Graeme Jenkinson
According to our database1,
Graeme Jenkinson
authored at least 13 papers
between 2014 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Deploying authentication in the wild: towards greater ecological validity in security usability studies.
J. Cybersecur., 2020
2017
Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017
2016
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens.
CoRR, 2016
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions.
CoRR, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
2014
Proceedings of the Security Protocols XXII, 2014
I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes.
Proceedings of the Security Protocols XXII, 2014
Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers.
Proceedings of the Technology and Practice of Passwords, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014