages 579--592, Springer Verlag.
- Richard Clayton:
Workshop Report for IPTPS'02: 1st International Workshop on Peer-to-Peer Systems
In Peter Druschel, Frans Kaashoek and Antony Rowstron, editors, Peer-to-Peer Systems, IPTPS 2002, Cambridge MA, USA, March 7--8 2002, volume 2429 of LNCS, pages 1--21, Springer Verlag.
- Richard Clayton, George Danezis and Markus G. Kuhn:
Real World Patterns of Failure in Anonymity Systems
In Ira S. Moskowitz, editor, Information Hiding Workshop (IH 2001) Pittsburgh PA, USA, April 25--27 2001, volume 2137 of LNCS, pages 230--244, Springer Verlag.
-
Chris Hall and Richard Clayton:
Isolation of Assembler Coding `Optimizations'.
Software Practice & Experience, 9(3), March 1978, page 248.
Return to Richard Clayton's Home Page
last modified 06 JUN 2007 -- http://www.cl.cam.ac.uk/~rnc1/publications.html
|