QUT ePrints

Browse By Person: Radke, Kenneth

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 9.

Journal Article

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Bartlett, Harry (2014) CHURNs : freshness assurance for humans. The Computer Journal. (In Press)
Number of full-text downloads 8

Conference Paper

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, Manulis, Mark, & Stebila, Douglas (2014) Formalising human recognition : a fundamental building block for security proofs. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society Inc. , Auckland, New Zealand, pp. 37-45.
Number of full-text downloads 13

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, & Buys, Laurie (2013) “Who decides?” Security and privacy in the wild. In Calder, Paul & Shen, Haifeng (Eds.) Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration (OzCHI '13), Assocation for Computing Machinery (ACM), Flinders University, Adelaide, Australia, pp. 27-36.
Number of full-text downloads 47

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2012) Towards a secure human-and-computer mutual authentication protocol. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc, Melbourne, Vic., pp. 39-46.
Number of full-text downloads 90

Radke, Kenneth, Brereton, Margot, Mirisaee, Seyed Hadi, Ghelawat, Sunil, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Tensions in developing a secure collective information practice : the case of Agile Ridesharing. In 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011), 5-9 September 2011, Lisbon.
Number of full-text downloads 311

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.
Number of full-text downloads 115

Radke, Kenneth, Boyd, Colin, Margot, Brereton, & Gonzalez Nieto, Juan M. (2010) How HCI design influences web security decisions. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 48
Number of citations in Scopus 1

Ghelawat, Sunil, Radke, Kenneth, & Brereton, Margot (2010) Interaction, privacy and profiling considerations in local mobile social software : a prototype agile ride share system. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland, pp. 376-379.
Number of full-text downloads 122

QUT Thesis

Radke, Kenneth J. (2013) Security ceremonies : including humans in cryptographic protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 151

This list was generated on Sat Oct 18 10:18:27 2014 EST.