BibTeX records: Mike Just

download as .bib file

@article{DBLP:journals/corr/abs-2401-01343,
  author       = {Kahraman Kostas and
                  Mike Just and
                  Michael A. Lones},
  title        = {IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection},
  journal      = {CoRR},
  volume       = {abs/2401.01343},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.01343},
  doi          = {10.48550/ARXIV.2401.01343},
  eprinttype    = {arXiv},
  eprint       = {2401.01343},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-01343.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WatsonJB23,
  author       = {Katie Watson and
                  Mike Just and
                  Tessa Berg},
  title        = {A comic-based approach to permission request communication},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102942},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102942},
  doi          = {10.1016/J.COSE.2022.102942},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WatsonJB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-08679,
  author       = {Kahraman Kostas and
                  Mike Just and
                  Michael A. Lones},
  title        = {Externally validating the IoTDevID device identification methodology
                  using the {CIC} IoT 2022 Dataset},
  journal      = {CoRR},
  volume       = {abs/2307.08679},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.08679},
  doi          = {10.48550/ARXIV.2307.08679},
  eprinttype    = {arXiv},
  eprint       = {2307.08679},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-08679.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/DedkovaSJ22,
  author       = {Lenka Dedkova and
                  David Smahel and
                  Mike Just},
  title        = {Digital security in families: the sources of information relate to
                  the active mediation of internet safety and parental internet skills},
  journal      = {Behav. Inf. Technol.},
  volume       = {41},
  number       = {5},
  pages        = {1052--1064},
  year         = {2022},
  url          = {https://doi.org/10.1080/0144929x.2020.1851769},
  doi          = {10.1080/0144929X.2020.1851769},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/DedkovaSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KostasJL22,
  author       = {Kahraman Kostas and
                  Mike Just and
                  Michael A. Lones},
  title        = {IoTDevID: {A} Behavior-Based Device Identification Method for the
                  IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {23},
  pages        = {23741--23749},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3191951},
  doi          = {10.1109/JIOT.2022.3191951},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/KostasJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eicc/TironsakkulMEJ22,
  author       = {Tin Tironsakkul and
                  Manuel Maarek and
                  Andrea Eross and
                  Mike Just},
  editor       = {David Meg{\'{\i}}as and
                  Roberto Di Pietro and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection},
  booktitle    = {{EICC} 2022: European Interdisciplinary Cybersecurity Conference,
                  Barcelona, Spain, June 15 - 16, 2022},
  pages        = {21--28},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528580.3528585},
  doi          = {10.1145/3528580.3528585},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eicc/TironsakkulMEJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/IsmailHJZ22,
  author       = {Salih Ismail and
                  Hani Ragab Hassen and
                  Mike Just and
                  Hind Zantout},
  title        = {{SI22:} {A} dataset for analysis of DoS attack on the Cloud},
  booktitle    = {15th {IEEE/ACM} International Conference on Utility and Cloud Computing,
                  {UCC} 2022, Vancouver, WA, USA, December 6-9, 2022},
  pages        = {372--377},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/UCC56403.2022.00065},
  doi          = {10.1109/UCC56403.2022.00065},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ucc/IsmailHJZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/IsmailHJZ21,
  author       = {Salih Ismail and
                  Hani Ragab Hassen and
                  Mike Just and
                  Hind Zantout},
  title        = {A review of amplification-based distributed denial of service attacks
                  and their mitigation},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102380},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102380},
  doi          = {10.1016/J.COSE.2021.102380},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/IsmailHJZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BartoszewskiJLM21,
  author       = {Filip Wieslaw Bartoszewski and
                  Mike Just and
                  Michael A. Lones and
                  Oleksii Mandrychenko},
  editor       = {Audun J{\o}sang and
                  Lynn Futcher and
                  Janne Merete Hagen},
  title        = {Anomaly Detection for Insider Threats: An Objective Comparison of
                  Machine Learning Models and Ensembles},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 36th {IFIP} {TC} 11
                  International Conference, {SEC} 2021, Oslo, Norway, June 22-24, 2021,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {625},
  pages        = {367--381},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78120-0\_24},
  doi          = {10.1007/978-3-030-78120-0\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BartoszewskiJLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-08866,
  author       = {Kahraman Kostas and
                  Mike Just and
                  Michael A. Lones},
  title        = {IoTDevID: {A} Behaviour-Based Fingerprinting Method for Device Identification
                  in the IoT},
  journal      = {CoRR},
  volume       = {abs/2102.08866},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.08866},
  eprinttype    = {arXiv},
  eprint       = {2102.08866},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-08866.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TironsakkulMEJ20,
  author       = {Tin Tironsakkul and
                  Manuel Maarek and
                  Andrea Eross and
                  Mike Just},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Tracking Mixed Bitcoins},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020,
                  Guildford, UK, September 17-18, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12484},
  pages        = {447--457},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66172-4\_29},
  doi          = {10.1007/978-3-030-66172-4\_29},
  timestamp    = {Tue, 12 Jan 2021 14:44:40 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/TironsakkulMEJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordichi/MacmillanBJS20,
  author       = {Kirsty Macmillan and
                  Tessa Berg and
                  Mike Just and
                  Mary Stewart},
  editor       = {David Lamas and
                  Hegle Sarapuu and
                  Marta L{\'{a}}rusd{\'{o}}ttir and
                  Jan Stage and
                  Carmelo Ardito},
  title        = {Are autistic children more vulnerable online? Relating autism to online
                  safety, child wellbeing and parental risk management},
  booktitle    = {NordiCHI '20: Shaping Experiences, Shaping Society, Proceedings of
                  the 11th Nordic Conference on Human-Computer Interaction, Tallinn,
                  Estonia, 25-29 October, 2020},
  pages        = {14:1--14:11},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419249.3420160},
  doi          = {10.1145/3419249.3420160},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordichi/MacmillanBJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/WatsonJB20,
  author       = {Katie Watson and
                  Mike Just and
                  Tessa Berg},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {An Investigation of Comic-Based Permission Requests},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {246--261},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_15},
  doi          = {10.1007/978-3-030-70852-8\_15},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/WatsonJB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-14007,
  author       = {Tin Tironsakkul and
                  Manuel Maarek and
                  Andrea Eross and
                  Mike Just},
  title        = {Tracking Mixed Bitcoins},
  journal      = {CoRR},
  volume       = {abs/2009.14007},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.14007},
  eprinttype    = {arXiv},
  eprint       = {2009.14007},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-14007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/JustCSHWSGA19,
  author       = {Mike Just and
                  Hasmeet Chandok and
                  Raghav V. Sampangi and
                  Kirstie Hawkey and
                  Alette Willis and
                  JeyaBalaji Samuthiravelu and
                  Dilpreet Gill and
                  Michael Altair},
  editor       = {Regan L. Mandryk and
                  Stephen A. Brewster and
                  Mark Hancock and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos and
                  Mark Perry},
  title        = {Personal Safety App Effectiveness},
  booktitle    = {Extended Abstracts of the 2019 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290607.3312781},
  doi          = {10.1145/3290607.3312781},
  timestamp    = {Mon, 21 Sep 2020 12:42:04 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/JustCSHWSGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-05754,
  author       = {Tin Tironsakkul and
                  Manuel Maarek and
                  Andrea Eross and
                  Mike Just},
  title        = {Probing the Mystery of Cryptocurrency Theft: An Investigation into
                  Methods for Cryptocurrency Tainting Analysis},
  journal      = {CoRR},
  volume       = {abs/1906.05754},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.05754},
  eprinttype    = {arXiv},
  eprint       = {1906.05754},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-05754.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StavovaDMJSU18,
  author       = {Vlasta Stavova and
                  Lenka Dedkova and
                  Vashek Matyas and
                  Mike Just and
                  David Smahel and
                  Martin Ukrop},
  title        = {Experimental large-scale review of attractors for detection of potentially
                  unwanted applications},
  journal      = {Comput. Secur.},
  volume       = {76},
  pages        = {92--100},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.02.017},
  doi          = {10.1016/J.COSE.2018.02.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StavovaDMJSU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/SaeedAJ18,
  author       = {Ahmed Saeed and
                  Ali Ahmadinia and
                  Mike Just},
  title        = {Hardware-Assisted Secure Communication in Embedded and Multi-Core
                  Computing Systems},
  journal      = {Comput.},
  volume       = {7},
  number       = {2},
  pages        = {31},
  year         = {2018},
  url          = {https://doi.org/10.3390/computers7020031},
  doi          = {10.3390/COMPUTERS7020031},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/SaeedAJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/WilsonMJ17,
  author       = {Graham A. Wilson and
                  Harry Maxwell and
                  Mike Just},
  editor       = {Gloria Mark and
                  Susan R. Fussell and
                  Cliff Lampe and
                  m. c. schraefel and
                  Juan Pablo Hourcade and
                  Caroline Appert and
                  Daniel Wigdor},
  title        = {Everything's Cool: Extending Security Warnings with Thermal Feedback},
  booktitle    = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing
                  Systems, Denver, CO, USA, May 06-11, 2017, Extended Abstracts},
  pages        = {2232--2239},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3027063.3053127},
  doi          = {10.1145/3027063.3053127},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/WilsonMJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interact/JustB17,
  author       = {Mike Just and
                  Tessa Berg},
  editor       = {Regina Bernhaupt and
                  Girish Dalvi and
                  Anirudha Joshi and
                  Devanuj K. Balkrishan and
                  Jacki O'Neill and
                  Marco Winckler},
  title        = {Keeping Children Safe Online: Understanding the Concerns of Carers
                  of Children with Autism},
  booktitle    = {Human-Computer Interaction - {INTERACT} 2017 - 16th {IFIP} {TC} 13
                  International Conference, Mumbai, India, September 25-29, 2017, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10515},
  pages        = {34--53},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67687-6\_3},
  doi          = {10.1007/978-3-319-67687-6\_3},
  timestamp    = {Mon, 26 Jun 2023 20:44:59 +0200},
  biburl       = {https://dblp.org/rec/conf/interact/JustB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ozchi/MicallefJBA17,
  author       = {Nicholas Micallef and
                  Mike Just and
                  Lynne Baillie and
                  Maher Alharby},
  editor       = {Margot Brereton and
                  Alessandro Soro and
                  Dhaval Vyas and
                  Bernd Ploderer and
                  Ann Morrison and
                  Jenny Waycott},
  title        = {Stop annoying me!: an empirical investigation of the usability of
                  app privacy notifications},
  booktitle    = {Proceedings of the 29th Australian Conference on Computer-Human Interaction,
                  {OZCHI} 2017, Brisbane, QLD, Australia, November 28 - December 01,
                  2017},
  pages        = {371--375},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3152771.3156139},
  doi          = {10.1145/3152771.3156139},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ozchi/MicallefJBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/advse/SaeedAJ16,
  author       = {Ahmed Saeed and
                  Ali Ahmadinia and
                  Mike Just},
  title        = {Tag-Protector: An Effective and Dynamic Detection of Illegal Memory
                  Accesses through Compile Time Code Instrumentation},
  journal      = {Adv. Softw. Eng.},
  volume       = {2016},
  pages        = {9842936:1--9842936:19},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/9842936},
  doi          = {10.1155/2016/9842936},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/advse/SaeedAJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/SaeedAJ16,
  author       = {Ahmed Saeed and
                  Ali Ahmadinia and
                  Mike Just},
  title        = {Secure On-Chip Communication Architecture for Reconfigurable Multi-Core
                  Systems},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {25},
  number       = {8},
  pages        = {1650089:1--1650089:28},
  year         = {2016},
  url          = {https://doi.org/10.1142/S0218126616500894},
  doi          = {10.1142/S0218126616500894},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/SaeedAJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/AdnanJB16,
  author       = {Muhammad Adnan and
                  Mike Just and
                  Lynne Baillie},
  editor       = {Jofish Kaye and
                  Allison Druin and
                  Cliff Lampe and
                  Dan Morris and
                  Juan Pablo Hourcade},
  title        = {Investigating Time Series Visualisations to Improve the User Experience},
  booktitle    = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
                  Systems, San Jose, CA, USA, May 7-12, 2016},
  pages        = {5444--5455},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2858036.2858300},
  doi          = {10.1145/2858036.2858300},
  timestamp    = {Wed, 01 Jun 2022 08:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/AdnanJB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/SaeedAJ16,
  author       = {Ahmed Saeed and
                  Ali Ahmadinia and
                  Mike Just},
  editor       = {Martin Palkovic and
                  Giovanni Agosta and
                  Alessandro Barenghi and
                  Israel Koren and
                  Gerardo Pelosi},
  title        = {Tag-Protector: An Effective and Dynamic Detection of Out-of-bound
                  Memory Accesses},
  booktitle    = {Proceedings of the Third Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20,
                  2016},
  pages        = {31--36},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2858930.2858936},
  doi          = {10.1145/2858930.2858936},
  timestamp    = {Tue, 06 Nov 2018 16:58:21 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/SaeedAJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/StavovaMJ16,
  author       = {Vlasta Stavova and
                  Vashek Matyas and
                  Mike Just},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Codes v. People: {A} Comparative Usability Study of Two Password Recovery
                  Mechanisms},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_3},
  doi          = {10.1007/978-3-319-45931-8\_3},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/StavovaMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AdnanJBK15,
  author       = {Muhammad Adnan and
                  Mike Just and
                  Lynne Baillie and
                  Hilmi G{\"{u}}nes Kayacik},
  title        = {Investigating the work practices of network security professionals},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {347--367},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-07-2014-0049},
  doi          = {10.1108/ICS-07-2014-0049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AdnanJBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mhci/MicallefJBHK15,
  author       = {Nicholas Micallef and
                  Mike Just and
                  Lynne Baillie and
                  Martin Halvey and
                  Hilmi G{\"{u}}nes Kayacik},
  editor       = {Sebastian Boring and
                  Enrico Rukzio and
                  Hans Gellersen and
                  Ken Hinckley},
  title        = {Why aren't Users Using Protection? Investigating the Usability of
                  Smartphone Locking},
  booktitle    = {Proceedings of the 17th International Conference on Human-Computer
                  Interaction with Mobile Devices and Services, MobileHCI 2015, Copenhagen,
                  Denmark, August 24-27, 2015},
  pages        = {284--294},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2785830.2785835},
  doi          = {10.1145/2785830.2785835},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mhci/MicallefJBHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/MicallefKJBA15,
  author       = {Nicholas Micallef and
                  Hilmi G{\"{u}}nes Kayacik and
                  Mike Just and
                  Lynne Baillie and
                  David Aspinall},
  title        = {Sensor use and usefulness: Trade-offs for data-driven authentication
                  on mobile devices},
  booktitle    = {2015 {IEEE} International Conference on Pervasive Computing and Communications,
                  PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015},
  pages        = {189--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PERCOM.2015.7146528},
  doi          = {10.1109/PERCOM.2015.7146528},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/MicallefKJBA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GoldsteenGJKMT15,
  author       = {Abigail Goldsteen and
                  Tyrone Grandison and
                  Mike Just and
                  Larry Koved and
                  Rohan Malcolm and
                  Sean S. E. Thorpe},
  title        = {Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy
                  {(W2SP)} 2015},
  journal      = {CoRR},
  volume       = {abs/1506.06791},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.06791},
  eprinttype    = {arXiv},
  eprint       = {1506.06791},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/GoldsteenGJKMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SaeedAJB14,
  author       = {Ahmed Saeed and
                  Ali Ahmadinia and
                  Mike Just and
                  Christophe Bobda},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {An {ID} and Address Protection Unit for NoC based Communication Architectures},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {288},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659719},
  doi          = {10.1145/2659651.2659719},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/SaeedAJB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KovedSCJ14,
  author       = {Larry Koved and
                  Kapil Singh and
                  Hao Chen and
                  Mike Just},
  title        = {Proceedings of the Third Workshop on Mobile Security Technologies
                  (MoST) 2014},
  journal      = {CoRR},
  volume       = {abs/1410.6674},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.6674},
  eprinttype    = {arXiv},
  eprint       = {1410.6674},
  timestamp    = {Thu, 22 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KovedSCJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KayacikJBAM14,
  author       = {Hilmi G{\"{u}}nes Kayacik and
                  Mike Just and
                  Lynne Baillie and
                  David Aspinall and
                  Nicholas Micallef},
  title        = {Data Driven Authentication: On the Effectiveness of User Behaviour
                  Modelling with Mobile Device Sensors},
  journal      = {CoRR},
  volume       = {abs/1410.7743},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.7743},
  eprinttype    = {arXiv},
  eprint       = {1410.7743},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KayacikJBAM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/FailyCDJAL13,
  author       = {Shamal Faily and
                  Lizzie Coles{-}Kemp and
                  Paul Dunphy and
                  Mike Just and
                  Yoko Akama and
                  Alexander De Luca},
  editor       = {Wendy E. Mackay and
                  Stephen A. Brewster and
                  Susanne B{\o}dker},
  title        = {Designing interactive secure system: chi 2013 special interest group},
  booktitle    = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems,
                  {CHI} '13, Paris, France, April 27 - May 2, 2013, Extended Abstracts},
  pages        = {2469--2472},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2468356.2468807},
  doi          = {10.1145/2468356.2468807},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/FailyCDJAL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AspinallJ13,
  author       = {David Aspinall and
                  Mike Just},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {"Give Me Letters 2, 3 and 6!": Partial Password Implementations
                  and Attacks},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_11},
  doi          = {10.1007/978-3-642-39884-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AspinallJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mhci/MicallefJBK13,
  author       = {Nicholas Micallef and
                  Mike Just and
                  Lynne Baillie and
                  Hilmi G{\"{u}}nes Kayacik},
  editor       = {Michael Rohs and
                  Albrecht Schmidt and
                  Daniel Ashbrook and
                  Enrico Rukzio},
  title        = {Stop questioning me!: towards optimizing user involvement during data
                  collection on mobile devices},
  booktitle    = {15th International Conference on Human-Computer Interaction with Mobile
                  Devices and Services, MobileHCI '13, Munich, Germany, August 27 -
                  30, 2013},
  pages        = {588--593},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2493190.2494426},
  doi          = {10.1145/2493190.2494426},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mhci/MicallefJBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MicallefJBK13,
  author       = {Nicholas Micallef and
                  Mike Just and
                  Lynne Baillie and
                  Hilmi G{\"{u}}nes Kayacik},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Non-intrusive and Transparent Authentication on Smart Phones - (Extended
                  Abstract)},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {271--272},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_22},
  doi          = {10.1007/978-3-642-38908-5\_22},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/MicallefJBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icec/McCallBBJ12,
  author       = {Rod McCall and
                  Lynne Baillie and
                  Franziska Boehm and
                  Mike Just},
  editor       = {Marc Herrlich and
                  Rainer Malaka and
                  Maic Masuch},
  title        = {Workshop on: Exploring the Challenges of Ethics, Privacy and Trust
                  in Serious Gaming},
  booktitle    = {Entertainment Computing - {ICEC} 2012 - 11th International Conference,
                  {ICEC} 2012, Bremen, Germany, September 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7522},
  pages        = {584--585},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33542-6\_77},
  doi          = {10.1007/978-3-642-33542-6\_77},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icec/McCallBBJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JustA12,
  author       = {Mike Just and
                  David Aspinall},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {On the security and usability of dual credential authentication in
                  {UK} online banking},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {259--264},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470955/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/JustA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just11,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Challenge-Response Identification},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {198--199},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_73},
  doi          = {10.1007/978-1-4419-5906-5\_73},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just11a,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Diffie-Hellman Key Agreement},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {341--342},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_75},
  doi          = {10.1007/978-1-4419-5906-5\_75},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just11b,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Identity Management},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {586--587},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_78},
  doi          = {10.1007/978-1-4419-5906-5\_78},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just11c,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Key Agreement},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {677--678},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_82},
  doi          = {10.1007/978-1-4419-5906-5\_82},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just11d,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Key Escrow},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {681--682},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_84},
  doi          = {10.1007/978-1-4419-5906-5\_84},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just11e,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Needham-Schroeder Protocols},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {829--831},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_87},
  doi          = {10.1007/978-1-4419-5906-5\_87},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just11f,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Nonrepudiation of Digital Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {852--854},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_88},
  doi          = {10.1007/978-1-4419-5906-5\_88},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just11f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just11g,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{PKI} Trust Models},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {936--939},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_97},
  doi          = {10.1007/978-1-4419-5906-5\_97},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just11g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just11h,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Schnorr Identification Protocol},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1083},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_95},
  doi          = {10.1007/978-1-4419-5906-5\_95},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just11h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcshci/RenaudJ10,
  author       = {Karen Renaud and
                  Mike Just},
  editor       = {Tom McEwan and
                  Lachlan McKinnon},
  title        = {Pictures or questions?: examining user responses to association-based
                  authentication},
  booktitle    = {Proceedings of the 2010 British Computer Society Conference on Human-Computer
                  Interaction, {BCS-HCI} 2010, Dundee, United Kingdom, 6-10 September
                  2010},
  pages        = {98--107},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=2146318},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bcshci/RenaudJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BonneauJM10,
  author       = {Joseph Bonneau and
                  Mike Just and
                  Greg Matthews},
  editor       = {Radu Sion},
  title        = {What's in a Name?},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_10},
  doi          = {10.1007/978-3-642-14577-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BonneauJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/JustA09,
  author       = {Mike Just and
                  David Aspinall},
  editor       = {Lorrie Faith Cranor},
  title        = {Personal choice and challenge questions: a security and usability
                  assessment},
  booktitle    = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572532.1572543},
  doi          = {10.1145/1572532.1572543},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/JustA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just05,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg},
  title        = {Challenge-Response Identification},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_56},
  doi          = {10.1007/0-387-23483-7\_56},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just05a,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg},
  title        = {Diffie-Hellman Key Agreement},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_111},
  doi          = {10.1007/0-387-23483-7\_111},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just05b,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg},
  title        = {Key agreement},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_218},
  doi          = {10.1007/0-387-23483-7\_218},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just05c,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg},
  title        = {Needham-Schroeder Protocols},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_270},
  doi          = {10.1007/0-387-23483-7\_270},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Just05d,
  author       = {Mike Just},
  editor       = {Henk C. A. van Tilborg},
  title        = {Schnorr Indentification Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_370},
  doi          = {10.1007/0-387-23483-7\_370},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Just05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Just04,
  author       = {Mike Just},
  title        = {Designing and Evaluating Challenge-Question Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {5},
  pages        = {32--39},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSP.2004.80},
  doi          = {10.1109/MSP.2004.80},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Just04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3760,
  author       = {Dale Gustafson and
                  Mike Just and
                  Magnus Nystr{\"{o}}m},
  title        = {Securely Available Credentials {(SACRED)} - Credential Server Framework},
  journal      = {{RFC}},
  volume       = {3760},
  pages        = {1--22},
  year         = {2004},
  url          = {https://doi.org/10.17487/RFC3760},
  doi          = {10.17487/RFC3760},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3760.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/JustKW03,
  author       = {Mike Just and
                  Evangelos Kranakis and
                  Tao Wan},
  editor       = {Samuel Pierre and
                  Michel Barbeau and
                  Evangelos Kranakis},
  title        = {Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks},
  booktitle    = {Ad-Hoc, Mobile, and Wireless Networks, Second International Conference,
                  {ADHOC-NOW} 2003 Montreal, Canada, October 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2865},
  pages        = {151--163},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39611-6\_14},
  doi          = {10.1007/978-3-540-39611-6\_14},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/JustKW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JustO99,
  author       = {Mike Just and
                  Paul C. van Oorschot},
  title        = {Addressing the Problem of Undetected Signature Key Compromise},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1999, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {1999},
  url          = {https://www.ndss-symposium.org/ndss1999/addressing-problem-undetected-signature-key-compromise/},
  timestamp    = {Mon, 01 Feb 2021 08:42:19 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/JustO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Just98,
  author       = {Mike Just},
  title        = {Some Timestamping Protocol Failures},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1998, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {1998},
  url          = {https://www.ndss-symposium.org/ndss1998/some-timestamping-protocol-failures/},
  timestamp    = {Mon, 01 Feb 2021 08:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Just98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JustV96,
  author       = {Mike Just and
                  Serge Vaudenay},
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {Authenticated Multi-Party Key Agreement},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  pages        = {36--49},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034833},
  doi          = {10.1007/BFB0034833},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JustV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JustKKO94,
  author       = {Mike Just and
                  Evangelos Kranakis and
                  Danny Krizanc and
                  Paul C. van Oorschot},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu},
  title        = {On Key Distribution via True Broadcasting},
  booktitle    = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 2-4, 1994},
  pages        = {81--88},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/191177.191195},
  doi          = {10.1145/191177.191195},
  timestamp    = {Tue, 10 Nov 2020 20:00:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JustKKO94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics