Sledovať
Graeme Jenkinson
Graeme Jenkinson
Overená e-mailová adresa na: cl.cam.ac.uk - Domovská stránka
Názov
Citované v
Citované v
Rok
Single-phase switched reluctance motor design
JM Stephenson, GC Jenkinson
IEE Proceedings-Electric Power Applications 147 (2), 131-139, 2000
332000
Password-manager friendly (PMF): Semantic annotations to improve the effectiveness of password managers
F Stajano, M Spencer, G Jenkinson, Q Stafford-Fraser
Technology and Practice of Passwords: International Conference on Passwords …, 2015
282015
Applying provenance in {APT} monitoring and analysis: Practical challenges for scalable, efficient and trustworthy distributed provenance
G Jenkinson, L Carata, T Bytheway, R Sohan, RNM Watson, J Anderson, ...
9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017
182017
Responsibility and tangible security: Towards a theory of user acceptance of security tokens
J Payne, G Jenkinson, F Stajano, MA Sasse, M Spencer
arXiv preprint arXiv:1605.03478, 2016
162016
Bootstrapping adoption of the pico password replacement system
F Stajano, G Jenkinson, J Payne, M Spencer, Q Stafford-Fraser, ...
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
132014
Pico in the wild: Replacing passwords, one site at a time
S Aebischer, C Dettoni, G Jenkinson, KK Krol, D Llewellyn-Jones, T Masui, ...
Internet Society, 2017
112017
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions
B Glass, G Jenkinson, Y Liu, MA Sasse, F Stajano
arXiv preprint arXiv:1607.03417, 2016
112016
Applying provenance in APT monitoring and analysis
G Jenkinson, L Carata, N Balakrishnan, T Bytheway, R Sohan, R Watson, ...
Proc. USENIX Workshop Theory Practice Provenance, 16-16, 2017
92017
Starting of a single-phase switched reluctance motor
GC Jenkinson, JM Stephenson
1999. Ninth International Conference on Electrical Machines and Drives (Conf …, 1999
91999
Pico without public keys
F Stajano, B Christianson, M Lomas, G Jenkinson, J Payne, M Spencer, ...
Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March …, 2015
72015
I bought a new security token and all I got was this lousy phish—Relay attacks on visual code authentication schemes
G Jenkinson, M Spencer, C Warrington, F Stajano
62014
To have and have not: variations on secret sharing to model user presence
Q Staford-Fraser, G Jenkinson, F Stajano, M Spencer, C Warrington, ...
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
52014
Technology and Practice of Passwords: 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings
F Stajano, SF Mjølsnes, G Jenkinson, P Thorsheim
Springer, 2016
42016
Low-cost mitigation against cold boot attacks for an authentication token
I Goldberg, G Jenkinson, F Stajano
Applied Cryptography and Network Security: 14th International Conference …, 2016
22016
It's Better to Rust than to Wear Out
G Jenkinson
FreeBSD Journal, 2016
12016
It is time to standardize principles and practices for software memory safety
RNM Watson, J Baldwin, D Chisnall, T Chen, J Clarke, B Davis, N Filardo, ...
Communications of the ACM, 2025
2025
It is time to standardize principles and practices for software memory safety (extended version)
RNM Watson, J Baldwin, T Chen, D Chisnall, J Clarke, B Davis, ...
University of Cambridge, Computer Laboratory, 2025
2025
Deploying authentication in the wild: towards greater ecological validity in security usability studies
S Aebischer, C Dettoni, G Jenkinson, K Krol, D Llewellyn-Jones, T Masui, ...
Journal of Cybersecurity 6 (1), tyaa010, 2020
2020
The Process Model
G Jenkinson
2019
OpenDTrace Specification version 1.0
G Neville-Neil, J Anderson, G Jenkinson, B Kidney, D Stolfa, A Thomas, ...
University of Cambridge, Computer Laboratory, 2018
2018
Systém momentálne nemôže vykonať operáciu. Skúste to neskôr.
Články 1–20