Finishing the euchromatic sequence of the human genome International Human Genome Sequencing Consortium Nature 431 (7011), 931-945, 2004 | 5313 | 2004 |
Analysing unlinkability and anonymity using the applied pi calculus M Arapinis, T Chothia, E Ritter, M Ryan 2010 23rd IEEE computer security foundations symposium, 107-121, 2010 | 183 | 2010 |
Statistical measurement of information leakage K Chatzikokolakis, T Chothia, A Guha International Conference on Tools and Algorithms for the Construction and …, 2010 | 133 | 2010 |
GAZE: a generic framework for the integration of gene-prediction data by dynamic programming KL Howe, T Chothia, R Durbin Genome Research 12 (9), 1418-1427, 2002 | 132 | 2002 |
A traceability attack against e-passports T Chothia, V Smirnov International Conference on Financial Cryptography and Data Security, 20-34, 2010 | 121 | 2010 |
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them E Marin, D Singelée, FD Garcia, T Chothia, R Willems, B Preneel Proceedings of the 32nd annual conference on computer security applications …, 2016 | 118 | 2016 |
Time protection: the missing OS abstraction Q Ge, Y Yarom, T Chothia, G Heiser Proceedings of the Fourteenth EuroSys Conference 2019, 1-17, 2019 | 96 | 2019 |
Metrics for action-labelled quantitative transition systems Y Deng, T Chothia, C Palamidessi, J Pang Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006 | 96 | 2006 |
An offline capture the {Flag-Style} virtual machine and an assessment of its value for cybersecurity education T Chothia, C Novakovic 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015 | 87* | 2015 |
A survey of anonymous peer-to-peer file-sharing T Chothia, K Chatzikokolakis International Conference on Embedded and Ubiquitous Computing, 744-755, 2005 | 81 | 2005 |
Leakwatch: Estimating information leakage from java programs T Chothia, Y Kawamoto, C Novakovic Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 74 | 2014 |
Breaking all the things—A systematic survey of firmware extraction techniques for IoT devices S Vasile, D Oswald, T Chothia Smart Card Research and Advanced Applications: 17th International Conference …, 2019 | 66 | 2019 |
Relay cost bounding for contactless EMV payments T Chothia, FD Garcia, J De Ruiter, J Van Den Breekel, M Thompson Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 66 | 2015 |
A tool for estimating information leakage T Chothia, Y Kawamoto, C Novakovic International Conference on Computer Aided Verification, 690-695, 2013 | 65 | 2013 |
A statistical test for information leaks using continuous mutual information T Chothia, A Guha 2011 IEEE 24th Computer Security Foundations Symposium, 177-190, 2011 | 65 | 2011 |
Component connectors with QoS guarantees F Arbab, T Chothia, S Meng, YJ Moon Coordination Models and Languages: 9th International Conference …, 2007 | 59 | 2007 |
Extending automated protocol state learning for the 802.11 4-way handshake C McMahon Stone, T Chothia, J De Ruiter Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 57 | 2018 |
From coordination to stochastic models of QoS F Arbab, T Chothia, R van der Mei, S Meng, YJ Moon, C Verhoef Coordination Models and Languages: 11th International Conference …, 2009 | 51 | 2009 |
A Framework for Automatically Checking Anonymity with μCRL T Chothia, S Orzan, J Pang, M Torabi Dashti Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007 | 49 | 2007 |
Type-based distributed access control T Chothia, D Duggan, J Vitek 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 170-184, 2003 | 48 | 2003 |