Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456 Frank Stajano's Things
I have a mixed academic and industrial background, having worked in
the R&D centres of major electronics, telecommunications and
software multinationals (Toshiba, AT&T, Oracle, Olivetti) before
taking up a permanent faculty post at the University of
Cambridge. Thanks to this, my research has always retained a strong
practical orientation. Since my academic appointment I have continued
to consult for industry in Europe and Asia on systems security,
strategic research planning, creativity and innovation. I am the
author of the well-regarded research
monograph Security for Ubiquitous
Computing (Wiley, 2002).
I am a popular public speaker and I was called upon as invited or
keynote speaker over 30 times on three continents (not counting the
presentations of my refereed papers). I also served
as program chair at 7 international conferences or
workshops; as program committee member for over 30 events; and as
technical reviewer of book proposals for scientific publishers such as
Wiley and Addison-Wesley. I have authored or
co-authored over 50 refereed papers, three book
chapters, two patent applications, one book and I have edited two LNCS
proceedings volumes. Six of my former graduate
students have now received Cambridge PhDs.
I was elected a Toshiba Fellow in 2000. I was appointed to a
Lectureship at the University of Cambridge in 2000, originally at the
Department of Engineering, then transferred to the Computer Laboratory in
2004. In 2006 I was awarded academic tenure until retiring age and in
2007 I was promoted to a University Senior Lectureship.
Before that, I had the privilege of doing a security PhD here at
Cambridge under the supervision
of Ross Anderson. I
completed it in exactly three years: matriculated in January 1998,
submitted in December 2000, approved with no corrections in
January 2001. My PhD was nominated for the British Computer Society
"distinguished dissertation" award and was later turned into
the book mentioned above. The
first few steps of my academic lineage are all at the Cambridge
Computer Laboratory and go back to its
founder Sir Maurice
Wilkes, who built
the first stored-program
computer in the world: Frank Stajano
- Ross
Anderson
- Roger
Needham -
David Wheeler - Maurice Wilkes.
I have taught a variety of core computing
subjects to engineers and computer scientists, including operating
systems, computer architecture, security, data structures and
algorithms, as well as more specialized subjects such as hardware
design, FPGA programming, assembly language programming and ubiquitous
computing. I greatly enjoy lecturing and helping other people reach
"lightbulb moments".
I love Japan! I lived in Japan for one year and I maintain strong
ties to the Toshiba
Corporate Research and Development Center in Kawasaki and
Keio University.
In my spare time I am a comics scholar with a
particular interest in Disney
material. I have coauthored a few books, book chapters and articles on
this subject. Although not as frequently as I'd like, I offer audio
interviews with comics authors on my
comics podcast.
I have a strong interest in kendo (Japanese swordsmanship). Since
October 2002 I am the leader
of Tsurugi Bashi, the kendo
dojo of the University of Cambridge. I am 3rd dan and
a BKA-licenced "regional coach"
(meaning that I run courses to train and license other kendo
instructors). I attended the gruelling one-week "Foreign Kendo
Leaders" seminar in Kitamoto, Japan in July 2008. I haven't kept an
exact count but by now a few hundred people have started kendo as my
students. At least eleven of them (Michael Gratzke*, Theo
Rutter, Jake Barber, Adam Jackson*, Min
Lin*, Daisy Chen*, Ivy Ko, Mikyung Jang*, Eng Tin
Aw*, Matt Marley* and Periklis
Akritidis) now hold Dan grades and those with a star
also hold teaching licences; the first of them
even started a new
dojo. Since I became dojo leader in late 2002, Cambridge defeated
Oxford six out of seven times at the annual Varsity match, and also
won first place at the 2009 British inter-university championship.
2009: Francesco Stajano,
"Intervista a
Giorgio Pezzin", in Paolo Castagno (Ed.), Giorgio Pezzin -
Tanto gli strumenti sono solo dipinti, Papersera, 2009.
2009: Francesco Stajano,
"Giorgio Pezzin, il genio
techno", in Paolo Castagno (Ed.), Giorgio Pezzin - Tanto gli
strumenti sono solo dipinti, Papersera, 2009.
2009: Jonathan Anderson and Frank Stajano, "Not That Kind of
Friend: Misleading Divergences Between Online Social Networks and
Real-World Social Protocols". Proceedings of Seventeenth International
Workshop on Security Protocols, Cambridge, UK, 1-3 April 2009. To
appear in Springer LNCS. You may download
an unrevised
preprint.
2009: Frank
Stajano, "Security
Issues in Ubiquitous Computing", book chapter
in Handbook of Ambient Intelligence and Smart Environments, to
appear. It received the highest score of any chapter in the book, as
two out of two volume editors who reviewed it gave it a "strong
accept". Thanks to the people who sent
me useful
comments.
2008: Frank Stajano and Richard Clayton. Cyberdice: peer-to-peer
gambling in the presence of cheaters. Proceedings of 16th Security
Protocols Workshop, Cambridge, UK, 16-18 April 2008. To appear in
Springer LNCS. You may download
the unrevised
preprint if you are willing to send me useful comments.
2007: Ford Long Wong and Frank Stajano,
"Multichannel Security
Protocols", in IEEE Pervasive Computing, Special Issue on
Security and Privacy, 6(4):31-39, Oct-Dec 2007.
2007: Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore
(Eds.),
Security and Privacy in Ad-hoc and Sensor Networks 4th
European Workshop, ESAS 2007, Cambridge, UK, July 2-3,
2007. Proceedings. Springer Lecture Notes in Computer Science
volume 4572.
2006: Frank Stajano, Hyoung Joong Kim, Jong-Suk Chae, Seong-Dong Kim
(Eds.), Ubiquitous Convergence Technology, First International
Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006,
Revised Selected Papers. Springer Lecture Notes in Computer
Science volume 4412.
2005: Pablo Vidales, Javier Baliosian, Joan Serrat, Glenford Mapp, Frank
Stajano, Andy Hopper, "Autonomic System
for Mobility Support in 4G Networks", in IEEE Journal On
Selected Areas In Communications, December 2005.
2005: Francesco Stajano,
"Addio, Romano!",
in
DDF(R)appet, June 2005, fanzine of the
Danish Donaldist society.
2005: Frank Stajano,
"RFID
is
X-ray vision",
University of Cambridge Computer Laboratory Technical Report
645. Revised write-up of keynote talk I gave at the first workshop in
the International
Workshop Series on RFID, Tokyo, Japan, November 2004. A condensed
version, featuring some prudish censorship courtesy of the
CACM editors, appears in the September 2005 issue of Communications
of the ACM.
2005: Pablo Vidales, Glenford Mapp, Frank Stajano, Jon Crowcroft,
Carlos Jesus Bernardos,
"A Practical
Approach for 4G Systems: Deployment of Overlay Networks", in
Proceedings of Testbeds and Research Infrastructures for the
DEvelopment of NeTworks and COMmunities / TRIDENTCOM 2005. (Best paper
award)
2004: Frank
Stajano, Security for
Ubiquitous Computing (abstract of invited talk), in Proceedings of
7th International Conference on Information Security and Cryptology
(ICISC 2004), Seoul, Korea, Dec 2004. Springer LNCS 3506.
2002: Frank Stajano and Yutaka Sata, "Personalized reminder service", Japanese patent application P2002-12052 (in Japanese), 2002.
2001: Frank Stajano and Hiroshi Isozaki, "Apparatus for managing software and method of installing software", Japanese patent application P2001-315815 (in Japanese), 2001.
2001: Security
Policies (with Ross Anderson and
Jong-Hyeon Lee; book chapter in
Advances in Computers vol 55, Academic Press, 2001.)
2000: A personal homage to Carl
Barks, the great comics storyteller, creator of Uncle Scrooge and
Gyro Gearloose, who died on 2000-08-25 at age 99.
2000: A set of flash cards to practice the Japanese hiragana and
katakana syllabaries (Frank's
do-it-yourself kana cards). (If you are
interested in this sort of thing then you might have liked the very
elegant, and equally
free, Digital
Kana Flashcards created by Shane Hope; but the web page has now
disappeared.)
2000: The Resurrecting
Duckling -- What Next? (presented at,
and in the proceedings of, the 8th International Workshop on Security
protocols, Lecture Notes in Computer Science, Springer-Verlag,
2000-04-05.)
2000: Il
falsario contro il crittologo: sicurezza per la lotteria
informatizzata ("The Forger vs. the
Cryptologist: Security Issues for the Computerised Lottery", in
Italian. Invited paper presented at, and in the proceedings of, the 40th
conference of the Italian Statistical Society, Florence, Italy,
2000-04-26.)
1999: The Resurrecting Duckling:
Security Issues for Ad-hoc Wireless Networks (with Ross Anderson; presented at, and in the proceedings of,
the 7th International Workshop on Security protocols, Lecture Notes in
Computer Science, Springer-Verlag. A later version appears in the
proceedings of the 3rd AT&T Software Symposium.)
1998: A design for my Cambridge University
business card which several colleagues have
already requested and used for themselves. If you are browsing from
*.cam.ac.uk, I'll let you download my Word
file so you can use it too. It has my photograph, so the recipient
remembers who the hell this came from, and the fingerprints of my PGP keys (I've had PGP fingerprints on my business
cards since 1994, and greasy fingerprints on them since a lot before
that!). I'm pleased with the result, but Word is a big mess, especially
when you have to edit the sideways text. Maybe one day I'll write a program
to generate the postscript directly -- but don't hold your breath.
1998:
HTML pretty-print
1997: Restituire l'anima
rubata (in Notiziario GAF, issue 3,
Dec 1997; reprinted, with much better illustrations, in Comic Art 161,
April 1998)
1997: Don Rosa e il
Rinascimento disneyano (with Leonardo
Gori and Alberto Becattini; the first book in the world about the
American Disney comics author Don Rosa. In Italian.)
1997: A few self-generating programs that now live in
Eli
Biham's collection.
1996-7: a chapter
in The Art of Giorgio
Cavazzano (edited by Luca Boschi; a great
book about the Italian Disney comics author Giorgio Cavazzano. In
Italian.)
1992: Manuale Modem (tells you what
you can do with a modem from a user's perspective, with particular emphasis
on the "community spirit" of bulletin boards. Became the standard
textbook introduction to Fidonet in
Italy and was broadcast by RAI (Italy's state-owned TV broadcasting
company) over their telesoftware channel. In Italian.)
1991: Media Composition and Synchronization Aspects in an Interactive Multimedia
Authoring Environment (with Gianluca Pancaccini; in Proceedings of the Fourth International Conference on Human-Computer Interaction, Stuttgart, Germany, 1991, published by Elsevier.)
Chris Reed, John Hall, Ross Younger,
Ari Krakauer, Martin Thorpe, Ben Waine, Katie Bebbington, Ciaran
McNulty, Matthew Slyman, Dominic Crowhurst, Matt Cobley, Alfredo
Gregorio, Andrei
Serjantov, Jacob Nevins, Theo Honohan, Ben Mansell, Alastair Beresford, Richard Sharp, David Scott.
Pretty women (all-time
favourite: Monica
Bellucci) (There are people who find pictures
of undressed women offensive. If you belong to this category, please
do not follow these links.)
Air conditioning as a replacement for opening the windows
Books and articles written in a complicated way in the mistaken belief that this will make readers think that the author is more clever than them (when I read such junk I only think that the author is an idiot who doesn't understand his own stuff well enough to be capable to explain it clearly to me)
Cars, especially traffic jams and parking problems
IPC9 aka 9th International
Python Conference (5-8 March 2001, Long Beach, CA, USA)
IPC10 aka 10th International
Python Conference (4-7 February 2002, Alexandria, VA, USA)
IWSAWC 2002
aka The 2nd International Workshop on Smart Appliances and Wearable
Computing (2 July 2002, Vienna, Austria)
Mobicom
2002 aka The Eighth ACM International Conference on Mobile
Computing and Networking (23-28 September 2002, Atlanta, GA, USA)
WiSe aka
Workshop on Wireless Security (28 September 2002, Atlanta, GA, USA)
SPC 2003 aka 1st
International Conference on Security in Pervasive Computing (12-14
March 2003, Boppard, Germany)
PerSec 2004 aka
First IEEE International Workshop on Pervasive Computing and
Communication Security, held in conjunction with PerCom 2004 (14-17 March 2004,
Orlando, FL, USA)
ICDCS 2004
aka 24th International Conference on Distributed Computing Systems
(23-26 March 2004, Tokyo, Japan)
Uk-Ubinet
2004 aka 2nd UK-UbiNet Workshop, Security, trust, privacy and
theory for ubiquitous computing (5-7th May 2004, Cambridge, UK)
ESAS
2004 aka 1st European Workshop on Security in Ad-Hoc and Sensor
Networks (5-6 August 2004, Heidelberg, Germany)
Mobiquitous 2004 aka
First Annual International Conference on Mobile and Ubiquitous
Systems: Networking and Services (22-25 August 2004, Boston, MA, USA)
UCS 2004
aka 2nd International Symposium on Ubiquitous Computing Systems (8-9
November 2004, Tokyo, Japan)
PerSec 2005 aka 2nd IEEE
International Workshop on Pervasive Computing and Communication
Security, held in conjunction with PerCom 2005 (8-12 March 2005, Hawaii,
USA) (Program co-chair)
SPC 2005 aka 2nd Conference
on Security in Pervasive Computing (6-8 April 2005, Boppard, Germany)
LoCa 2005 aka
International Workshop on Location- and Context-Awareness, in
cooperation with Pervasive
2005 (12-13 May 2005, Oberpfaffenhofen near Munich, Germany)
TSPUC 2005 aka
First International Workshop on Trust, Security and Privacy for
Ubiquitous Computing (13 June 2005, Taormina, Italy), affiliated with
IEEE WOWMOM 2005
PerSec 2006 aka 3rd IEEE
International Workshop on Pervasive Computing and Communication
Security, held in conjunction with PerCom 2006 (13-17 March 2006,
Pisa, Italy) (Program co-chair)
HPCC-06 aka The Second
International Conference on High Performance Computing and
Communications (13-15 September 2006, Munich, Germany) (Program
vice-chair)
ESAS 2006 aka Third
European Workshop on Security and Privacy in Ad Hoc and Sensor
Networks (20-21 September 2006, Hamburg, Germany)
UCS 2006 aka 2006
International Symposium on Ubiquitous Computing Systems (11-13 October
2006, Seoul, Korea)
ICUCT 2006 aka International
Conference on Ubiquitous Convergence Technology (6-8 December 2006,
Jeju, Korea) (Program co-chair)
PerSec 2007 aka 4th IEEE
International Workshop on Pervasive Computing and Communication
Security, held in conjunction with PerCom 2007 (26 March 2007, New
York, USA) (Program co-chair)
PerCom 2007 aka 5th Annual
IEEE International Conference on Pervasive Computing and
Communications, (26-30 March 2007, New York, USA)
ESAS 2007 aka Fourth
European Workshop on Security and Privacy in Ad Hoc and Sensor
Networks (2-3 July 2007, Cambridge, UK) (General chair)
SecureComm 2007 aka
Third International Conference on Security and Privacy in
Communication Networks (17-21 September 2007, Nice,
France)
WiSec 2008
aka First ACM Conference on Wireless Network Security (31 March - 2
April 2008, Alexandria, VA, USA)
WiSec 2009
aka Second ACM Conference on Wireless Network Security (16 - 18 March
2009, Zurich, Switzerland)
IWSSI/SPMU
2009 aka Second International Workshop on Security and Privacy in
Spontaneous Interaction and Mobile Device Use, held in conjunction
with Pervasive 2009 (11
May 2009, Nara, Japan)
SPW 2009 aka
Seventeenth International Workshop on Security Protocols (1-3 April
2009, Cambridge, UK)
WISTP 2009 aka Workshop in
Information Security Theory and Practices on Smart Devices, Pervasive
Systems, and Ubiquitous Networks (2-4 September 2009, Brussels,
Belgium)
DWSAN4CIP 2009
aka International Workshop on Dependable Wireless Sensor and Actuator
Networks for Critical Infrastructure Protection (18-19 October 2009,
St. Petersburg, Russia), held in conjunction
with ICUMT 2009.
WISEC 2010
aka Third ACM Conference on Wireless Network Security (March 2010, New
York, USA) (Program co-chair)
I encourage you to submit papers to those of the events above
for which the submission date is still in the future. The Calls for
Papers are available from the links.
The netpbm man pages (227
pages, 425 kB) in a legible and easily printable format. This is not funny
(sorry) but it's nevertheless damn useful. I was fed up with not being able
to read the man pages from windows and so I did the conversion (groff,
distiller etc) once and for all.
Frank Stajano, Dr. Ing., Ph.D.
Computer Laboratory
University of Cambridge
William Gates Building
15 JJ Thomson Avenue
Cambridge CB3 0FD
United Kingdom
Fax: +44 1223 334611
Telephone contact is generally not encouraged but, if you are a
friend or if you have a good reason, with a little homework you can
find my number in the departmental directory. Don't, if you're a
salesperson, or I may be rude to you.
Time zone info: the UK uses the UTC+0 time zone and goes to UTC+1
during the summer (actually from the last Sunday in March to the last
Sunday in October); most other EU countries, instead, are on UTC+1 and
UTC+2 respectively, but the change is synchronised, so the time
difference with Central Europe is now always 1 hour (this used to be
different). Japan is on UTC+9 and, in its wisdom, stays there all year
long.
These days, I get a lot of email. A long time ago I used to reply
to almost every message. I soon stopped doing that, but for many years
I kept on carefully reading every message. In the late 1990s I stopped
doing that too, because of spam: initially it was a big shock for me
to delete stuff without having read it ("what if it was important?"),
but then I got over it. Nowadays I ask the Bayesian filter in
Thunderbird (not as good as the wonderful
Python-powered Spambayes, but
more conveniently accessible) to throw away messages on my behalf
without even showing them to me. The stuff that gets through I usually
read, except if it's too long or if it contains Microsoft attachments.
DON'T send me Microsoft attachments, which are
notorious virus vehicles; ideally, if you want to be kind, please
don't send me any attachments at all. Unless I already know you have a
good reason for sending it to me, mail with attachments may be
discarded unread, or actually not even downloaded from the server. I
am happiest when people send me plain text or, at most, a pointer to a
pdf.
Even after all this filtering, I still get way too much mail. I
write over 10 replies per workday (often many more), but course I
can't hope to keep up with an influx that is an order of magnitude
larger. As Joachim Posegga once
wrote, "response time tends to be an exponential function of message
length".
If you want to write to me because you want to become my student at
Cambridge, please read this helpful and
instructive page. If you don't (and I will be able to tell from
your message) I might just silently ignore you; or, if you're lucky,
just point you again to this page.
Having said all that, my email address is fms27@cam.ac.uk. No point in
obfuscating it, as it's already on way too many spam lists.
I use and encourage the use of PGP (or its free
equivalent GPG, to which I even
once contributed
a minor bug fix). My PGP keys are on the
keyservers. I prefer to receive encrypted mail messages as inline
ascii-armoured text as opposed to attachments.
HTML advice of the day: don't misuse tables for page layout purposes and,
above all, avoid browser-specific crap!
"With HTML 4.0, any Web
application can be vendor independent. There really is no
excuse for tying yourselves or your partners to proprietary
solutions."
--Tim Berners-Lee, inventor of the World Wide Web