1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

Are autistic children more vulnerable online? Relating autism to online safety, child wellbeing and parental risk management

Macmillan, K., Berg, T., Just, M. & Stewart, M. E., 23 Jun 2020, (Accepted/In press) 11th Nordic Conference on Human-Computer Interaction (NordiCHI 2020). Association for Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

File
2019

Personal Safety App Effectiveness

Just, M., Chandok, H., Sampangi, R., Hawkey, K., Willis, A., Samuthiravelu, J., Gill, D. & Altair, M., 2 May 2019, CHI EA '19 Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 3312781

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
85 Downloads (Pure)
2018

Experimental large-scale review of attractors for detection of potentially unwanted applications

Stavova, V., Dedkova, L., Matyas, V., Just, M., Smahel, D. & Ukrop, M., Jul 2018, In : Computers and Security. 76, p. 92-100 9 p.

Research output: Contribution to journalArticle

Open Access
File
23 Downloads (Pure)

Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems

Saeed, A., Ahmadinia, A. & Just, M., 15 May 2018, In : Computers. 7, 2, 31.

Research output: Contribution to journalArticle

Open Access
File
19 Downloads (Pure)
2017

Everything's Cool: Extending Security Warnings with Thermal Feedback

Wilson, G., Maxwell, H. & Just, M., 6 May 2017, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, p. 2232-2239 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Factors influencing the purchase of security software for mobile devices - Case study

Stavova, V., Matyas, V., Just, M. & Ukrop, M., Mar 2017, In : Infocommunications Journal. 9, 1, p. 18-23 6 p.

Research output: Contribution to journalArticle

Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism

Just, M. & Berg, T., 21 Sep 2017, Human-Computer Interaction - INTERACT 2017: 16th IFIP TC 13 International Conference Mumbai, India, September 25–29, 2017 Proceedings, Part III. Springer, p. 34-53 20 p. (Lecture Notes in Computer Science; vol. 10515).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
35 Downloads (Pure)

Stop Annoying Me! An Empirical Investigation of the Usability of App Privacy Notifications

Micallef, N., Just, M., Baillie, L. & Alharby, M., 28 Nov 2017, Proceedings of the 29th Australian Conference on Human-Computer Interaction. Association for Computing Machinery, p. 371-375 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Codes v. People: A comparative usability study of two password recovery mechanisms

Stavova, V., Matyas, V. & Just, M., 4 Jul 2016, (Accepted/In press) Proceedings of the 10th WISTP International Conference on Information Security Theory and Practice. Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
176 Downloads (Pure)

Investigating time series visualisations to improve the user experience

Adnan, M., Just, M. & Baillie, L., 7 May 2016, CHI'16: 2016 CHI Conference on Human Factors in Computing Systems Proceedings. Association for Computing Machinery, p. 5444-5455 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
335 Downloads (Pure)

On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications

Stavova, V., Matyas, V. & Just, M., Jul 2016, Proceedings of The 1st European Workshop on Usable Security. Internet Society

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
90 Downloads (Pure)

Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems

Saeed, A., Ahmadinia, A. & Just, M., 14 Apr 2016, In : Journal of Circuits, Systems and Computers. 1650089.

Research output: Contribution to journalArticle

Open Access
File
204 Downloads (Pure)

Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses

Saeed, A., Ahmadinia, A. & Just, M., 2016, Proceedings of the Third Workshop on Cryptography and Security in Computing Systems: CS2 '16. Association for Computing Machinery, p. 31-36 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
124 Downloads (Pure)
2015

Hardware-assisted secure communication for FPGA-based embedded systems

Saeed, A., Ahmadinia, A. & Just, M., 9 Sep 2015, 2015 11th Conference on Ph.D. Research in Microelectronics and Electronics. IEEE, p. 216-219 4 p. 7251373

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Investigating the work practices of network security professionals

Adnan, M., Just, M., Baillie, L. & Kayacik, H. G., 2015, In : Information and Computer Security. 23, 3, p. 347-367 21 p.

Research output: Contribution to journalArticle

Open Access
File
91 Downloads (Pure)

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015

Goldsteen, A. (ed.), Grandison, T. (ed.), Just, M. (ed.), Koved, L. (ed.), Malcolm, R. (ed.) & Thorpe, S. (ed.), 2015, IEEE.

Research output: Book/ReportBook

Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices

Micallef, N., Kayacik, H. G., Just, M., Baillie, L. & Aspinall, D., 1 Jul 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom) . IEEE, p. 189-197 9 p. 7146528

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
40 Downloads (Pure)

Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking

Micallef, N., Just, M., Baillie, L., Halvey, M. & Kayacik, H. G., 2015, MobileHCI '15: Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. New York: Association for Computing Machinery, p. 284-294 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
165 Downloads (Pure)
2014

An ID and address protection unit for noC based communication architectures

Saeed, A., Ahmadinia, A., Just, M. & Bobda, C., 2014, Proceedings of the 7th International Conference on Security of Information and Networks . Association for Computing Machinery, p. 288-294

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors

Kayacik, H. G., Just, M., Baillie, L., Aspinall, D. & Micallef, N., 28 Oct 2014, Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
69 Downloads (Pure)

Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014

Koved, L., Singh, K., Chen, H. & Just, M., 24 Oct 2014, IEEE.

Research output: Book/ReportBook

2013

Designing interactive secure system: CHI 2013 special interest group

Faily, S., Coles-kemp, L., Dunphy, P., Just, M., Akama, Y. & De Luca, A., 2013, CHI '13 Extended Abstracts on Human Factors in Computing Systems: CHI EA '13. Association for Computing Machinery, p. 2469-2472

Research output: Chapter in Book/Report/Conference proceedingConference contribution

"Give me letters 2, 3 and 6!": Partial password implementations and attacks

Aspinall, D. & Just, M., 5 Sep 2013, 17th International Conference on Financial Cryptography and Data Security. Springer, Vol. 7859 . p. 126-143 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Non-intrusive and transparent authentication on smart phones

Micallef, N., Just, M., Baillie, L. & Kayacik, G., 2013, Proceedings of the 6th International Conference on Trust and Trustworthy Computing. Springer, Vol. 7904. p. 271-272 (Lecture Notes in Computer Science; vol. 7904).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stop questioning me! Towards optimizing user involvement during data collection on mobile devices

Micallef, N., Just, M., Baillie, L. & Kayacik, G., 2013, Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services : MobileHCI '13. Association for Computing Machinery, p. 588-593

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

On the security and usability of dual credential authentication in UK online banking

Just, M. & Aspinall, D., 2012, 2012 International Conference for Internet Technology and Secured Transactions: ICITST 2012. IEEE, p. 259-264

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trends in government e-authentication: Policy and practice

Just, M. & Renaud, K., 2012, Handbook of Research on E-Government in Emerging Economies: Adoption, E-Participation, and Legal Frameworks. Bwalya, K. J. & Zulu, S. F. C. (eds.). IGI Global, p. 664-677

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

Workshop on: Exploring the challenges of ethics, privacy and trust in serious gaming

Mccall, R., Baillie, L., Boehm, F. & Just, M., 2012, Proceedings of the 11th International Conference on Entertainment Computing : ICEC 12. Springer, Vol. 7522. p. 584-585 (Entertainment Computing - ICEC 2012; vol. 7522).

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

2011

Using avatars for improved authentication with challenge questions

Micallef, N. & Just, M., Dec 2011, 5th International Conference on Emerging Security Information, Systems and Technologies: SECURWARE 2011. p. 121-124 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

Challenging challenge questions: an experimental analysis of authentication technologies and user behaviour

Just, M. & Aspinall, D., Apr 2010, In : Policy and Internet. 2, 1, p. 95-111

Research output: Contribution to journalArticle

Pictures or questions? Examining user responses to association-based authentication

Just, M., 2010, Proceedings of HCI 2010: the 24th British HCI Group Annual Conference . BCS

Research output: Chapter in Book/Report/Conference proceedingConference contribution

What’s in a name? Evaluating statistical attacks against personal knowledge questions

Bonneau, J., Just, M. & Matthews, G., 2010, Proceedings of the Fourteenth International Conference on Financial Cryptography and Data Security. Springer, p. 98-113 (Financial Cryptography and Data Security; vol. 6052).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Personal choice and challenge questions: a security and usability assessment

Just, M. & Aspinall, D., 2009, SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security. Association for Computing Machinery, Article No. 8

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2008

Method and apparatus for providing information security to prevent digital signature forgery

Just, M., 13 May 2008, IPC No. H04L 9/ 00 A I, Patent No. US7373512, Priority date 27 Mar 2000, Priority No. US20000536053

Research output: Patent

2004

Designing and evaluating challenge-question systems

Just, M., Sep 2004, In : IEEE Security and Privacy Magazine. 2, 5, p. 32-39

Research output: Contribution to journalArticle

2003

Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system

Just, M. & Van Oorschot, P., 20 May 2003, IPC No. H04L 9/ 00 A I, Patent No. US6567914, Priority date 27 Apr 2000, Priority No. US20000561249

Research output: Patent

Resisting malicious packet dropping in wireless ad hoc networks

Just, M., Kranakis, E. & Wan, T., 2003, Proceedings of the Second International Conference on Ad-Hoc, Mobile, and Wireless Networks: ADHOC-NOW 2003. Springer, Vol. 2865. p. 151-163 (Ad-Hoc, Mobile, and Wireless Networks; vol. 2865).

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

1999

Addressing the Problem of Undetected Signature Key Compromise

Just, M. & Oorschot, P. C. V., 1999, Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA. Reston (Virginia): The Internet Society, 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1998

Some Timestamping Protocol Failures

Just, M., 1998, Proceedings of the Network and Distributed System Security Symposium, NDSS 1998, San Diego, California, USA. Reston (Virginia): The Internet Society, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1996

Authenticated multi-party key agreement

Just, M. & Vaudenay, S., 1996, Advances in Cryptology - ASIACRYPT '96. New York (New York): Springer, p. 36-49 14 p. Chapter 4. (Lecture Notes in Computer Science Book Series (LNCS); vol. 1163).

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

1994

On key distribution via true broadcasting

Just, M., Kranakis, E., Krizanc, D. & Van Oorschot, P., Nov 1994, Proceedings of the 2nd ACM Conference on Computer & Communications Security. Denning, D. (ed.). New York (New York): Association for Computing Machinery, p. 81-88 8 p. (Proceedings of the ACM Conferences; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

Open Access