default search action
Graeme Jenkinson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j2]Seb Aebischer, Claudio Dettoni, Graeme Jenkinson, Kat Krol, David Llewellyn-Jones, Toshiyuki Masui, Frank Stajano:
Deploying authentication in the wild: towards greater ecological validity in security usability studies. J. Cybersecur. 6(1) (2020)
2010 – 2019
- 2017
- [j1]Graeme Jenkinson:
It's Better to Rust Than Wear Out. login Usenix Mag. 42(2) (2017) - [c9]Graeme Jenkinson, Lucian Carata, Thomas Bytheway, Ripduman Sohan, Robert N. M. Watson, Jonathan Anderson, Brian J. Kidney, Amanda Strnad, Arun Thomas, George V. Neville-Neil:
Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance. TaPP 2017 - 2016
- [c8]Ian Goldberg, Graeme Jenkinson, Frank Stajano:
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. ACNS 2016: 36-57 - [c7]David Llewellyn-Jones, Graeme Jenkinson, Frank Stajano:
Explicit Delegation Using Configurable Cookies. Security Protocols Workshop 2016: 141-152 - [c6]Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano:
Red Button and Yellow Button: Usable Security for Lost Security Tokens. Security Protocols Workshop 2016: 165-171 - [e1]Frank Stajano, Stig Fr. Mjølsnes, Graeme Jenkinson, Per Thorsheim:
Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings. Lecture Notes in Computer Science 9551, Springer 2016, ISBN 978-3-319-29937-2 [contents] - [i2]Jeunese A. Payne, Graeme Jenkinson, Frank Stajano, M. Angela Sasse, Max Spencer:
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens. CoRR abs/1605.03478 (2016) - [i1]Brian Glass, Graeme Jenkinson, Yuqi Liu, M. Angela Sasse, Frank Stajano:
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions. CoRR abs/1607.03417 (2016) - 2015
- [c5]Frank Stajano, Bruce Christianson, T. Mark A. Lomas, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser:
Pico Without Public Keys. Security Protocols Workshop 2015: 195-211 - 2014
- [c4]Quentin Stafford-Fraser, Graeme Jenkinson, Frank Stajano, Max Spencer, Chris Warrington, Jeunese A. Payne:
To have and have not: variations on secret sharing to model user presence. UbiComp Adjunct 2014: 1313-1320 - [c3]Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser:
Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers. PASSWORDS 2014: 61-73 - [c2]Frank Stajano, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington:
Bootstrapping Adoption of the Pico Password Replacement System. Security Protocols Workshop 2014: 172-186 - [c1]Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano:
I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes. Security Protocols Workshop 2014: 197-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint