Follow
Tom Chothia
Tom Chothia
Verified email at cs.bham.ac.uk
Title
Cited by
Cited by
Year
Finishing the euchromatic sequence of the human genome
International Human Genome Sequencing Consortium
Nature 431 (7011), 931-945, 2004
51572004
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE computer security foundations symposium, 107-121, 2010
1792010
GAZE: a generic framework for the integration of gene-prediction data by dynamic programming
KL Howe, T Chothia, R Durbin
Genome research 12 (9), 1418-1427, 2002
1302002
Statistical measurement of information leakage
K Chatzikokolakis, T Chothia, A Guha
International Conference on Tools and Algorithms for the Construction and …, 2010
1292010
A traceability attack against e-passports
T Chothia, V Smirnov
International Conference on Financial Cryptography and Data Security, 20-34, 2010
1212010
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them
E Marin, D Singelée, FD Garcia, T Chothia, R Willems, B Preneel
Proceedings of the 32nd annual conference on computer security applications …, 2016
1202016
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
952006
Time protection: the missing OS abstraction
Q Ge, Y Yarom, T Chothia, G Heiser
Proceedings of the Fourteenth EuroSys Conference 2019, 1-17, 2019
902019
An offline capture the {Flag-Style} virtual machine and an assessment of its value for cybersecurity education
T Chothia, C Novakovic
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
77*2015
A survey of anonymous peer-to-peer file-sharing
T Chothia, K Chatzikokolakis
International Conference on Embedded and Ubiquitous Computing, 744-755, 2005
762005
Leakwatch: Estimating information leakage from java programs
T Chothia, Y Kawamoto, C Novakovic
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
712014
Relay cost bounding for contactless EMV payments
T Chothia, FD Garcia, J De Ruiter, J Van Den Breekel, M Thompson
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
642015
A tool for estimating information leakage
T Chothia, Y Kawamoto, C Novakovic
International Conference on Computer Aided Verification, 690-695, 2013
632013
A statistical test for information leaks using continuous mutual information
T Chothia, A Guha
2011 IEEE 24th Computer Security Foundations Symposium, 177-190, 2011
602011
Component connectors with QoS guarantees
F Arbab, T Chothia, S Meng, YJ Moon
Coordination Models and Languages: 9th International Conference …, 2007
602007
Breaking all the things—A systematic survey of firmware extraction techniques for IoT devices
S Vasile, D Oswald, T Chothia
Smart Card Research and Advanced Applications: 17th International Conference …, 2019
562019
From coordination to stochastic models of QoS
F Arbab, T Chothia, R van der Mei, S Meng, YJ Moon, C Verhoef
Coordination Models and Languages: 11th International Conference …, 2009
512009
Extending automated protocol state learning for the 802.11 4-way handshake
C McMahon Stone, T Chothia, J De Ruiter
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
482018
A Framework for Automatically Checking Anonymity with μCRL
T Chothia, S Orzan, J Pang, M Torabi Dashti
Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007
482007
Type-based distributed access control
T Chothia, D Duggan, J Vitek
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 170-184, 2003
482003
The system can't perform the operation now. Try again later.
Articles 1–20