Mike Just
Mike Just
Associate Professor, Computer Science, Heriot-Watt University
Adresse e-mail validée de hw.ac.uk - Page d'accueil
Titre
Citée par
Citée par
Année
Authenticated multi-party key agreement
M Just, S Vaudenay
Advances in Cryptology—ASIACRYPT'96, 36-49, 1996
2671996
Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system
MK Just, P Van Oorschot
US Patent 6,567,914, 2003
1592003
Personal choice and challenge questions: a security and usability assessment
M Just, D Aspinall
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-11, 2009
1272009
Resisting malicious packet dropping in wireless ad hoc networks
M Just, E Kranakis, T Wan
Ad-Hoc, Mobile, and Wireless Networks, 151-163, 2003
1082003
What’s in a name?
J Bonneau, M Just, G Matthews
Financial Cryptography and Data Security, 98-113, 2010
952010
Designing and evaluating challenge-question systems
M Just
IEEE Security & Privacy 2 (5), 32-39, 2004
902004
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
HG Kayacık, M Just, L Baillie, D Aspinall, N Micallef
IEEE Security & Privacy Workshop on Mobile Security Technologies (MoST), 2014
762014
Selecting revocation solutions for PKI
A Arnes, M Just, SJ Knapskog, S Lloyd, H Meijer
Fifth Nordic Workshop on Secure IT Systems (NORDSEC 2000), 2000
642000
On key distribution via true broadcasting
M Just, E Kranakis, D Krizanc, P Van Oorschot
Proceedings of the 2nd ACM Conference on Computer and communications …, 1994
581994
Some Timestamping Protocol Failures.
M Just
NDSS 98, 89-96, 1998
511998
Why aren’t Users Using Protection? Investigating the Usability of Smartphone Locking
N Micallef, M Just, L Baillie, M Halvey, HG Kayacik
MobileHCI, 2015
472015
Designing authentication systems with challenge questions
M Just
Security and Usability: Designing Secure Systems That People Can Use, 143-155, 2005
452005
Investigating time series visualisations to improve the user experience
M Adnan, M Just, L Baillie
ACM CHI, 2016
342016
M. Nystrom," Securely Available Credentials-Credential Server Framework,"
D Gustafson, M Just
RFC 3760, April, 2004
34*2004
Challenging challenge questions: an experimental analysis of authentication technologies and user behaviour
M Just, D Aspinall
Policy & Internet 2 (1), 99-115, 2010
31*2010
PKI: Ten years later
C Adams, M Just
3rd Annual PKI R&D Workshop, 69-84, 2004
282004
Pictures or questions? Examining user responses to association-based authentication
K Renaud, M Just
Proceedings of HCI 2010 24, 98-107, 2010
242010
Addressing the Problem of Undetected Signature Key Compromise.
M Just, PC van Oorschot
NDSS, 1999
231999
Method and apparatus for providing information security to prevent digital signature forgery
MK Just
US Patent 7,373,512, 2008
202008
Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices
N Micallef, HG Kayacık, M Just, L Baillie, D Aspinall
2015 IEEE International Conference on Pervasive Computing and Communications …, 2015
172015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20