The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Mike Just" ( http://dblp.L3S.de/Authors/Mike_Just )

  Author page on DBLP  Author page in RDF  Community of Mike Just in ASPL-2

Publication years (Num. hits)
1994-2010 (15) 2011-2013 (15) 2014-2017 (15) 2018-2019 (4)
Publication types (Num. hits)
article(11) incollection(14) inproceedings(24)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14 occurrences of 12 keywords

Results
Found 50 publication records. Showing 49 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Mike Just, Hasmeet Chandok, Raghav V. Sampangi, Kirstie Hawkey, Alette Willis, JeyaBalaji Samuthiravelu, Dilpreet Gill, Michael Altair Personal Safety App Effectiveness. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ahmed Saeed 0003, Ali Ahmadinia, Mike Just Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems. Search on Bibsonomy Computers The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vlasta Stavova, Lenka Dedkova, Vashek Matyas, Mike Just, David Smahel, Martin Ukrop Experimental large-scale review of attractors for detection of potentially unwanted applications. Search on Bibsonomy Computers & Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Graham Wilson, Harry Maxwell, Mike Just Everything's Cool: Extending Security Warnings with Thermal Feedback. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nicholas Micallef, Mike Just, Lynne Baillie, Maher Alharby Stop annoying me!: an empirical investigation of the usability of app privacy notifications. Search on Bibsonomy OZCHI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mike Just, Tessa Berg Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism. Search on Bibsonomy INTERACT (3) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmed Saeed 0003, Ali Ahmadinia, Mike Just Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation. Search on Bibsonomy Adv. Software Engineering The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmed Saeed 0003, Ali Ahmadinia, Mike Just Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems. Search on Bibsonomy Journal of Circuits, Systems, and Computers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Muhammad Adnan 0001, Mike Just, Lynne Baillie Investigating Time Series Visualisations to Improve the User Experience. Search on Bibsonomy CHI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vlasta Stavova, Vashek Matyas, Mike Just Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmed Saeed 0003, Ali Ahmadinia, Mike Just Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abigail Goldsteen, Tyrone Grandison, Mike Just, Larry Koved, Rohan Malcolm, Sean S. E. Thorpe Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
1Muhammad Adnan 0001, Mike Just, Lynne Baillie, Hilmi Günes Kayacik Investigating the work practices of network security professionals. Search on Bibsonomy Inf. & Comput. Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nicholas Micallef, Hilmi Günes Kayacik, Mike Just, Lynne Baillie, David Aspinall 0001 Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices. Search on Bibsonomy PerCom The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nicholas Micallef, Mike Just, Lynne Baillie, Martin Halvey, Hilmi Günes Kayacik Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking. Search on Bibsonomy MobileHCI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hilmi Günes Kayacik, Mike Just, Lynne Baillie, David Aspinall 0001, Nicholas Micallef Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
1Larry Koved, Kapil Singh, Hao Chen, Mike Just Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
1Ahmed Saeed 0003, Ali Ahmadinia, Mike Just, Christophe Bobda An ID and Address Protection Unit for NoC based Communication Architectures. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Aspinall 0001, Mike Just "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks. Search on Bibsonomy Financial Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shamal Faily, Lizzie Coles-Kemp, Paul Dunphy, Mike Just, Yoko Akama, Alexander De Luca Designing interactive secure system: chi 2013 special interest group. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nicholas Micallef, Mike Just, Lynne Baillie, Hilmi Günes Kayacik Stop questioning me!: towards optimizing user involvement during data collection on mobile devices. Search on Bibsonomy Mobile HCI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nicholas Micallef, Mike Just, Lynne Baillie, Hilmi Günes Kayacik Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract). Search on Bibsonomy TRUST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rod McCall, Lynne Baillie, Franziska Boehm, Mike Just Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming. Search on Bibsonomy ICEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mike Just, David Aspinall 0001 On the security and usability of dual credential authentication in UK online banking. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Mike Just Challenge-Response Identification. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Just Nonrepudiation of Digital Signatures. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Just Key Agreement. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Just Key Escrow. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Just PKI Trust Models. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Just Identity Management. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Just Schnorr Identification Protocol. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Just Diffie-Hellman Key Agreement. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Just Needham-Schroeder Protocols. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Joseph Bonneau, Mike Just, Greg Matthews What's in a Name? Search on Bibsonomy Financial Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Mike Just Pictures or questions?: examining user responses to association-based authentication. Search on Bibsonomy BCS HCI The full citation details ... 2010 DBLP  BibTeX  RDF
1Mike Just, David Aspinall 0001 Personal choice and challenge questions: a security and usability assessment. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF challenge questions, security, usability, authentication
1Mike Just Needham-Schroeder Protocols. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Just Diffie-Hellman Key Agreement. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Just Challenge-Response Identification. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Just Key agreement. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Just Schnorr Indentification Scheme. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Just Designing and Evaluating Challenge-Question Systems. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Challenge questions, credential recovery, password recovery, user authentication
1Dale Gustafson, Mike Just, Magnus Nyström Securely Available Credentials (SACRED) - Credential Server Framework. Search on Bibsonomy RFC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mike Just, Evangelos Kranakis, Tao Wan Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols
1Mike Just, Paul C. van Oorschot Addressing the Problem of Undetected Signature Key Compromise. Search on Bibsonomy NDSS The full citation details ... 1999 DBLP  BibTeX  RDF
1Mike Just Some Timestamping Protocol Failures. Search on Bibsonomy NDSS The full citation details ... 1998 DBLP  BibTeX  RDF
1Mike Just, Serge Vaudenay Authenticated Multi-Party Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF confirmation, authentication, key agreement, forward secrecy
1Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot On Key Distribution via True Broadcasting. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 1994 DBLP  DOI  BibTeX  RDF secret sharing, key distribution, broadcast encryption
Displaying result #1 - #49 of 49 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license