Följ
Graeme Jenkinson
Graeme Jenkinson
Verifierad e-postadress på cl.cam.ac.uk - Startsida
Titel
Citeras av
Citeras av
År
Single-phase switched reluctance motor design
JM Stephenson, GC Jenkinson
IEE Proceedings-Electric Power Applications 147 (2), 131-139, 2000
342000
Password-manager friendly (PMF): Semantic annotations to improve the effectiveness of password managers
F Stajano, M Spencer, G Jenkinson, Q Stafford-Fraser
Technology and Practice of Passwords: International Conference on Passwords …, 2015
252015
Responsibility and tangible security: Towards a theory of user acceptance of security tokens
J Payne, G Jenkinson, F Stajano, MA Sasse, M Spencer
arXiv preprint arXiv:1605.03478, 2016
162016
Applying provenance in {APT} monitoring and analysis: Practical challenges for scalable, efficient and trustworthy distributed provenance
G Jenkinson, L Carata, T Bytheway, R Sohan, RNM Watson, J Anderson, ...
9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017
142017
Bootstrapping adoption of the pico password replacement system
F Stajano, G Jenkinson, J Payne, M Spencer, Q Stafford-Fraser, ...
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
132014
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions
B Glass, G Jenkinson, Y Liu, MA Sasse, F Stajano
arXiv preprint arXiv:1607.03417, 2016
112016
Pico in the wild: Replacing passwords, one site at a time
S Aebischer, C Dettoni, G Jenkinson, KK Krol, D Llewellyn-Jones, T Masui, ...
Internet Society, 2017
102017
Starting of a single-phase switched reluctance motor
GC Jenkinson, JM Stephenson
IET Digital Library, 1999
91999
Pico without public keys
F Stajano, B Christianson, M Lomas, G Jenkinson, J Payne, M Spencer, ...
Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March …, 2015
72015
I bought a new security token and all I got was this lousy phish—Relay attacks on visual code authentication schemes
G Jenkinson, M Spencer, C Warrington, F Stajano
72014
Applying provenance in APT monitoring and analysis
G Jenkinson, L Carata, N Balakrishnan, T Bytheway, R Sohan, R Watson, ...
Proc. USENIX Workshop Theory Practice Provenance, 16-16, 2017
62017
To have and have not: variations on secret sharing to model user presence
Q Staford-Fraser, G Jenkinson, F Stajano, M Spencer, C Warrington, ...
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
52014
Technology and Practice of Passwords: 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings
F Stajano, SF Mjølsnes, G Jenkinson, P Thorsheim
Springer, 2016
32016
Low-cost mitigation against cold boot attacks for an authentication token
I Goldberg, G Jenkinson, F Stajano
Applied Cryptography and Network Security: 14th International Conference …, 2016
22016
It's Better to Rust than to Wear Out
G Jenkinson
FreeBSD Journal, 2016
12016
Deploying authentication in the wild: towards greater ecological validity in security usability studies
S Aebischer, C Dettoni, G Jenkinson, K Krol, D Llewellyn-Jones, T Masui, ...
Journal of Cybersecurity 6 (1), tyaa010, 2020
2020
The Process Model
G Jenkinson
2019
OpenDTrace Specification version 1.0
G Neville-Neil, J Anderson, G Jenkinson, B Kidney, D Stolfa, A Thomas, ...
University of Cambridge, Computer Laboratory, 2018
2018
Red Button and Yellow Button: Usable Security for Lost Security Tokens
I Goldberg, G Jenkinson, D Llewellyn-Jones, F Stajano
Security Protocols XXIV: 24th International Workshop, Brno, Czech Republic …, 2017
2017
Explicit Delegation using Configurable Cookies
D Llewellyn-Jones, G Jenkinson, F Stajano
Security Protocols XXIV: 24th International Workshop, Brno, Czech Republic …, 2017
2017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20