Follow
Tom Chothia
Tom Chothia
Verified email at cs.bham.ac.uk
Title
Cited by
Cited by
Year
Finishing the euchromatic sequence of the human genome
International Human Genome Sequencing Consortium
Nature 431 (7011), 931-945, 2004
47652004
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE computer security foundations symposium, 107-121, 2010
1662010
GAZE: a generic framework for the integration of gene-prediction data by dynamic programming
KL Howe, T Chothia, R Durbin
Genome research 12 (9), 1418-1427, 2002
1282002
Statistical measurement of information leakage
K Chatzikokolakis, T Chothia, A Guha
Tools and Algorithms for the Construction and Analysis of Systems: 16th …, 2010
1222010
A traceability attack against e-passports
T Chothia, V Smirnov
Financial Cryptography and Data Security: 14th International Conference, FC …, 2010
1212010
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them
E Marin, D Singelée, FD Garcia, T Chothia, R Willems, B Preneel
Proceedings of the 32nd annual conference on computer security applications …, 2016
992016
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
912006
A survey of anonymous peer-to-peer file-sharing
T Chothia, K Chatzikokolakis
Embedded and Ubiquitous Computing–EUC 2005 Workshops: EUC 2005 Workshops …, 2005
762005
Time protection: the missing OS abstraction
Q Ge, Y Yarom, T Chothia, G Heiser
Proceedings of the Fourteenth EuroSys Conference 2019, 1-17, 2019
672019
Leakwatch: Estimating information leakage from java programs
T Chothia, Y Kawamoto, C Novakovic
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
672014
An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education
T Chothia, C Novakovic
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
622015
Relay cost bounding for contactless EMV payments
T Chothia, FD Garcia, J De Ruiter, J Van Den Breekel, M Thompson
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
612015
Component connectors with QoS guarantees
F Arbab, T Chothia, S Meng, YJ Moon
Coordination Models and Languages: 9th International Conference …, 2007
602007
A tool for estimating information leakage
T Chothia, Y Kawamoto, C Novakovic
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
582013
A statistical test for information leaks using continuous mutual information
T Chothia, A Guha
2011 IEEE 24th Computer Security Foundations Symposium, 177-190, 2011
562011
From coordination to stochastic models of QoS
F Arbab, T Chothia, R van der Mei, S Meng, YJ Moon, C Verhoef
Coordination Models and Languages: 11th International Conference …, 2009
522009
Type-based distributed access control
T Chothia, D Duggan, J Vitek
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 170-184, 2003
492003
A Framework for Automatically Checking Anonymity with μCRL
T Chothia, S Orzan, J Pang, M Torabi Dashti
Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007
472007
Schedulability of asynchronous real-time concurrent objects
MM Jaghoori, FS de Boer, T Chothia, M Sirjani
The Journal of Logic and Algebraic Programming 78 (5), 402-416, 2009
462009
Q-automata: Modelling the resource usage of concurrent components
T Chothia, J Kleijn
Electronic Notes in Theoretical Computer Science 175 (2), 153-167, 2007
452007
The system can't perform the operation now. Try again later.
Articles 1–20