My publications

(Last updated 6 October 2017)

Also see listings at DBLP, Google Scholar, Heriot-Watt’s Research Gateway, and ORCID.

You can also see my list of past and upcoming presentations.

2017

  • “Stop Annoying Me! An Empirical Investigation of the Usability of App Privacy Notifications”, conditionally accepted to OzCHI 2017, ACM.
    Authors: Nicholas Micallef, Mike Just, Lynne Baillie, Maher Alharby
  • “Factors Influencing the Purchase of Security Software for Mobile Devices — Case Study”, in Infocommunications Journal, IEEE.
    Authors: Vlasta Stavova, Vashek Matyas, and Mike Just.
  • “Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism”, INTERACT 2017, Springer.
    Authors: Mike Just and Tessa Berg.
  • “Everything’s Cool: Extending Security Warnings with Thermal Feedback”, CHI EA 2017, ACM.
    Authors: Graham Wilson, Harry Maxwell, and Mike Just.

2016

  • “Codes v. People: A comparative usability study of two password recovery mechanisms”, WISTP 2016.
    Authors: Vlasta Stavova, Vashek Matyas, and Mike Just.
  • “On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications”, in European Workshop on Usable Security (EuroUSEC 2016).
    [paper]
    Authors: Vlasta Stavova, Vashek Matyas, and Mike Just.
  • “Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses”, Advances in Software Engineering. (Extended version of CS2 workshop paper below.)
    [paper]
    Authors: Ahmed Saeed, Ali Ahmadinia and Mike Just.
  • “Secure On-Chip Communication Architecture for Reconfigurable Multi-core Systems”, Journal of Circuits, Systems, and Computers.
    [paper]
    Authors: Ahmed Saeed, Ali Ahmadinia and Mike Just
  • “Investigating time series visualisations to improve the user experience”, ACM CHI 2016.
    [paper, presentation]
    23.4% acceptance rate (>2300 submissions)
    Authors: Muhammad Adnan, Mike Just, Lynne Baillie
  • “Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses”, Third Workshop on Cryptography and Security in Computing Systems (CS2, co-located with HiPEAC 2016), ACM.
    Authors: Ahmed Saeed, Ali Ahmadinia and Mike Just

2015

2014

2013

2012

  • “On the Security and Usability of Dual Credential Authentication in UK Online Banking”, ICITST-2012, IEEE. [paper: publisher version]
    Authors: Mike Just, David Aspinall
  • “Trends in Government E-Authentication Policy and Practice,” in K.J. Bwalya & S.F. Zulu (Eds.), E-Government in Emerging Economies – Adoption, Continuance Usage, e-Participation and legal frameworks, IGI Global, 2012. [chapter: publisher version]
    Authors: Karen Renaud, Mike Just

2011

2010

  • “Pictures or Questions? Examining User Responses to Association-Based Authentication,” British HCI 2010. [paper: authors’ version]
    Authors: Karen Renaud, Mike Just
  • “Challenging Challenge Questions: An Experimental Analysis of Authentication Technologies and User Behaviour,” Policy and Internet Journal: Vol. 2: Iss. 1, Article 5, 2010. [paper: publisher version]
    Authors: Mike Just, David Aspinall
  • “What’s in a Name? Evaluating Statistical Attacks Against Personal Knowledge Questions,” Financial Cryptography 2010, Springer. [paper: authors’ version, presentation, data]:
    14.6% (full paper) acceptance (19 out of 130)
    Press: BBC News, New Scientist, The Telegraph
    Authors: Joseph Bonneau, Mike Just, Greg Matthews

2009 and earlier

  • Mike Just, David Aspinall, “Personal Choice and Challenge Questions: A Security and Usability Assessment,” in Proceedings of the 5th ACM Symposium on Usable Privacy and Security (SOUPS) 2009.
    [paper, presentation, experiment info]
    Press: ZDNet
  • Mike Just, “Designing and Evaluating Challenge-Question Systems”, in IEEE Security & Privacy, 2(5): 32-39 (2004) [paper]
  • Mike Just, Evangelos Kranakis, Tao Wan, “Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks”, ADHOC-NOW 2003, 151-163 [paper]
  • Mike Just, Paul C. van Oorschot, “Addressing the Problem of Undetected Signature Key Compromise”, NDSS 1999.
    [paper]: 24% acceptance
  • Mike Just, “Some Timestamping Protocol Failures”, NDSS 1998
    [paper]: 33.3% acceptance (15 out of 45)
  • Mike Just, Serge Vaudenay, “Authenticated Multi-Party Key Agreement”, ASIACRYPT 1996, 36-49
    [paper]: 25% acceptance (31 out of 124)
  • Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot, “On Key Distribution via True Broadcasting”, ACM Conference on Computer and Communications Security 1994, 81-88
    [paper]
Advertisements