Knowledge

Ross J. Anderson

Source 📝

653: 63: 751: 347: 522:
Anderson always campaigned for computer security to be studied in a wider social context. Many of his writings emphasised the human, social, and political dimension of security. On online voting, for example, he wrote "When you move from voting in person to voting at home (whether by post, by phone
548:
Anderson was well-known among Cambridge academics as an outspoken defender of academic freedoms, intellectual property and other matters of university politics. He was engaged in the "Campaign for Cambridge Freedoms" and had been an elected member of Cambridge University Council since 2002. In
441: 440: 718:
Anderson met his wife, Shireen, while he was working in Johannesburg and they were married in Cambridge in 1992. Shireen Anderson is the coordinator of the Christina Kelly Association, of Churchill College, Cambridge. They have one daughter, Bavani, and four grandchildren.
1406: 1363:
Anderson's Rule means you cannot construct a database with scale, functionality and security because if you design a large system for ease of access it becomes insecure, while if you make it watertight it becomes impossible to
580:
will never be free of abuse by breaches of security. He said that if a large system is designed for ease of access it becomes insecure; if made watertight it becomes impossible to use. This is sometimes known as
1410: 1239: 384: 250: 1929: 442: 649:
Ross Anderson was a pioneer and world leader in security engineering, and is distinguished for starting a number of new areas of research in hardware, software and systems.
523:
or over the Internet) it vastly expands the scope for vote buying and coercion", making the point that it's not just a question of whether the encryption can be cracked.
371: 48: 375: 52: 1460: 1914: 1539: 639: 686:, which not only illuminates where the most effective attacks and defences may be found, but is also of fundamental importance to making policy for the 573:
Anderson's TCPA FAQ has been characterised by IBM TC researcher David R. Safford as "full of technical errors" and of "presenting speculation as fact."
1919: 1904: 1884: 1909: 1375: 1337: 623:
is built around their ability to gather vast tracts of data. It was something the intelligence agencies would have struggled with alone.
695: 667:
Anderson made trailblazing contributions that helped establish a number of new research topics, including security usability, hardware
527: 367: 44: 1939: 905: 363: 40: 607:
beginning in June 2013, Anderson suggested one way to begin stamping out the British state's unaccountable involvement in this
1924: 1204: 1155: 872: 600: 567: 1350: 1894: 1260: 993:
Anderson, R. J. (1999). "Information technology in medical practice: Safety and privacy lessons from the United Kingdom".
1889: 1220: 980: 611:
spying scandal was to entirely end the domestic secret services. Anderson: "Were I a legislator, I would simply abolish
1522: 1390: 306: 939: 676: 1468: 301: 1040: 1934: 646:
Professor Ross Anderson, Personal Chair in Security Engineering, Computer Laboratory, University of Cambridge.
20: 1769: 1764: 790: 1603: 1428: 703: 508: 404: 1899: 1531: 359: 36: 1083: 938:– "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, August 2007 615:". Anderson noted the only way this kind of systemic data collection was made possible was through the 412: 1338:
http://domino.research.ibm.com/comm/research_projects.nsf/pages/gsal.TCG.html/$ FILE/tcpa_rebuttal.pdf
1131: 1701: 722:
Anderson died unexpectedly at home with his family in Cambridge on 28 March 2024, at the age of 67.
454:
at Cambridge in 1995. In addition to teaching at the University of Cambridge, he also taught at the
1853: 1593: 1553: 1686: 1633: 1292: 1288: 824: 455: 424: 408: 379:(15 September 1956 – 28 March 2024) was a British researcher, author, and industry consultant in 245: 132: 1515: 1500: 957: 396: 122: 813: 683: 542: 490: 1062: 271: 1879: 1874: 416: 380: 832: 8: 1735: 1448: 1308: 888: 750: 742: 687: 660:
His early work on how systems fail established a base of empirical evidence for building
551: 1189:, Lecture Notes in Computer Science, vol. 1008, Springer-Verlag, pp. 346–352, 1006: 619:
of private industry. The value of information-driven Web companies such as Facebook and
346: 1837: 1786: 1713: 1696: 1691: 1018: 707: 672: 1583: 1424: 1113: 652: 62: 1817: 1807: 1508: 1200: 1151: 1050: 1010: 868: 819: 668: 559: 470: 229: 1388:
The Foundation for Information Policy Research Consultation response on Smart Meters
1325: 1022: 976: 1667: 1655: 1628: 1190: 1143: 1002: 828: 592:, which was initially published by Wiley in 2001. He was the founder and editor of 504: 400: 283: 211: 155: 1084:"Ross Anderson, professor and famed author of 'Security Engineering,' passes away" 839: 1827: 1752: 1725: 1608: 1563: 1394: 1264: 943: 1257: 1832: 1812: 1643: 1638: 1598: 1491: 1235: 1171: 769: 746: 616: 604: 311: 190: 1868: 1618: 1578: 1568: 1535: 1387: 1195: 1147: 786: 516: 512: 493: 486: 482: 466: 431:
and start his career as an academic researcher. He received his PhD in 1995.
428: 288: 224: 1054: 1802: 1613: 1358: 1312: 1014: 862: 661: 501: 497: 474: 462: 219: 1780: 1758: 1741: 1719: 1707: 1680: 1673: 1661: 1649: 1276: 935: 1822: 1774: 1747: 1730: 1588: 1573: 922: 710:
in 2015. Anderson was elected to the Royal Society of Edinburgh in 2023.
627: 1172:"Serpent: A Candidate Block Cipher for the Advanced Encryption Standard" 864:
Security engineering: a guide to building dependable distributed systems
1623: 1296: 630:, writing that there are various privacy and energy security concerns. 555:
declared Anderson to be Cambridge University's "most powerful person".
531: 385:
Department of Computer Science and Technology, University of Cambridge
1139: 1109: 563: 478: 102: 577: 535: 451: 420: 329: 255: 682:
Anderson was also one of the founders of the study of information
541:
Anderson was also a founder of the UK-Crypto mailing list and the
1530: 1114:"Two Practical and Provably Secure Block Ciphers: BEAR and LION" 1185:
Anderson, Ross J. (1995), "On Fibonacci keystream generators",
961: 699: 620: 265: 1221:"Why electronic voting isn't secure – but may be safe enough" 1058: 664:
for a wide range of applications from banking to healthcare.
427:
in 1992, to work on his doctorate under the supervision of
1930:
Members of the University of Cambridge Computer Laboratory
1258:
Why information security is hard – an economic perspective
906:"The Royal Academy of Engineering Annual Report 2009/2010" 612: 608: 1104: 1449:
https://rse.org.uk/fellowship/professor-ross-anderson/
387:
where he was part of the University's security group.
1376:
Cambridge's Head of Cryptography: I Would Abolish MI5
1142:: Springer-Verlag Berlin Heidelberg. pp. 89–97. 853: 851: 849: 576:
For years Anderson argued that by their nature large
846: 812: 511:competition. He also discovered weaknesses in the 383:. He was Professor of Security Engineering at the 1351:"Nine sacked for breaching core ID card database" 917: 915: 900: 898: 1866: 889:"Fellowship of the RSE: Professor Ross Anderson" 656:Ross Anderson in his office in Cambridge in 2018 461:Anderson's research interests were in security, 1212: 738: 736: 734: 588:Anderson was the author of several editions of 423:and banking industry before moving back to the 415:, and subsequently received a qualification in 1326:'Trusted Computing' Frequently Asked Questions 912: 895: 857: 1516: 1240:Department of Computer Science and Technology 1129: 251:Department of Computer Science and Technology 1218: 1078: 1076: 1074: 1072: 731: 594:Computer and Communications Security Reviews 1915:Fellows of the Royal Academy of Engineering 1409:. London: The Royal Society. Archived from 1523: 1509: 1034: 1032: 782: 780: 778: 749: 713: 696:Fellow of the Royal Academy of Engineering 558:In 2002, he became an outspoken critic of 528:Foundation for Information Policy Research 345: 19:For other people named Ross Anderson, see 1920:Fellows of the Royal Society of Edinburgh 1489: 1417: 1233: 1194: 1069: 953: 951: 806: 804: 802: 800: 798: 640:Fellow of the Royal Society (FRS) in 2009 411:where he was an undergraduate student of 1184: 1038: 992: 651: 538:group on information-technology policy. 496:primitives, and co-wrote with Biham and 438: 1905:Fellows of Churchill College, Cambridge 1049:(PhD thesis). University of Cambridge. 1029: 827: ed.). A & C Black. 775: 1867: 1348: 948: 795: 515:cipher and designed the stream cipher 434: 16:British computer scientist (1956–2024) 1504: 1399: 633: 1885:Alumni of Trinity College, Cambridge 1483: 1425:"Professor Ross Anderson FRS, FREng" 1234:Beresford, Alastair (3 April 2024). 810: 765: 763: 761: 759: 549:January 2004, the student newspaper 1910:Fellows of the Institute of Physics 1130:Anderson, Ross; Biham, Eli (1996). 1007:10.5694/j.1326-5377.1999.tb127721.x 970: 881: 833:10.1093/ww/9780199540884.013.U70837 13: 677:application programming interfaces 509:Advanced Encryption Standard (AES) 14: 1951: 1287:Election to the Council: Notices 1132:"Tiger: A Fast New Hash Function" 756: 995:The Medical Journal of Australia 770:Curriculum Vitae – Ross Anderson 160:University of Cambridge politics 61: 1940:People from Sandy, Bedfordshire 1453: 1442: 1381: 1369: 1342: 1331: 1318: 1301: 1281: 1277:Campaign for Cambridge Freedoms 1270: 1250: 1227: 1178: 1164: 1123: 1098: 986: 958:Ross J. Anderson's publications 601:global surveillance disclosures 399:. In 1978, he graduated with a 1219:Nicole Kobie (30 March 2015). 929: 526:In 1998, Anderson founded the 507:, one of the finalists in the 21:Ross Anderson (disambiguation) 1: 1297:Cambridge University Reporter 1134:. In Gollmann, Dieter (ed.). 791:Mathematics Genealogy Project 725: 395:Anderson was educated at the 1925:Fellows of the Royal Society 1492:"Ross Anderson, 1956 - 2024" 1490:Beresford, Alastair (2024). 1465:Churchill College, Cambridge 1429:Churchill College, Cambridge 1407:"EC/2009/02: Anderson, Ross" 1039:Anderson, Ross John (2014). 840:UK public library membership 704:Churchill College, Cambridge 694:Anderson was also elected a 390: 7: 1895:Computer security academics 1086:. The Record. 29 March 2024 979:author profile page at the 814:"Anderson, Prof. Ross John" 10: 1956: 1890:British technology writers 1246:. University of Cambridge. 1236:"Ross Anderson, 1956–2024" 698:(FREng) in 2009. He was a 446:Anderson on Malware (2010) 413:Trinity College, Cambridge 18: 1846: 1795: 1546: 1461:"Professor Ross Anderson" 626:Anderson was a critic of 570:operating system vision. 562:proposals, in particular 450:Anderson was appointed a 419:. Anderson worked in the 324: 320: 294: 282: 264: 238: 204: 197: 186: 178: 170: 163:Security Engineering book 139: 128: 118: 110: 91: 72: 60: 30: 1854:William, Prince of Wales 1378:, Forbes, 3 January 2013 1196:10.1007/3-540-60590-8_26 1187:Fast Software Encryption 1148:10.1007/3-540-60865-6_46 1136:Fast Software Encryption 1042:Robust Computer Security 964:bibliographic database. 867:. New York: John Wiley. 745:publications indexed by 642:. His nomination reads: 272:Robust Computer Security 1263:11 October 2006 at the 966:(subscription required) 825:Oxford University Press 714:Personal life and death 638:Anderson was elected a 456:University of Edinburgh 425:University of Cambridge 409:University of Cambridge 246:University of Cambridge 133:University of Cambridge 1349:Porter, Henry (2009). 692: 675:, and the analysis of 657: 447: 397:High School of Glasgow 123:High School of Glasgow 1935:Modern cryptographers 1393:13 March 2016 at the 1307:Cambridge Power 100, 942:5 August 2012 at the 655: 644: 543:economics of security 445: 823:(online edition via 590:Security Engineering 417:computer engineering 381:security engineering 1736:Henning Sirringhaus 688:information society 477:, he designed with 435:Research and career 401:Bachelor of Arts in 1900:Copyright scholars 1838:Steven D. Tanksley 1714:Richard Passingham 1697:Arthur B. McDonald 1650:Christopher Hunter 1063:uk.bl.ethos.338198 708:BCS Lovelace Medal 684:security economics 673:information hiding 658: 634:Awards and honours 448: 356:Ross John Anderson 152:Information policy 149:Security economics 77:Ross John Anderson 1862: 1861: 1818:Roger D. Kornberg 1808:H. Robert Horvitz 1765:Jonathan Tennyson 1674:Dimitris Kioussis 1315:, 16 January 2004 1206:978-3-540-60590-4 1157:978-3-540-60865-3 923:"List of Fellows" 874:978-0-470-06852-6 838:(Subscription or 669:tamper-resistance 560:trusted computing 545:research domain. 471:technology policy 443: 353: 352: 295:Doctoral students 230:Technology policy 199:Scientific career 87:15 September 1956 1947: 1759:Jesper Svejstrup 1742:Maurice Skolnick 1668:Jonathan Keating 1656:Graham Hutchings 1629:Nicholas Harberd 1559:Ross J. Anderson 1554:Robert Ainsworth 1525: 1518: 1511: 1502: 1501: 1496: 1495: 1487: 1481: 1480: 1478: 1476: 1467:. Archived from 1457: 1451: 1446: 1440: 1439: 1437: 1435: 1421: 1415: 1414: 1403: 1397: 1385: 1379: 1373: 1367: 1366: 1346: 1340: 1335: 1329: 1322: 1316: 1305: 1299: 1285: 1279: 1274: 1268: 1254: 1248: 1247: 1231: 1225: 1224: 1216: 1210: 1209: 1198: 1182: 1176: 1175: 1168: 1162: 1161: 1127: 1121: 1120: 1118: 1102: 1096: 1095: 1093: 1091: 1080: 1067: 1066: 1036: 1027: 1026: 990: 984: 977:Ross J. Anderson 974: 968: 967: 955: 946: 933: 927: 926: 919: 910: 909: 902: 893: 892: 885: 879: 878: 855: 844: 843: 836: 816: 808: 793: 787:Ross J. Anderson 784: 773: 767: 754: 753: 743:Ross J. Anderson 740: 706:and awarded the 444: 403:mathematics and 378: 349: 344: 341: 339: 337: 335: 333: 331: 284:Doctoral advisor 278: 212:Computer science 174:Shireen Anderson 156:Serpent (cipher) 146:Banking security 98: 86: 84: 67:Anderson in 2008 65: 55: 32:Ross J. Anderson 28: 27: 1955: 1954: 1950: 1949: 1948: 1946: 1945: 1944: 1865: 1864: 1863: 1858: 1842: 1828:Joseph Stiglitz 1791: 1753:Malcolm Stevens 1726:Wolfram Schultz 1609:James Gimzewski 1584:Michel Chrétien 1564:Michael Ashfold 1542: 1529: 1499: 1488: 1484: 1474: 1472: 1459: 1458: 1454: 1447: 1443: 1433: 1431: 1423: 1422: 1418: 1413:on 7 July 2019. 1405: 1404: 1400: 1395:Wayback Machine 1386: 1382: 1374: 1370: 1355:theguardian.com 1347: 1343: 1336: 1332: 1324:Ross Anderson: 1323: 1319: 1306: 1302: 1293:7 November 2006 1289:2 December 2002 1286: 1282: 1275: 1271: 1265:Wayback Machine 1256:Ross Anderson: 1255: 1251: 1232: 1228: 1217: 1213: 1207: 1183: 1179: 1170: 1169: 1165: 1158: 1128: 1124: 1116: 1103: 1099: 1089: 1087: 1082: 1081: 1070: 1037: 1030: 991: 987: 983:Digital Library 975: 971: 965: 960:indexed by the 956: 949: 944:Wayback Machine 934: 930: 921: 920: 913: 904: 903: 896: 887: 886: 882: 875: 856: 847: 837: 809: 796: 785: 776: 768: 757: 741: 732: 728: 716: 636: 617:business models 599:After the vast 583:Anderson's Rule 439: 437: 405:natural science 393: 358: 328: 316: 276: 260: 234: 166: 129:Alma mater 106: 100: 96: 82: 80: 79: 78: 68: 56: 35: 33: 24: 17: 12: 11: 5: 1953: 1943: 1942: 1937: 1932: 1927: 1922: 1917: 1912: 1907: 1902: 1897: 1892: 1887: 1882: 1877: 1860: 1859: 1857: 1856: 1850: 1848: 1844: 1843: 1841: 1840: 1835: 1833:Rashid Sunyaev 1830: 1825: 1820: 1815: 1813:Thomas Kailath 1810: 1805: 1799: 1797: 1793: 1792: 1790: 1789: 1784: 1777: 1772: 1767: 1762: 1755: 1750: 1745: 1738: 1733: 1728: 1723: 1720:Guy Richardson 1716: 1711: 1704: 1699: 1694: 1689: 1684: 1681:Stephen Larter 1677: 1670: 1665: 1662:Peter Isaacson 1658: 1653: 1646: 1644:Christine Holt 1641: 1639:Brian Hemmings 1636: 1631: 1626: 1621: 1616: 1611: 1606: 1601: 1596: 1591: 1586: 1581: 1576: 1571: 1566: 1561: 1556: 1550: 1548: 1544: 1543: 1528: 1527: 1520: 1513: 1505: 1498: 1497: 1482: 1452: 1441: 1416: 1398: 1380: 1368: 1341: 1330: 1317: 1300: 1280: 1269: 1249: 1226: 1211: 1205: 1177: 1163: 1156: 1122: 1097: 1068: 1028: 985: 969: 947: 928: 911: 894: 880: 873: 859:Anderson, Ross 845: 794: 774: 755: 747:Google Scholar 729: 727: 724: 715: 712: 635: 632: 605:Edward Snowden 436: 433: 392: 389: 351: 350: 326: 322: 321: 318: 317: 315: 314: 312:George Danezis 309: 304: 298: 296: 292: 291: 286: 280: 279: 268: 262: 261: 259: 258: 253: 248: 242: 240: 236: 235: 233: 232: 227: 222: 217: 214: 208: 206: 202: 201: 195: 194: 191:Lovelace Medal 188: 184: 183: 180: 176: 175: 172: 168: 167: 165: 164: 161: 158: 153: 150: 147: 143: 141: 140:Known for 137: 136: 130: 126: 125: 120: 116: 115: 112: 108: 107: 101: 99:(aged 67) 93: 89: 88: 76: 74: 70: 69: 66: 58: 57: 34: 31: 15: 9: 6: 4: 3: 2: 1952: 1941: 1938: 1936: 1933: 1931: 1928: 1926: 1923: 1921: 1918: 1916: 1913: 1911: 1908: 1906: 1903: 1901: 1898: 1896: 1893: 1891: 1888: 1886: 1883: 1881: 1878: 1876: 1873: 1872: 1870: 1855: 1852: 1851: 1849: 1845: 1839: 1836: 1834: 1831: 1829: 1826: 1824: 1821: 1819: 1816: 1814: 1811: 1809: 1806: 1804: 1801: 1800: 1798: 1794: 1788: 1785: 1783: 1782: 1778: 1776: 1773: 1771: 1768: 1766: 1763: 1761: 1760: 1756: 1754: 1751: 1749: 1746: 1744: 1743: 1739: 1737: 1734: 1732: 1729: 1727: 1724: 1722: 1721: 1717: 1715: 1712: 1710: 1709: 1705: 1703: 1702:Angela McLean 1700: 1698: 1695: 1693: 1690: 1688: 1685: 1683: 1682: 1678: 1676: 1675: 1671: 1669: 1666: 1664: 1663: 1659: 1657: 1654: 1652: 1651: 1647: 1645: 1642: 1640: 1637: 1635: 1632: 1630: 1627: 1625: 1622: 1620: 1619:Chris Goodnow 1617: 1615: 1612: 1610: 1607: 1605: 1602: 1600: 1599:Richard Ellis 1597: 1595: 1592: 1590: 1587: 1585: 1582: 1580: 1579:Peter Buneman 1577: 1575: 1572: 1570: 1569:Michael Batty 1567: 1565: 1562: 1560: 1557: 1555: 1552: 1551: 1549: 1545: 1541: 1537: 1536:Royal Society 1533: 1526: 1521: 1519: 1514: 1512: 1507: 1506: 1503: 1493: 1486: 1471:on 8 May 2024 1470: 1466: 1462: 1456: 1450: 1445: 1430: 1426: 1420: 1412: 1408: 1402: 1396: 1392: 1389: 1384: 1377: 1372: 1365: 1360: 1356: 1352: 1345: 1339: 1334: 1328:, August 2003 1327: 1321: 1314: 1310: 1304: 1298: 1294: 1290: 1284: 1278: 1273: 1267:, ACSAC 2001. 1266: 1262: 1259: 1253: 1245: 1241: 1237: 1230: 1222: 1215: 1208: 1202: 1197: 1192: 1188: 1181: 1173: 1167: 1159: 1153: 1149: 1145: 1141: 1137: 1133: 1126: 1115: 1111: 1107: 1106:Ross Anderson 1101: 1085: 1079: 1077: 1075: 1073: 1064: 1060: 1056: 1052: 1048: 1044: 1043: 1035: 1033: 1024: 1020: 1016: 1012: 1008: 1004: 1000: 996: 989: 982: 978: 973: 963: 959: 954: 952: 945: 941: 937: 936:The Blue Book 932: 924: 918: 916: 907: 901: 899: 890: 884: 876: 870: 866: 865: 860: 854: 852: 850: 841: 834: 830: 826: 822: 821: 815: 811:Anon (2014). 807: 805: 803: 801: 799: 792: 788: 783: 781: 779: 771: 766: 764: 762: 760: 752: 748: 744: 739: 737: 735: 730: 723: 720: 711: 709: 705: 701: 697: 691: 689: 685: 680: 678: 674: 670: 665: 663: 662:threat models 654: 650: 647: 643: 641: 631: 629: 624: 622: 618: 614: 610: 606: 602: 597: 595: 591: 586: 584: 579: 574: 571: 569: 565: 561: 556: 554: 553: 546: 544: 539: 537: 533: 529: 524: 520: 518: 514: 510: 506: 503: 499: 495: 494:cryptographic 492: 488: 484: 480: 476: 472: 468: 467:dependability 464: 459: 457: 453: 432: 430: 429:Roger Needham 426: 422: 418: 414: 410: 406: 402: 398: 388: 386: 382: 377: 373: 369: 365: 361: 357: 348: 343: 327: 323: 319: 313: 310: 308: 307:Robert Watson 305: 303: 300: 299: 297: 293: 290: 289:Roger Needham 287: 285: 281: 274: 273: 269: 267: 263: 257: 254: 252: 249: 247: 244: 243: 241: 237: 231: 228: 226: 225:Dependability 223: 221: 218: 215: 213: 210: 209: 207: 203: 200: 196: 192: 189: 185: 181: 177: 173: 169: 162: 159: 157: 154: 151: 148: 145: 144: 142: 138: 134: 131: 127: 124: 121: 117: 113: 109: 104: 95:28 March 2024 94: 90: 75: 71: 64: 59: 54: 50: 46: 42: 38: 29: 26: 22: 1803:John Holdren 1781:John Vederas 1779: 1757: 1740: 1718: 1706: 1692:David MacKay 1679: 1672: 1660: 1648: 1614:David Glover 1594:Michael Duff 1558: 1485: 1473:. Retrieved 1469:the original 1464: 1455: 1444: 1432:. Retrieved 1419: 1411:the original 1401: 1383: 1371: 1362: 1359:The Guardian 1354: 1344: 1333: 1320: 1303: 1283: 1272: 1252: 1243: 1229: 1214: 1186: 1180: 1166: 1135: 1125: 1105: 1100: 1088:. Retrieved 1046: 1041: 1001:(4): 181–4. 998: 994: 988: 972: 931: 883: 863: 858: 818: 721: 717: 693: 681: 666: 659: 648: 645: 637: 628:smart meters 625: 598: 593: 589: 587: 582: 575: 572: 557: 550: 547: 540: 525: 521: 502:block cipher 498:Lars Knudsen 475:cryptography 460: 449: 394: 355: 354: 270: 239:Institutions 198: 97:(2024-03-28) 25: 1880:2024 deaths 1875:1956 births 1823:Yakov Sinai 1775:Burt Totaro 1748:Karen Steel 1731:Keith Shine 1687:David Leigh 1589:Jenny Clack 1574:Martin Buck 302:Markus Kuhn 111:Nationality 1869:Categories 1708:David Owen 1634:John Hardy 1624:Wendy Hall 1604:Jeff Ellis 1357:. London: 842:required.) 772:, May 2007 726:References 603:leaked by 532:think tank 463:cryptology 220:Cryptology 83:1956-09-15 1787:John Wood 1770:John Todd 1313:Issue 591 1244:cam.ac.uk 1140:Cambridge 1110:Eli Biham 1047:cam.ac.uk 820:Who's Who 578:databases 568:Palladium 564:Microsoft 479:Eli Biham 407:from the 391:Education 135:(MA, PhD) 119:Education 105:, England 103:Cambridge 1538:elected 1475:16 April 1391:Archived 1261:Archived 1090:29 March 1055:53659223 1023:16255335 1015:10078187 940:Archived 861:(2008). 536:lobbying 452:lecturer 421:avionics 256:Ferranti 216:Security 179:Children 1796:Foreign 1547:Fellows 1540:in 2009 1534:of the 1532:Fellows 1309:Varsity 789:at the 552:Varsity 505:Serpent 340:/~rja14 325:Website 114:British 1434:14 May 1203:  1154:  1061:  1053:  1021:  1013:  962:Scopus 871:  700:Fellow 621:Google 277:(1995) 275:  266:Thesis 205:Fields 193:(2015) 187:Awards 171:Spouse 1847:Royal 1117:(PDF) 1059:EThOS 1019:S2CID 491:Tiger 473:. In 374: 370: 368:FREng 366: 362: 51: 47: 45:FREng 43: 39: 1477:2024 1436:2021 1291:and 1201:ISBN 1152:ISBN 1108:and 1092:2024 1051:OCLC 1011:PMID 869:ISBN 534:and 530:, a 517:Pike 513:FISH 500:the 489:and 487:LION 483:BEAR 481:the 469:and 376:FIET 372:FIMA 364:FRSE 334:.cam 92:Died 73:Born 53:FIET 49:FIMA 41:FRSE 1364:use 1191:doi 1144:doi 1003:doi 999:170 981:ACM 829:doi 702:of 613:MI5 609:NSA 566:'s 360:FRS 338:.uk 336:.ac 332:.cl 330:www 182:One 37:FRS 1871:: 1463:. 1427:. 1361:. 1353:. 1311:, 1295:, 1242:. 1238:. 1199:, 1150:. 1138:. 1112:. 1071:^ 1057:. 1045:. 1031:^ 1017:. 1009:. 997:. 950:^ 914:^ 897:^ 848:^ 817:. 797:^ 777:^ 758:^ 733:^ 679:. 671:, 596:. 585:. 519:. 485:, 465:, 458:. 1524:e 1517:t 1510:v 1494:. 1479:. 1438:. 1223:. 1193:: 1174:. 1160:. 1146:: 1119:. 1094:. 1065:. 1025:. 1005:: 925:. 908:. 891:. 877:. 835:. 831:: 690:. 342:/ 85:) 81:( 23:.

Index

Ross Anderson (disambiguation)
FRS
FRSE
FREng
FIMA
FIET

Cambridge
High School of Glasgow
University of Cambridge
Serpent (cipher)
Lovelace Medal
Computer science
Cryptology
Dependability
Technology policy
University of Cambridge
Department of Computer Science and Technology
Ferranti
Thesis
Robust Computer Security
Doctoral advisor
Roger Needham
Markus Kuhn
Robert Watson
George Danezis
www.cl.cam.ac.uk/~rja14/
Edit this at Wikidata
FRS
FRSE

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.