Mike Bond

Affiliations:
  • University of Cambridge, UK


According to our database1, Mike Bond authored at least 26 papers between 2001 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
Be Prepared: The EMV Preplay Attack.
IEEE Secur. Priv., 2015

2014
Chip and Skim: Cloning EMV Cards with the Pre-play Attack.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2012
How Certification Systems Fail: Lessons from the Ware Report.
IEEE Secur. Priv., 2012

The low-call diet: Authenticated Encryption for call counting HSM users.
IACR Cryptol. ePrint Arch., 2012

Analysis of Security APIs (Dagstuhl Seminar 12482).
Dagstuhl Reports, 2012

2011
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Caveat venditor.
Inf. Secur. Tech. Rep., 2010

Chip and PIN is Broken.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

2007
Robbing the Bank with a Theorem Prover - (Abstract).
Proceedings of the Security Protocols, 2007

Modeling Partial Attacks with Alloy.
Proceedings of the Security Protocols, 2007

On the Security of the EMV Secure Messaging API (Extended Abstract).
Proceedings of the Security Protocols, 2007

Virtual Economies: Threats and Risks.
Proceedings of the Financial Cryptography and Data Security, 2007

Leaving Room for the Bad Guys.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Cryptographic Processors-A Survey.
Proc. IEEE, 2006

Integrity of intention (a theory of types for security APIs).
Inf. Secur. Tech. Rep., 2006

Phish and Chips.
Proceedings of the Security Protocols, 2006

The Man-in-the-Middle Defence.
Proceedings of the Security Protocols, 2006

Phish and Chips.
Proceedings of the Security Protocols, 2006

A pact with the devil.
Proceedings of the New Security Paradigms Workshop 2006, 2006

2005
The Dining Freemasons (Security Protocols for Secret Societies).
Proceedings of the Security Protocols, 2005

The Dining Freemasons (Security Protocols for Secret Societies).
Proceedings of the Security Protocols, 2005

2004
Extending Security Protocol Analysis: New Challenges.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure).
Proceedings of the Cryptographic Algorithms and their Uses, 2004

2002
Experience Using a Low-Cost FPGA Design to Crack DES Keys.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
API-Level Attacks on Embedded Systems.
Computer, 2001

Attacks on Cryptoprocessor Transaction Sets.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001


  Loading...