Follow
Tom Chothia
Tom Chothia
Verified email at cs.bham.ac.uk
Title
Cited by
Cited by
Year
Finishing the euchromatic sequence of the human genome
International Human Genome Sequencing Consortium
Nature 431 (7011), 931-945, 2004
52382004
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE computer security foundations symposium, 107-121, 2010
1822010
Statistical measurement of information leakage
K Chatzikokolakis, T Chothia, A Guha
International Conference on Tools and Algorithms for the Construction and …, 2010
1322010
GAZE: a generic framework for the integration of gene-prediction data by dynamic programming
KL Howe, T Chothia, R Durbin
Genome Research 12 (9), 1418-1427, 2002
1322002
A traceability attack against e-passports
T Chothia, V Smirnov
International Conference on Financial Cryptography and Data Security, 20-34, 2010
1192010
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them
E Marin, D Singelée, FD Garcia, T Chothia, R Willems, B Preneel
Proceedings of the 32nd annual conference on computer security applications …, 2016
1162016
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
962006
Time protection: the missing OS abstraction
Q Ge, Y Yarom, T Chothia, G Heiser
Proceedings of the Fourteenth EuroSys Conference 2019, 1-17, 2019
892019
An offline capture the {Flag-Style} virtual machine and an assessment of its value for cybersecurity education
T Chothia, C Novakovic
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
83*2015
A survey of anonymous peer-to-peer file-sharing
T Chothia, K Chatzikokolakis
International Conference on Embedded and Ubiquitous Computing, 744-755, 2005
792005
Leakwatch: Estimating information leakage from java programs
T Chothia, Y Kawamoto, C Novakovic
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
722014
Relay cost bounding for contactless EMV payments
T Chothia, FD Garcia, J De Ruiter, J Van Den Breekel, M Thompson
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
642015
A tool for estimating information leakage
T Chothia, Y Kawamoto, C Novakovic
International Conference on Computer Aided Verification, 690-695, 2013
632013
A statistical test for information leaks using continuous mutual information
T Chothia, A Guha
2011 IEEE 24th Computer Security Foundations Symposium, 177-190, 2011
632011
Breaking all the things—A systematic survey of firmware extraction techniques for IoT devices
S Vasile, D Oswald, T Chothia
Smart Card Research and Advanced Applications: 17th International Conference …, 2019
622019
Component connectors with QoS guarantees
F Arbab, T Chothia, S Meng, YJ Moon
Coordination Models and Languages: 9th International Conference …, 2007
592007
Extending automated protocol state learning for the 802.11 4-way handshake
C McMahon Stone, T Chothia, J De Ruiter
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
512018
From coordination to stochastic models of QoS
F Arbab, T Chothia, R van der Mei, S Meng, YJ Moon, C Verhoef
Coordination Models and Languages: 11th International Conference …, 2009
512009
A Framework for Automatically Checking Anonymity with μCRL
T Chothia, S Orzan, J Pang, M Torabi Dashti
Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007
492007
Type-based distributed access control
T Chothia, D Duggan, J Vitek
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 170-184, 2003
482003
The system can't perform the operation now. Try again later.
Articles 1–20