Mike Just
Mike Just
Associate Professor, Computer Science, Heriot-Watt University
Verified email at hw.ac.uk - Homepage
Cited by
Cited by
Authenticated multi-party key agreement
M Just, S Vaudenay
Advances in Cryptology—ASIACRYPT'96, 36-49, 1996
Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system
MK Just, P Van Oorschot
US Patent 6,567,914, 2003
Personal choice and challenge questions: a security and usability assessment
M Just, D Aspinall
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-11, 2009
Resisting malicious packet dropping in wireless ad hoc networks
M Just, E Kranakis, T Wan
Ad-Hoc, Mobile, and Wireless Networks, 151-163, 2003
Designing and evaluating challenge-question systems
M Just
IEEE Security & Privacy 2 (5), 32-39, 2004
What’s in a name?
J Bonneau, M Just, G Matthews
Financial Cryptography and Data Security, 98-113, 2010
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
HG Kayacık, M Just, L Baillie, D Aspinall, N Micallef
IEEE Security & Privacy Workshop on Mobile Security Technologies (MoST), 2014
Selecting revocation solutions for PKI
A Arnes, M Just, SJ Knapskog, S Lloyd, H Meijer
Fifth Nordic Workshop on Secure IT Systems (NORDSEC 2000), 2000
On key distribution via true broadcasting
M Just, E Kranakis, D Krizanc, P Van Oorschot
Proceedings of the 2nd ACM Conference on Computer and Communicationsá…, 1994
Some Timestamping Protocol Failures.
M Just
NDSS 98, 89-96, 1998
Why aren’t Users Using Protection? Investigating the Usability of Smartphone Locking
N Micallef, M Just, L Baillie, M Halvey, HG Kayacik
MobileHCI, 2015
Designing authentication systems with challenge questions
M Just
Security and Usability: Designing Secure Systems That People Can Use, 143-155, 2005
Investigating time series visualisations to improve the user experience
M Adnan, M Just, L Baillie
ACM CHI, 2016
M. Nystrom," Securely Available Credentials-Credential Server Framework,"
D Gustafson, M Just
RFC 3760, April, 2004
Challenging challenge questions: an experimental analysis of authentication technologies and user behaviour
M Just, D Aspinall
Policy & Internet 2 (1), 99-115, 2010
PKI: Ten years later
C Adams, M Just
3rd Annual PKI R&D Workshop, 69-84, 2004
Pictures or questions? Examining user responses to association-based authentication
K Renaud, M Just
Proceedings of HCI 2010 24, 98-107, 2010
Addressing the Problem of Undetected Signature Key Compromise.
M Just, PC van Oorschot
NDSS, 1999
Method and apparatus for providing information security to prevent digital signature forgery
MK Just
US Patent 7,373,512, 2008
Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices
N Micallef, HG Kayacık, M Just, L Baillie, D Aspinall
2015 IEEE International Conference on Pervasive Computing and Communicationsá…, 2015
The system can't perform the operation now. Try again later.
Articles 1–20