Graeme Jenkinson

According to our database1, Graeme Jenkinson authored at least 13 papers between 2014 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Deploying authentication in the wild: towards greater ecological validity in security usability studies.
J. Cybersecur., 2020

2017
It's Better to Rust Than Wear Out.
login Usenix Mag., 2017

Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017

2016
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens.
CoRR, 2016

The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions.
CoRR, 2016

Explicit Delegation Using Configurable Cookies.
Proceedings of the Security Protocols XXIV, 2016

Red Button and Yellow Button: Usable Security for Lost Security Tokens.
Proceedings of the Security Protocols XXIV, 2016

Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Pico Without Public Keys.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

2014
Bootstrapping Adoption of the Pico Password Replacement System.
Proceedings of the Security Protocols XXII, 2014

I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes.
Proceedings of the Security Protocols XXII, 2014

Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers.
Proceedings of the Technology and Practice of Passwords, 2014

To have and have not: variations on secret sharing to model user presence.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014


  Loading...