Richard Clayton

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2010
Might Governments Clean-up Malware?
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

2009
Internet Multi-Homing Problems: Explanations from Economics.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

2008
Do Zebras get more Spam than Aardvarks?
Proceedings of the CEAS 2008, 2008

2007
Can CLI be trusted?
Inf. Secur. Tech. Rep., 2007

Email traffic: a quantitative snapshot.
Proceedings of the CEAS 2007, 2007

2006
The Rising Tide: DDoS from Defective Designs and Defaults.
Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2006

Using Early Results from the 'spamHINTS' Project to Estimate an ISP Abuse Team's Task.
Proceedings of the CEAS 2006, 2006

2005
Anonymity and traceability in cyberspace.
PhD thesis, 2005

Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).
Proceedings of the Security Protocols, 2005

Stopping Outgoing Spam by Examining Incoming Server Logs.
Proceedings of the CEAS 2005, 2005

2004
Stopping Spam by Extrusion Detection.
Proceedings of the CEAS 2004, 2004

2003
Improving Onion Notation.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

2002
Workshop Report for IPTPS'02: 1st International Workshop on Peer-to-Peer Systems.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

1987
On twofold triple systems and their automorphism groups.
J. Comb. Theory, Ser. A, 1987


  Loading...