Analysing unlinkability and anonymity using the applied pi calculus M Arapinis, T Chothia, E Ritter, M Ryan 2010 23rd IEEE Computer Security Foundations Symposium, 107-121, 2010 | 158 | 2010 |
GAZE: a generic framework for the integration of gene-prediction data by dynamic programming KL Howe, T Chothia, R Durbin Genome Research 12 (9), 1418-1427, 2002 | 120 | 2002 |
A traceability attack against e-passports T Chothia, V Smirnov International Conference on Financial Cryptography and Data Security, 20-34, 2010 | 107 | 2010 |
Statistical measurement of information leakage K Chatzikokolakis, T Chothia, A Guha International Conference on Tools and Algorithms for the Construction and …, 2010 | 103 | 2010 |
Metrics for action-labelled quantitative transition systems Y Deng, T Chothia, C Palamidessi, J Pang Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006 | 85 | 2006 |
A survey of anonymous peer-to-peer file-sharing T Chothia, K Chatzikokolakis International Conference on Embedded and Ubiquitous Computing, 744-755, 2005 | 70 | 2005 |
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them E Marin, D Singelée, FD Garcia, T Chothia, R Willems, B Preneel Proceedings of the 32nd annual conference on computer security applications …, 2016 | 59 | 2016 |
Relay cost bounding for contactless EMV payments T Chothia, FD Garcia, J De Ruiter, J Van Den Breekel, M Thompson International Conference on Financial Cryptography and Data Security, 189-206, 2015 | 53 | 2015 |
Component connectors with QoS guarantees F Arbab, T Chothia, S Meng, YJ Moon International Conference on Coordination Languages and Models, 286-304, 2007 | 53 | 2007 |
Leakwatch: Estimating information leakage from java programs T Chothia, Y Kawamoto, C Novakovic European Symposium on Research in Computer Security, 219-236, 2014 | 50 | 2014 |
A statistical test for information leaks using continuous mutual information T Chothia, A Guha 2011 IEEE 24th Computer Security Foundations Symposium, 177-190, 2011 | 48 | 2011 |
Schedulability of asynchronous real-time concurrent objects MM Jaghoori, FS de Boer, T Chothia, M Sirjani The Journal of Logic and Algebraic Programming 78 (5), 402-416, 2009 | 48 | 2009 |
A tool for estimating information leakage T Chothia, Y Kawamoto, C Novakovic International Conference on Computer Aided Verification, 690-695, 2013 | 45 | 2013 |
From coordination to stochastic models of QoS F Arbab, T Chothia, R Van Der Mei, S Meng, YJ Moon, C Verhoef International Conference on Coordination Languages and Models, 268-287, 2009 | 45 | 2009 |
A framework for automatically checking anonymity with μCRL T Chothia, S Orzan, J Pang, MT Dashti International Symposium on Trustworthy Global Computing, 301-318, 2006 | 45 | 2006 |
Type-based distributed access control T Chothia, D Duggan, J Vitek 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 170-184, 2003 | 45 | 2003 |
Q-automata: Modelling the resource usage of concurrent components T Chothia, J Kleijn Electronic Notes in Theoretical Computer Science 175 (2), 153-167, 2007 | 43 | 2007 |
Probabilistic point-to-point information leakage T Chothia, Y Kawamoto, C Novakovic, D Parker 2013 IEEE 26th Computer Security Foundations Symposium, 193-205, 2013 | 33 | 2013 |
Analysing the MUTE anonymous file-sharing system using the pi-calculus T Chothia International Conference on Formal Techniques for Networked and Distributed …, 2006 | 33 | 2006 |
An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education T Chothia, C Novakovic 2015 {USENIX} Summit on Gaming, Games, and Gamification in Security …, 2015 | 32 | 2015 |