1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Personal Safety App Effectiveness

Just, M., Chandok, H., Sampangi, R., Hawkey, K., Willis, A., Samuthiravelu, J., Gill, D. & Altair, M., 2 May 2019, CHI EA '19 Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 3312781

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Everything's Cool: Extending Security Warnings with Thermal Feedback

Wilson, G., Maxwell, H. & Just, M., 6 May 2017, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, p. 2232-2239 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism

Just, M. & Berg, T., 21 Sep 2017, Human-Computer Interaction - INTERACT 2017: 16th IFIP TC 13 International Conference Mumbai, India, September 25–29, 2017 Proceedings, Part III. Springer, p. 34-53 20 p. (Lecture Notes in Computer Science; vol. 10515).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
35 Downloads (Pure)

Stop Annoying Me! An Empirical Investigation of the Usability of App Privacy Notifications

Micallef, N., Just, M., Baillie, L. & Alharby, M., 28 Nov 2017, Proceedings of the 29th Australian Conference on Human-Computer Interaction. Association for Computing Machinery, p. 371-375 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Codes v. People: A comparative usability study of two password recovery mechanisms

Stavova, V., Matyas, V. & Just, M., 4 Jul 2016, (Accepted/In press) Proceedings of the 10th WISTP International Conference on Information Security Theory and Practice. Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
176 Downloads (Pure)

Investigating time series visualisations to improve the user experience

Adnan, M., Just, M. & Baillie, L., 7 May 2016, CHI'16: 2016 CHI Conference on Human Factors in Computing Systems Proceedings. Association for Computing Machinery, p. 5444-5455 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
335 Downloads (Pure)

On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications

Stavova, V., Matyas, V. & Just, M., Jul 2016, Proceedings of The 1st European Workshop on Usable Security. Internet Society

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
90 Downloads (Pure)

Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses

Saeed, A., Ahmadinia, A. & Just, M., 2016, Proceedings of the Third Workshop on Cryptography and Security in Computing Systems: CS2 '16. Association for Computing Machinery, p. 31-36 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Hardware-assisted secure communication for FPGA-based embedded systems

Saeed, A., Ahmadinia, A. & Just, M., 9 Sep 2015, 2015 11th Conference on Ph.D. Research in Microelectronics and Electronics. IEEE, p. 216-219 4 p. 7251373

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices

Micallef, N., Kayacik, H. G., Just, M., Baillie, L. & Aspinall, D., 1 Jul 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom) . IEEE, p. 189-197 9 p. 7146528

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
40 Downloads (Pure)

Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking

Micallef, N., Just, M., Baillie, L., Halvey, M. & Kayacik, H. G., 2015, MobileHCI '15: Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. New York: Association for Computing Machinery, p. 284-294 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
165 Downloads (Pure)
2014

An ID and address protection unit for noC based communication architectures

Saeed, A., Ahmadinia, A., Just, M. & Bobda, C., 2014, Proceedings of the 7th International Conference on Security of Information and Networks . Association for Computing Machinery, p. 288-294

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors

Kayacik, H. G., Just, M., Baillie, L., Aspinall, D. & Micallef, N., 28 Oct 2014, Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
69 Downloads (Pure)
2013

Designing interactive secure system: CHI 2013 special interest group

Faily, S., Coles-kemp, L., Dunphy, P., Just, M., Akama, Y. & De Luca, A., 2013, CHI '13 Extended Abstracts on Human Factors in Computing Systems: CHI EA '13. Association for Computing Machinery, p. 2469-2472

Research output: Chapter in Book/Report/Conference proceedingConference contribution

"Give me letters 2, 3 and 6!": Partial password implementations and attacks

Aspinall, D. & Just, M., 5 Sep 2013, 17th International Conference on Financial Cryptography and Data Security. Springer, Vol. 7859 . p. 126-143 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Non-intrusive and transparent authentication on smart phones

Micallef, N., Just, M., Baillie, L. & Kayacik, G., 2013, Proceedings of the 6th International Conference on Trust and Trustworthy Computing. Springer, Vol. 7904. p. 271-272 (Lecture Notes in Computer Science; vol. 7904).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stop questioning me! Towards optimizing user involvement during data collection on mobile devices

Micallef, N., Just, M., Baillie, L. & Kayacik, G., 2013, Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services : MobileHCI '13. Association for Computing Machinery, p. 588-593

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

On the security and usability of dual credential authentication in UK online banking

Just, M. & Aspinall, D., 2012, 2012 International Conference for Internet Technology and Secured Transactions: ICITST 2012. IEEE, p. 259-264

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

Using avatars for improved authentication with challenge questions

Micallef, N. & Just, M., Dec 2011, 5th International Conference on Emerging Security Information, Systems and Technologies: SECURWARE 2011. p. 121-124 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

Pictures or questions? Examining user responses to association-based authentication

Just, M., 2010, Proceedings of HCI 2010: the 24th British HCI Group Annual Conference . BCS

Research output: Chapter in Book/Report/Conference proceedingConference contribution

What’s in a name? Evaluating statistical attacks against personal knowledge questions

Bonneau, J., Just, M. & Matthews, G., 2010, Proceedings of the Fourteenth International Conference on Financial Cryptography and Data Security. Springer, p. 98-113 (Financial Cryptography and Data Security; vol. 6052).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Personal choice and challenge questions: a security and usability assessment

Just, M. & Aspinall, D., 2009, SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security. Association for Computing Machinery, Article No. 8

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1999

Addressing the Problem of Undetected Signature Key Compromise

Just, M. & Oorschot, P. C. V., 1999, Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA. Reston (Virginia): The Internet Society, 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1998

Some Timestamping Protocol Failures

Just, M., 1998, Proceedings of the Network and Distributed System Security Symposium, NDSS 1998, San Diego, California, USA. Reston (Virginia): The Internet Society, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution