Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mike Just
@article{DBLP:journals/corr/abs-2401-01343, author = {Kahraman Kostas and Mike Just and Michael A. Lones}, title = {IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection}, journal = {CoRR}, volume = {abs/2401.01343}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.01343}, doi = {10.48550/ARXIV.2401.01343}, eprinttype = {arXiv}, eprint = {2401.01343}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-01343.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WatsonJB23, author = {Katie Watson and Mike Just and Tessa Berg}, title = {A comic-based approach to permission request communication}, journal = {Comput. Secur.}, volume = {124}, pages = {102942}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102942}, doi = {10.1016/J.COSE.2022.102942}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WatsonJB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-08679, author = {Kahraman Kostas and Mike Just and Michael A. Lones}, title = {Externally validating the IoTDevID device identification methodology using the {CIC} IoT 2022 Dataset}, journal = {CoRR}, volume = {abs/2307.08679}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.08679}, doi = {10.48550/ARXIV.2307.08679}, eprinttype = {arXiv}, eprint = {2307.08679}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-08679.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/DedkovaSJ22, author = {Lenka Dedkova and David Smahel and Mike Just}, title = {Digital security in families: the sources of information relate to the active mediation of internet safety and parental internet skills}, journal = {Behav. Inf. Technol.}, volume = {41}, number = {5}, pages = {1052--1064}, year = {2022}, url = {https://doi.org/10.1080/0144929x.2020.1851769}, doi = {10.1080/0144929X.2020.1851769}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/behaviourIT/DedkovaSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KostasJL22, author = {Kahraman Kostas and Mike Just and Michael A. Lones}, title = {IoTDevID: {A} Behavior-Based Device Identification Method for the IoT}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {23}, pages = {23741--23749}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3191951}, doi = {10.1109/JIOT.2022.3191951}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/KostasJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/TironsakkulMEJ22, author = {Tin Tironsakkul and Manuel Maarek and Andrea Eross and Mike Just}, editor = {David Meg{\'{\i}}as and Roberto Di Pietro and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection}, booktitle = {{EICC} 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15 - 16, 2022}, pages = {21--28}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3528580.3528585}, doi = {10.1145/3528580.3528585}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eicc/TironsakkulMEJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/IsmailHJZ22, author = {Salih Ismail and Hani Ragab Hassen and Mike Just and Hind Zantout}, title = {{SI22:} {A} dataset for analysis of DoS attack on the Cloud}, booktitle = {15th {IEEE/ACM} International Conference on Utility and Cloud Computing, {UCC} 2022, Vancouver, WA, USA, December 6-9, 2022}, pages = {372--377}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/UCC56403.2022.00065}, doi = {10.1109/UCC56403.2022.00065}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucc/IsmailHJZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/IsmailHJZ21, author = {Salih Ismail and Hani Ragab Hassen and Mike Just and Hind Zantout}, title = {A review of amplification-based distributed denial of service attacks and their mitigation}, journal = {Comput. Secur.}, volume = {109}, pages = {102380}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102380}, doi = {10.1016/J.COSE.2021.102380}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/IsmailHJZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BartoszewskiJLM21, author = {Filip Wieslaw Bartoszewski and Mike Just and Michael A. Lones and Oleksii Mandrychenko}, editor = {Audun J{\o}sang and Lynn Futcher and Janne Merete Hagen}, title = {Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles}, booktitle = {{ICT} Systems Security and Privacy Protection - 36th {IFIP} {TC} 11 International Conference, {SEC} 2021, Oslo, Norway, June 22-24, 2021, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {625}, pages = {367--381}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78120-0\_24}, doi = {10.1007/978-3-030-78120-0\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BartoszewskiJLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-08866, author = {Kahraman Kostas and Mike Just and Michael A. Lones}, title = {IoTDevID: {A} Behaviour-Based Fingerprinting Method for Device Identification in the IoT}, journal = {CoRR}, volume = {abs/2102.08866}, year = {2021}, url = {https://arxiv.org/abs/2102.08866}, eprinttype = {arXiv}, eprint = {2102.08866}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-08866.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TironsakkulMEJ20, author = {Tin Tironsakkul and Manuel Maarek and Andrea Eross and Mike Just}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Tracking Mixed Bitcoins}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12484}, pages = {447--457}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66172-4\_29}, doi = {10.1007/978-3-030-66172-4\_29}, timestamp = {Tue, 12 Jan 2021 14:44:40 +0100}, biburl = {https://dblp.org/rec/conf/esorics/TironsakkulMEJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordichi/MacmillanBJS20, author = {Kirsty Macmillan and Tessa Berg and Mike Just and Mary Stewart}, editor = {David Lamas and Hegle Sarapuu and Marta L{\'{a}}rusd{\'{o}}ttir and Jan Stage and Carmelo Ardito}, title = {Are autistic children more vulnerable online? Relating autism to online safety, child wellbeing and parental risk management}, booktitle = {NordiCHI '20: Shaping Experiences, Shaping Society, Proceedings of the 11th Nordic Conference on Human-Computer Interaction, Tallinn, Estonia, 25-29 October, 2020}, pages = {14:1--14:11}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419249.3420160}, doi = {10.1145/3419249.3420160}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordichi/MacmillanBJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/WatsonJB20, author = {Katie Watson and Mike Just and Tessa Berg}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {An Investigation of Comic-Based Permission Requests}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {246--261}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_15}, doi = {10.1007/978-3-030-70852-8\_15}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/WatsonJB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-14007, author = {Tin Tironsakkul and Manuel Maarek and Andrea Eross and Mike Just}, title = {Tracking Mixed Bitcoins}, journal = {CoRR}, volume = {abs/2009.14007}, year = {2020}, url = {https://arxiv.org/abs/2009.14007}, eprinttype = {arXiv}, eprint = {2009.14007}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-14007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/JustCSHWSGA19, author = {Mike Just and Hasmeet Chandok and Raghav V. Sampangi and Kirstie Hawkey and Alette Willis and JeyaBalaji Samuthiravelu and Dilpreet Gill and Michael Altair}, editor = {Regan L. Mandryk and Stephen A. Brewster and Mark Hancock and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos and Mark Perry}, title = {Personal Safety App Effectiveness}, booktitle = {Extended Abstracts of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290607.3312781}, doi = {10.1145/3290607.3312781}, timestamp = {Mon, 21 Sep 2020 12:42:04 +0200}, biburl = {https://dblp.org/rec/conf/chi/JustCSHWSGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-05754, author = {Tin Tironsakkul and Manuel Maarek and Andrea Eross and Mike Just}, title = {Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis}, journal = {CoRR}, volume = {abs/1906.05754}, year = {2019}, url = {http://arxiv.org/abs/1906.05754}, eprinttype = {arXiv}, eprint = {1906.05754}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-05754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StavovaDMJSU18, author = {Vlasta Stavova and Lenka Dedkova and Vashek Matyas and Mike Just and David Smahel and Martin Ukrop}, title = {Experimental large-scale review of attractors for detection of potentially unwanted applications}, journal = {Comput. Secur.}, volume = {76}, pages = {92--100}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.02.017}, doi = {10.1016/J.COSE.2018.02.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StavovaDMJSU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/SaeedAJ18, author = {Ahmed Saeed and Ali Ahmadinia and Mike Just}, title = {Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems}, journal = {Comput.}, volume = {7}, number = {2}, pages = {31}, year = {2018}, url = {https://doi.org/10.3390/computers7020031}, doi = {10.3390/COMPUTERS7020031}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/SaeedAJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/WilsonMJ17, author = {Graham A. Wilson and Harry Maxwell and Mike Just}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {Everything's Cool: Extending Security Warnings with Thermal Feedback}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017, Extended Abstracts}, pages = {2232--2239}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3027063.3053127}, doi = {10.1145/3027063.3053127}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WilsonMJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interact/JustB17, author = {Mike Just and Tessa Berg}, editor = {Regina Bernhaupt and Girish Dalvi and Anirudha Joshi and Devanuj K. Balkrishan and Jacki O'Neill and Marco Winckler}, title = {Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism}, booktitle = {Human-Computer Interaction - {INTERACT} 2017 - 16th {IFIP} {TC} 13 International Conference, Mumbai, India, September 25-29, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10515}, pages = {34--53}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67687-6\_3}, doi = {10.1007/978-3-319-67687-6\_3}, timestamp = {Mon, 26 Jun 2023 20:44:59 +0200}, biburl = {https://dblp.org/rec/conf/interact/JustB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ozchi/MicallefJBA17, author = {Nicholas Micallef and Mike Just and Lynne Baillie and Maher Alharby}, editor = {Margot Brereton and Alessandro Soro and Dhaval Vyas and Bernd Ploderer and Ann Morrison and Jenny Waycott}, title = {Stop annoying me!: an empirical investigation of the usability of app privacy notifications}, booktitle = {Proceedings of the 29th Australian Conference on Computer-Human Interaction, {OZCHI} 2017, Brisbane, QLD, Australia, November 28 - December 01, 2017}, pages = {371--375}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3152771.3156139}, doi = {10.1145/3152771.3156139}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ozchi/MicallefJBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/advse/SaeedAJ16, author = {Ahmed Saeed and Ali Ahmadinia and Mike Just}, title = {Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation}, journal = {Adv. Softw. Eng.}, volume = {2016}, pages = {9842936:1--9842936:19}, year = {2016}, url = {https://doi.org/10.1155/2016/9842936}, doi = {10.1155/2016/9842936}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/advse/SaeedAJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/SaeedAJ16, author = {Ahmed Saeed and Ali Ahmadinia and Mike Just}, title = {Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems}, journal = {J. Circuits Syst. Comput.}, volume = {25}, number = {8}, pages = {1650089:1--1650089:28}, year = {2016}, url = {https://doi.org/10.1142/S0218126616500894}, doi = {10.1142/S0218126616500894}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/SaeedAJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/AdnanJB16, author = {Muhammad Adnan and Mike Just and Lynne Baillie}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Investigating Time Series Visualisations to Improve the User Experience}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {5444--5455}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858300}, doi = {10.1145/2858036.2858300}, timestamp = {Wed, 01 Jun 2022 08:38:38 +0200}, biburl = {https://dblp.org/rec/conf/chi/AdnanJB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/SaeedAJ16, author = {Ahmed Saeed and Ali Ahmadinia and Mike Just}, editor = {Martin Palkovic and Giovanni Agosta and Alessandro Barenghi and Israel Koren and Gerardo Pelosi}, title = {Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses}, booktitle = {Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016}, pages = {31--36}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858930.2858936}, doi = {10.1145/2858930.2858936}, timestamp = {Tue, 06 Nov 2018 16:58:21 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/SaeedAJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/StavovaMJ16, author = {Vlasta Stavova and Vashek Matyas and Mike Just}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Codes v. People: {A} Comparative Usability Study of Two Password Recovery Mechanisms}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {35--50}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_3}, doi = {10.1007/978-3-319-45931-8\_3}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/wistp/StavovaMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AdnanJBK15, author = {Muhammad Adnan and Mike Just and Lynne Baillie and Hilmi G{\"{u}}nes Kayacik}, title = {Investigating the work practices of network security professionals}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {3}, pages = {347--367}, year = {2015}, url = {https://doi.org/10.1108/ICS-07-2014-0049}, doi = {10.1108/ICS-07-2014-0049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AdnanJBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mhci/MicallefJBHK15, author = {Nicholas Micallef and Mike Just and Lynne Baillie and Martin Halvey and Hilmi G{\"{u}}nes Kayacik}, editor = {Sebastian Boring and Enrico Rukzio and Hans Gellersen and Ken Hinckley}, title = {Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking}, booktitle = {Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2015, Copenhagen, Denmark, August 24-27, 2015}, pages = {284--294}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2785830.2785835}, doi = {10.1145/2785830.2785835}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mhci/MicallefJBHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/MicallefKJBA15, author = {Nicholas Micallef and Hilmi G{\"{u}}nes Kayacik and Mike Just and Lynne Baillie and David Aspinall}, title = {Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices}, booktitle = {2015 {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015}, pages = {189--197}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PERCOM.2015.7146528}, doi = {10.1109/PERCOM.2015.7146528}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/MicallefKJBA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GoldsteenGJKMT15, author = {Abigail Goldsteen and Tyrone Grandison and Mike Just and Larry Koved and Rohan Malcolm and Sean S. E. Thorpe}, title = {Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy {(W2SP)} 2015}, journal = {CoRR}, volume = {abs/1506.06791}, year = {2015}, url = {http://arxiv.org/abs/1506.06791}, eprinttype = {arXiv}, eprint = {1506.06791}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/GoldsteenGJKMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SaeedAJB14, author = {Ahmed Saeed and Ali Ahmadinia and Mike Just and Christophe Bobda}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {An {ID} and Address Protection Unit for NoC based Communication Architectures}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {288}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659719}, doi = {10.1145/2659651.2659719}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SaeedAJB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KovedSCJ14, author = {Larry Koved and Kapil Singh and Hao Chen and Mike Just}, title = {Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014}, journal = {CoRR}, volume = {abs/1410.6674}, year = {2014}, url = {http://arxiv.org/abs/1410.6674}, eprinttype = {arXiv}, eprint = {1410.6674}, timestamp = {Thu, 22 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KovedSCJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KayacikJBAM14, author = {Hilmi G{\"{u}}nes Kayacik and Mike Just and Lynne Baillie and David Aspinall and Nicholas Micallef}, title = {Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors}, journal = {CoRR}, volume = {abs/1410.7743}, year = {2014}, url = {http://arxiv.org/abs/1410.7743}, eprinttype = {arXiv}, eprint = {1410.7743}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KayacikJBAM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/FailyCDJAL13, author = {Shamal Faily and Lizzie Coles{-}Kemp and Paul Dunphy and Mike Just and Yoko Akama and Alexander De Luca}, editor = {Wendy E. Mackay and Stephen A. Brewster and Susanne B{\o}dker}, title = {Designing interactive secure system: chi 2013 special interest group}, booktitle = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems, {CHI} '13, Paris, France, April 27 - May 2, 2013, Extended Abstracts}, pages = {2469--2472}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2468356.2468807}, doi = {10.1145/2468356.2468807}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/FailyCDJAL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AspinallJ13, author = {David Aspinall and Mike Just}, editor = {Ahmad{-}Reza Sadeghi}, title = {"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {126--143}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_11}, doi = {10.1007/978-3-642-39884-1\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AspinallJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mhci/MicallefJBK13, author = {Nicholas Micallef and Mike Just and Lynne Baillie and Hilmi G{\"{u}}nes Kayacik}, editor = {Michael Rohs and Albrecht Schmidt and Daniel Ashbrook and Enrico Rukzio}, title = {Stop questioning me!: towards optimizing user involvement during data collection on mobile devices}, booktitle = {15th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI '13, Munich, Germany, August 27 - 30, 2013}, pages = {588--593}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2493190.2494426}, doi = {10.1145/2493190.2494426}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mhci/MicallefJBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MicallefJBK13, author = {Nicholas Micallef and Mike Just and Lynne Baillie and Hilmi G{\"{u}}nes Kayacik}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {271--272}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_22}, doi = {10.1007/978-3-642-38908-5\_22}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/conf/trust/MicallefJBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icec/McCallBBJ12, author = {Rod McCall and Lynne Baillie and Franziska Boehm and Mike Just}, editor = {Marc Herrlich and Rainer Malaka and Maic Masuch}, title = {Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming}, booktitle = {Entertainment Computing - {ICEC} 2012 - 11th International Conference, {ICEC} 2012, Bremen, Germany, September 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7522}, pages = {584--585}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33542-6\_77}, doi = {10.1007/978-3-642-33542-6\_77}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icec/McCallBBJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JustA12, author = {Mike Just and David Aspinall}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {On the security and usability of dual credential authentication in {UK} online banking}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {259--264}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470955/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/JustA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just11, author = {Mike Just}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Challenge-Response Identification}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {198--199}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_73}, doi = {10.1007/978-1-4419-5906-5\_73}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just11a, author = {Mike Just}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Diffie-Hellman Key Agreement}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {341--342}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_75}, doi = {10.1007/978-1-4419-5906-5\_75}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just11b, author = {Mike Just}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Identity Management}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {586--587}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_78}, doi = {10.1007/978-1-4419-5906-5\_78}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just11c, author = {Mike Just}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Key Agreement}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {677--678}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_82}, doi = {10.1007/978-1-4419-5906-5\_82}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just11d, author = {Mike Just}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Key Escrow}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {681--682}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_84}, doi = {10.1007/978-1-4419-5906-5\_84}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just11e, author = {Mike Just}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Needham-Schroeder Protocols}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {829--831}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_87}, doi = {10.1007/978-1-4419-5906-5\_87}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just11f, author = {Mike Just}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Nonrepudiation of Digital Signatures}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {852--854}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_88}, doi = {10.1007/978-1-4419-5906-5\_88}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just11g, author = {Mike Just}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{PKI} Trust Models}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {936--939}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_97}, doi = {10.1007/978-1-4419-5906-5\_97}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just11g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just11h, author = {Mike Just}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Schnorr Identification Protocol}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1083}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_95}, doi = {10.1007/978-1-4419-5906-5\_95}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just11h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcshci/RenaudJ10, author = {Karen Renaud and Mike Just}, editor = {Tom McEwan and Lachlan McKinnon}, title = {Pictures or questions?: examining user responses to association-based authentication}, booktitle = {Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, {BCS-HCI} 2010, Dundee, United Kingdom, 6-10 September 2010}, pages = {98--107}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=2146318}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bcshci/RenaudJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BonneauJM10, author = {Joseph Bonneau and Mike Just and Greg Matthews}, editor = {Radu Sion}, title = {What's in a Name?}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {98--113}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_10}, doi = {10.1007/978-3-642-14577-3\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BonneauJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/JustA09, author = {Mike Just and David Aspinall}, editor = {Lorrie Faith Cranor}, title = {Personal choice and challenge questions: a security and usability assessment}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572543}, doi = {10.1145/1572532.1572543}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/JustA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just05, author = {Mike Just}, editor = {Henk C. A. van Tilborg}, title = {Challenge-Response Identification}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_56}, doi = {10.1007/0-387-23483-7\_56}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just05a, author = {Mike Just}, editor = {Henk C. A. van Tilborg}, title = {Diffie-Hellman Key Agreement}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_111}, doi = {10.1007/0-387-23483-7\_111}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just05b, author = {Mike Just}, editor = {Henk C. A. van Tilborg}, title = {Key agreement}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_218}, doi = {10.1007/0-387-23483-7\_218}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just05c, author = {Mike Just}, editor = {Henk C. A. van Tilborg}, title = {Needham-Schroeder Protocols}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_270}, doi = {10.1007/0-387-23483-7\_270}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Just05d, author = {Mike Just}, editor = {Henk C. A. van Tilborg}, title = {Schnorr Indentification Scheme}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_370}, doi = {10.1007/0-387-23483-7\_370}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Just05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Just04, author = {Mike Just}, title = {Designing and Evaluating Challenge-Question Systems}, journal = {{IEEE} Secur. Priv.}, volume = {2}, number = {5}, pages = {32--39}, year = {2004}, url = {https://doi.org/10.1109/MSP.2004.80}, doi = {10.1109/MSP.2004.80}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Just04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3760, author = {Dale Gustafson and Mike Just and Magnus Nystr{\"{o}}m}, title = {Securely Available Credentials {(SACRED)} - Credential Server Framework}, journal = {{RFC}}, volume = {3760}, pages = {1--22}, year = {2004}, url = {https://doi.org/10.17487/RFC3760}, doi = {10.17487/RFC3760}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3760.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/JustKW03, author = {Mike Just and Evangelos Kranakis and Tao Wan}, editor = {Samuel Pierre and Michel Barbeau and Evangelos Kranakis}, title = {Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks}, booktitle = {Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, {ADHOC-NOW} 2003 Montreal, Canada, October 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2865}, pages = {151--163}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39611-6\_14}, doi = {10.1007/978-3-540-39611-6\_14}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/adhoc-now/JustKW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JustO99, author = {Mike Just and Paul C. van Oorschot}, title = {Addressing the Problem of Undetected Signature Key Compromise}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1999, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1999}, url = {https://www.ndss-symposium.org/ndss1999/addressing-problem-undetected-signature-key-compromise/}, timestamp = {Mon, 01 Feb 2021 08:42:19 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JustO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Just98, author = {Mike Just}, title = {Some Timestamping Protocol Failures}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1998, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1998}, url = {https://www.ndss-symposium.org/ndss1998/some-timestamping-protocol-failures/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Just98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JustV96, author = {Mike Just and Serge Vaudenay}, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {Authenticated Multi-Party Key Agreement}, booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, pages = {36--49}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034833}, doi = {10.1007/BFB0034833}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JustV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JustKKO94, author = {Mike Just and Evangelos Kranakis and Danny Krizanc and Paul C. van Oorschot}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu}, title = {On Key Distribution via True Broadcasting}, booktitle = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994}, pages = {81--88}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/191177.191195}, doi = {10.1145/191177.191195}, timestamp = {Tue, 10 Nov 2020 20:00:24 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JustKKO94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.