Follow
Graeme Jenkinson
Title
Cited by
Cited by
Year
Single-phase switched reluctance motor design
JM Stephenson, GC Jenkinson
IEE Proceedings-Electric Power Applications 147 (2), 131-139, 2000
312000
Password-manager friendly (PMF): Semantic annotations to improve the effectiveness of password managers
F Stajano, M Spencer, G Jenkinson, Q Stafford-Fraser
International Conference on Passwords, 61-73, 2014
202014
Responsibility and tangible security: Towards a theory of user acceptance of security tokens
J Payne, G Jenkinson, F Stajano, MA Sasse, M Spencer
arXiv preprint arXiv:1605.03478, 2016
122016
Bootstrapping adoption of the pico password replacement system
F Stajano, G Jenkinson, J Payne, M Spencer, Q Stafford-Fraser, ...
Cambridge International Workshop on Security Protocols, 172-186, 2014
122014
Pico in the wild: Replacing passwords, one site at a time
S Aebischer, C Dettoni, G Jenkinson, K Krol, D Llewellyn-Jones, T Masui, ...
Internet Society, 2017
102017
Applying Provenance in {APT} Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance
G Jenkinson, L Carata, T Bytheway, R Sohan, RNM Watson, J Anderson, ...
9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017
92017
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions
B Glass, G Jenkinson, Y Liu, MA Sasse, F Stajano
arXiv preprint arXiv:1607.03417, 2016
92016
Starting of a single-phase switched reluctance motor
GC Jenkinson, JM Stephenson
IET Digital Library, 1999
91999
Pico without public keys
F Stajano, B Christianson, M Lomas, G Jenkinson, J Payne, M Spencer, ...
Cambridge International Workshop on Security Protocols, 195-211, 2015
72015
I bought a new security token and all I got was this lousy phish—Relay attacks on visual code authentication schemes
G Jenkinson, M Spencer, C Warrington, F Stajano
72014
Applying provenance in APT monitoring and analysis
G Jenkinson, L Carata, N Balakrishnan, T Bytheway, R Sohan, R Watson, ...
Proc. USENIX Workshop Theory Practice Provenance, 16-16, 2017
52017
To have and have not: variations on secret sharing to model user presence
Q Staford-Fraser, G Jenkinson, F Stajano, M Spencer, C Warrington, ...
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
52014
Technology and Practice of Passwords
F Stajano, G Jenkinson, P Thorsheim
Springer international publishing, 2016
32016
Low-cost mitigation against cold boot attacks for an authentication token
I Goldberg, G Jenkinson, F Stajano
International Conference on Applied Cryptography and Network Security, 36-57, 2016
22016
Deploying authentication in the wild: towards greater ecological validity in security usability studies
S Aebischer, C Dettoni, G Jenkinson, K Krol, D Llewellyn-Jones, T Masui, ...
Journal of Cybersecurity 6 (1), tyaa010, 2020
2020
The Process Model
G Jenkinson
2019
OpenDTrace Specification version 1.0
G Neville-Neil, J Anderson, G Jenkinson, B Kidney, D Stolfa, A Thomas, ...
University of Cambridge, Computer Laboratory, 2018
2018
It's Better to Rust than to Wear Out
G Jenkinson
FreeBSD Journal, 2016
2016
L41: Lab 3 Micro-architectural implications of IPC
G Jenkinson
2016
Red Button and Yellow Button: Usable Security for Lost Security Tokens
I Goldberg, G Jenkinson, D Llewellyn-Jones, F Stajano
Cambridge International Workshop on Security Protocols, 165-171, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20