Mike Just

According to our database1, Mike Just authored at least 45 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis.
CoRR, 2019

Personal Safety App Effectiveness.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems.
Computers, 2018

Experimental large-scale review of attractors for detection of potentially unwanted applications.
Computers & Security, 2018

2017
Stop annoying me!: an empirical investigation of the usability of app privacy notifications.
Proceedings of the 29th Australian Conference on Computer-Human Interaction, 2017

Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism.
Proceedings of the Human-Computer Interaction - INTERACT 2017, 2017

Everything's Cool: Extending Security Warnings with Thermal Feedback.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems.
Journal of Circuits, Systems, and Computers, 2016

Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation.
Adv. Software Engineering, 2016

Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms.
Proceedings of the Information Security Theory and Practice, 2016

Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses.
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016

Investigating Time Series Visualisations to Improve the User Experience.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Investigating the work practices of network security professionals.
Inf. & Comput. Security, 2015

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015.
CoRR, 2015

Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

2014
Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014.
CoRR, 2014

Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors.
CoRR, 2014

An ID and Address Protection Unit for NoC based Communication Architectures.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract).
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Stop questioning me!: towards optimizing user involvement during data collection on mobile devices.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks.
Proceedings of the Financial Cryptography and Data Security, 2013

Designing interactive secure system: chi 2013 special interest group.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
On the security and usability of dual credential authentication in UK online banking.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming.
Proceedings of the Entertainment Computing - ICEC 2012 - 11th International Conference, 2012

2011
Schnorr Identification Protocol.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

PKI Trust Models.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Nonrepudiation of Digital Signatures.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Needham-Schroeder Protocols.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Key Escrow.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Identity Management.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Diffie-Hellman Key Agreement.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
What's in a Name?
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Pictures or questions?: examining user responses to association-based authentication.
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010

2009
Personal choice and challenge questions: a security and usability assessment.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

2005
Schnorr Indentification Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Key agreement.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Challenge-Response Identification.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
Securely Available Credentials (SACRED) - Credential Server Framework.
RFC, April, 2004

Designing and Evaluating Challenge-Question Systems.
IEEE Security & Privacy, 2004

2003
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003

1999
Addressing the Problem of Undetected Signature Key Compromise.
Proceedings of the Network and Distributed System Security Symposium, 1999

1998
Some Timestamping Protocol Failures.
Proceedings of the Network and Distributed System Security Symposium, 1998

1996
Authenticated Multi-Party Key Agreement.
Proceedings of the Advances in Cryptology, 1996

1994
On Key Distribution via True Broadcasting.
Proceedings of the CCS '94, 1994


  Loading...