If you made any changes in Pure these will be visible here soon.

Research Output 1994 2018

2018

Experimental large-scale review of attractors for detection of potentially unwanted applications

Stavova, V., Dedkova, L., Matyas, V., Just, M., Smahel, D. & Ukrop, M., Jul 2018, In : Computers and Security. 76, p. 92-100 9 p.

Research output: Contribution to journalArticle

Computer systems
Color
Malware
Industry

Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems

Saeed, A., Ahmadinia, A. & Just, M., 15 May 2018, In : Computers. 7, 2, 31

Research output: Contribution to journalArticle

Open Access
File
Embedded systems
Authentication
Electric power utilization
Hardware
Secure communication
2017

Everything's Cool: Extending Security Warnings with Thermal Feedback

Wilson, G., Maxwell, H. & Just, M., 11 Feb 2017, (Accepted/In press) Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Websites
Color
Temperature
Hot Temperature

Factors influencing the purchase of security software for mobile devices - Case study

Stavova, V., Matyas, V., Just, M. & Ukrop, M., Mar 2017, In : Infocommunications Journal. 9, 1, p. 18-23 6 p.

Research output: Contribution to journalArticle

Purchasing
Mobile devices
Mobile security

Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism

Just, M. & Berg, T., 21 Sep 2017, Human-Computer Interaction - INTERACT 2017: 16th IFIP TC 13 International Conference Mumbai, India, September 25–29, 2017 Proceedings, Part III. Springer, p. 34-53 20 p. (Lecture Notes in Computer Science; vol. 10515)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
autism
parents
ability
group discussion

Stop Annoying Me! An Empirical Investigation of the Usability of App Privacy Notifications

Micallef, N., Just, M., Baillie, L. & Alharby, M., 2017, Proceedings of the 29th Australian Conference on Human-Computer Interaction. ACM, p. 371-375 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
2016

Codes v. People: A comparative usability study of two password recovery mechanisms

Stavova, V., Matyas, V. & Just, M., 4 Jul 2016, (Accepted/In press) Proceedings of the 10th WISTP International Conference on Information Security Theory and Practice. Springer, (Lecture Notes in Computer Science)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Recovery
Communication

Investigating time series visualisations to improve the user experience

Adnan, M., Just, M. & Baillie, L., 7 May 2016, CHI'16: 2016 CHI Conference on Human Factors in Computing Systems Proceedings. ACM, p. 5444-5455 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Time series
Visualization
Color

On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications

Stavova, V., Matyas, V. & Just, M., Jul 2016, Proceedings of The 1st European Workshop on Usable Security. Internet Society

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Malware
Industry

Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems

Saeed, A., Ahmadinia, A. & Just, M., 14 Apr 2016, In : Journal of Circuits, Systems and Computers. 1650089

Research output: Contribution to journalArticle

Open Access
File
Communication
Field programmable gate arrays (FPGA)
Electric power utilization
Memory architecture
Routers

Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses

Saeed, A., Ahmadinia, A. & Just, M., 2016, Proceedings of the Third Workshop on Cryptography and Security in Computing Systems: CS2 '16. ACM, p. 31-36 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Storage allocation (computer)
Computer programming languages
Open Access
File
2015

Hardware-assisted secure communication for FPGA-based embedded systems

Saeed, A., Ahmadinia, A. & Just, M., 9 Sep 2015, 2015 11th Conference on Ph.D. Research in Microelectronics and Electronics. IEEE, p. 216-219 4 p. 7251373

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Computer hardware
Field programmable gate arrays (FPGA)
Hardware
Authentication

Investigating the work practices of network security professionals

Adnan, M., Just, M., Baillie, L. & Kayacik, H. G., 2015, In : Information and Computer Security. 23, 3, p. 347-367 21 p.

Research output: Contribution to journalArticle

Open Access
File
Network security

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015

Goldsteen, A. (ed.), Grandison, T. (ed.), Just, M. (ed.), Koved, L. (ed.), Malcolm, R. (ed.) & Thorpe, S. (ed.), 2015, IEEE.

Research output: Book/ReportBook

Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices

Micallef, N., Kayacik, H. G., Just, M., Baillie, L. & Aspinall, D., 1 Jul 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom) . IEEE, p. 189-197 9 p. 7146528

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Mobile devices
Authentication
Sensors
Sampling
Costs

Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking

Micallef, N., Just, M., Baillie, L., Halvey, M. & Kayacik, H. G., 2015, MobileHCI '15: Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. New York: ACM, p. 284-294 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Smartphones
2014

An ID and address protection unit for noC based communication architectures

Saeed, A., Ahmadinia, A., Just, M. & Bobda, C., 2014, Proceedings of the 7th International Conference on Security of Information and Networks . ACM, p. 288-294

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors

Kayacik, H. G., Just, M., Baillie, L., Aspinall, D. & Micallef, N., 28 Oct 2014, Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Mobile devices
Authentication
Sensors
Switches

Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014

Koved, L., Singh, K., Chen, H. & Just, M., 24 Oct 2014, IEEE.

Research output: Book/ReportBook

Mobile security
2013

Designing interactive secure system: CHI 2013 special interest group

Faily, S., Coles-kemp, L., Dunphy, P., Just, M., Akama, Y. & De Luca, A., 2013, CHI '13 Extended Abstracts on Human Factors in Computing Systems: CHI EA '13. ACM, p. 2469-2472

Research output: Chapter in Book/Report/Conference proceedingConference contribution

"Give me letters 2, 3 and 6!": Partial password implementations and attacks

Aspinall, D. & Just, M., 5 Sep 2013, 17th International Conference on Financial Cryptography and Data Security. Springer, Vol. 7859 , p. 126-143 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information use
Glossaries
Telephone
Learning systems

Non-intrusive and transparent authentication on smart phones

Micallef, N., Just, M., Baillie, L. & Kayacik, G., 2013, Proceedings of the 6th International Conference on Trust and Trustworthy Computing. Springer, Vol. 7904, p. 271-272 (Lecture Notes in Computer Science; vol. 7904)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stop questioning me! Towards optimizing user involvement during data collection on mobile devices

Micallef, N., Just, M., Baillie, L. & Kayacik, G., 2013, Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services : MobileHCI '13. ACM, p. 588-593

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

On the security and usability of dual credential authentication in UK online banking

Just, M. & Aspinall, D., 2012, 2012 International Conference for Internet Technology and Secured Transactions: ICITST 2012. IEEE, p. 259-264

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Industry

Trends in government e-authentication: Policy and practice

Just, M. & Renaud, K., 2012, Handbook of Research on E-Government in Emerging Economies: Adoption, E-Participation, and Legal Frameworks. Bwalya, K. J. & Zulu, S. F. C. (eds.). IGI Global, p. 664-677

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

Workshop on: Exploring the challenges of ethics, privacy and trust in serious gaming

Mccall, R., Baillie, L., Boehm, F. & Just, M., 2012, Proceedings of the 11th International Conference on Entertainment Computing : ICEC 12. Springer, Vol. 7522, p. 584-585 (Entertainment Computing - ICEC 2012; vol. 7522)

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

2011

Using avatars for improved authentication with challenge questions

Micallef, N. & Just, M., Dec 2011, 5th International Conference on Emerging Security Information, Systems and Technologies: SECURWARE 2011. p. 121-124 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Experiments
2010

Challenging challenge questions: an experimental analysis of authentication technologies and user behaviour

Just, M. & Aspinall, D., Apr 2010, In : Policy and Internet. 2, 1, p. 95-111

Research output: Contribution to journalArticle

Pictures or questions? Examining user responses to association-based authentication

Just, M., 2010, Proceedings of HCI 2010: the 24th British HCI Group Annual Conference . BCS

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mountings
Authentication
Data storage equipment

What’s in a name? Evaluating statistical attacks against personal knowledge questions

Bonneau, J., Just, M. & Matthews, G., 2010, Proceedings of the Fourteenth International Conference on Financial Cryptography and Data Security. Springer, p. 98-113 (Financial Cryptography and Data Security; vol. 6052)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Personal choice and challenge questions: a security and usability assessment

Just, M. & Aspinall, D., 2009, SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, Article No. 8

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2008

Method and apparatus for providing information security to prevent digital signature forgery

Just, M., 13 May 2008, IPC No. H04L 9/ 00 A I, Patent No. US7373512, Priority date 27 Mar 2000, Priority No. US20000536053

Research output: Patent

method
public
communications system
2004

Designing and evaluating challenge-question systems

Just, M., Sep 2004, In : IEEE Security and Privacy Magazine. 2, 5, p. 32-39

Research output: Contribution to journalArticle

2003

Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system

Just, M. & Van Oorschot, P., 20 May 2003, IPC No. H04L 9/ 00 A I, Patent No. US6567914, Priority date 27 Apr 2000, Priority No. US20000561249

Research output: Patent

Security systems
Cryptography
Bandwidth
Data communication systems

Resisting malicious packet dropping in wireless ad hoc networks

Just, M., Kranakis, E. & Wan, T., 2003, Proceedings of the Second International Conference on Ad-Hoc, Mobile, and Wireless Networks: ADHOC-NOW 2003. Springer, Vol. 2865, p. 151-163 (Ad-Hoc, Mobile, and Wireless Networks; vol. 2865)

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

Wireless ad hoc networks
Routing protocols
Experiments
Denial-of-service attack
1999

Addressing the Problem of Undetected Signature Key Compromise

Just, M. & Oorschot, P. C. V., 1999, Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA. Reston (Virginia): The Internet Society, 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cooling
1998

Some Timestamping Protocol Failures

Just, M., 1998, Proceedings of the Network and Distributed System Security Symposium, NDSS 1998, San Diego, California, USA. Reston (Virginia): The Internet Society, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

protocol
services
method
need
1996

Authenticated multi-party key agreement

Just, M. & Vaudenay, S., 1996, Advances in Cryptology - ASIACRYPT '96. New York (New York): Springer, p. 36-49 14 p. Chapter 4. (Lecture Notes in Computer Science Book Series (LNCS); vol. 1163)

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

Authentication
1994

On key distribution via true broadcasting

Just, M., Kranakis, E., Krizanc, D. & Van Oorschot, P., Nov 1994, Proceedings of the 2nd ACM Conference on Computer & Communications Security. Denning, D. (ed.). New York (New York): Association for Computing Machinery (ACM), p. 81-88 8 p. (Proceedings of the ACM Conferences; vol. 2)

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

Open Access
Broadcasting
Information use
Cryptography