Dr Joseph Maguire

  • Lecturer (Computing Science)

telephone: 01413308536
email: Joseph.Maguire@glasgow.ac.uk

Research interests

Personal website: www.josephmaguire.co.uk

Selected publications

Gutmann, A., Renaud, K., Maguire, J. , Mayer, P., Volkamer, M., Matsuura, K. and Muller-Quade, J. (2016) ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology. In: 1st IEEE European Symposium on Security and Privacy, Saarbrucken, Germany, 21-24 Mar 2016, pp. 357-371. ISBN 9781509017515 (doi:10.1109/EuroSP.2016.35)

Renaud, K. and Maguire, J. (2015) Regulating Access to Adult Content (with Privacy Preservation). In: CHI 2015, Seoul, Korea, 18-23 Apr 2015, pp. 4019-4028. ISBN 9781450331456 (doi:10.1145/2702123.2702456)

All publications

List by: Type | Date

Jump to: 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2009 | 2008 | 2007
Number of items: 14.

2016

Gutmann, A., Renaud, K., Maguire, J. , Mayer, P., Volkamer, M., Matsuura, K. and Muller-Quade, J. (2016) ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology. In: 1st IEEE European Symposium on Security and Privacy, Saarbrucken, Germany, 21-24 Mar 2016, pp. 357-371. ISBN 9781509017515 (doi:10.1109/EuroSP.2016.35)

2015

Maguire, J. and Renaud, K. (2015) Alternative Authentication in the Wild. In: 5th Annual Workshop on Socio-Technical Aspects in Security and Trust, co-located with the 28th IEEE Computer Security Foundations Symposium, Verona, Italy, 13-17 Jul 2015, pp. 32-39. (doi:10.1109/STAST.2015.13)

Renaud, K. and Maguire, J. (2015) Regulating Access to Adult Content (with Privacy Preservation). In: CHI 2015, Seoul, Korea, 18-23 Apr 2015, pp. 4019-4028. ISBN 9781450331456 (doi:10.1145/2702123.2702456)

2014

Renaud, K., Maguire, J. , van Niekerk, J. and Kennes, D. (2014) Contemplating Skill-Based Authentication. Africa Research Journal, 105(2), pp. 48-60.

Renaud, K., Volkamer, M. and Maguire, J. (2014) ACCESS: Describing and Contrasting Authentication Mechanisms. In: Human Aspects of Information Security, Privacy, and Trust, Crete, Greece, 22 - 27 Jun 2014, pp. 183-194. ISBN 9783319076195 (doi:10.1007/978-3-319-07620-1_17)

2013

Renaud, K., Kennes, D., van Niekerk, J. and Maguire, J. (2013) SNIPPET: Genuine Knowledge-Based Authentication. In: 12th Annual Conference on Information Security South Africa, Johannesburg, South Africa, 14-16 Aug 2013, pp. 1-8. (doi:10.1109/ISSA.2013.6641059)

Renaud, K. and Maguire, J. (2013) Shrinking the Authentication Footprint. In: Seventh International Symposium on Human Aspects of Information Security & Assurance, Lisbon, Portugal, 8-9 May 2013, pp. 2-11. ISBN 9781841023458

Maguire, J. and Renaud, K. (2013) How Do You Solve A Problem Like Authentication? Human Factors in the Safety and Security of Critical Systems, University of Glasgow, UK, 18 Mar 2013.

Renaud, K., Mayer, P., Volkamer, M. and Maguire, J. (2013) Are Graphical Authentication Mechanisms as Strong as Passwords? In: Federated Conference on Computer Science and Information Systems, Kraków, Poland, 8-11 Sep 2013, pp. 837-844.

2012

Renaud, K. and Maguire, J. (2012) You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing. In: HCI 2012 People and Computers XXVI, Birmingham, UK, 12-14 Sept 2012,

2011

Maguire, J. and Renaud, K. (2011) An Alternative Avatar. British HCI 2011 Health, Wealth and Happiness, Newcastle, UK, 4-8 Jul 2011.

2009

Renaud, K. and Maguire, J. (2009) Armchair authentication. In: The 23rd British BCS Human Computer Interaction Group Annual Conference on People and Computers: Celebrating People and Technology, Cambridge, UK, 1-5 Sep 2009, pp. 388-397.

2008

Maguire, J. , Stuart, S. and Draper, S. (2008) Student Generated Podcasts: Learning to Cascade Rather than Create. In: Learners in the Co-Creation of Knowledge, Edinburgh, UK, 30 Oct 2008,

2007

Draper, S. W. and Maguire, J. (2007) Exploring podcasting as part of campus-based teaching. Practice and Evidence of Scholarship of Teaching and Learning in Higher Education, 2(1), pp. 43-65.

This list was generated on Sun Oct 22 08:36:02 2017 BST.
Number of items: 14.

Articles

Renaud, K., Maguire, J. , van Niekerk, J. and Kennes, D. (2014) Contemplating Skill-Based Authentication. Africa Research Journal, 105(2), pp. 48-60.

Draper, S. W. and Maguire, J. (2007) Exploring podcasting as part of campus-based teaching. Practice and Evidence of Scholarship of Teaching and Learning in Higher Education, 2(1), pp. 43-65.

Conference or Workshop Item

Maguire, J. and Renaud, K. (2013) How Do You Solve A Problem Like Authentication? Human Factors in the Safety and Security of Critical Systems, University of Glasgow, UK, 18 Mar 2013.

Maguire, J. and Renaud, K. (2011) An Alternative Avatar. British HCI 2011 Health, Wealth and Happiness, Newcastle, UK, 4-8 Jul 2011.

Conference Proceedings

Gutmann, A., Renaud, K., Maguire, J. , Mayer, P., Volkamer, M., Matsuura, K. and Muller-Quade, J. (2016) ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology. In: 1st IEEE European Symposium on Security and Privacy, Saarbrucken, Germany, 21-24 Mar 2016, pp. 357-371. ISBN 9781509017515 (doi:10.1109/EuroSP.2016.35)

Maguire, J. and Renaud, K. (2015) Alternative Authentication in the Wild. In: 5th Annual Workshop on Socio-Technical Aspects in Security and Trust, co-located with the 28th IEEE Computer Security Foundations Symposium, Verona, Italy, 13-17 Jul 2015, pp. 32-39. (doi:10.1109/STAST.2015.13)

Renaud, K. and Maguire, J. (2015) Regulating Access to Adult Content (with Privacy Preservation). In: CHI 2015, Seoul, Korea, 18-23 Apr 2015, pp. 4019-4028. ISBN 9781450331456 (doi:10.1145/2702123.2702456)

Renaud, K., Volkamer, M. and Maguire, J. (2014) ACCESS: Describing and Contrasting Authentication Mechanisms. In: Human Aspects of Information Security, Privacy, and Trust, Crete, Greece, 22 - 27 Jun 2014, pp. 183-194. ISBN 9783319076195 (doi:10.1007/978-3-319-07620-1_17)

Renaud, K., Kennes, D., van Niekerk, J. and Maguire, J. (2013) SNIPPET: Genuine Knowledge-Based Authentication. In: 12th Annual Conference on Information Security South Africa, Johannesburg, South Africa, 14-16 Aug 2013, pp. 1-8. (doi:10.1109/ISSA.2013.6641059)

Renaud, K. and Maguire, J. (2013) Shrinking the Authentication Footprint. In: Seventh International Symposium on Human Aspects of Information Security & Assurance, Lisbon, Portugal, 8-9 May 2013, pp. 2-11. ISBN 9781841023458

Renaud, K., Mayer, P., Volkamer, M. and Maguire, J. (2013) Are Graphical Authentication Mechanisms as Strong as Passwords? In: Federated Conference on Computer Science and Information Systems, Kraków, Poland, 8-11 Sep 2013, pp. 837-844.

Renaud, K. and Maguire, J. (2012) You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing. In: HCI 2012 People and Computers XXVI, Birmingham, UK, 12-14 Sept 2012,

Renaud, K. and Maguire, J. (2009) Armchair authentication. In: The 23rd British BCS Human Computer Interaction Group Annual Conference on People and Computers: Celebrating People and Technology, Cambridge, UK, 1-5 Sep 2009, pp. 388-397.

Maguire, J. , Stuart, S. and Draper, S. (2008) Student Generated Podcasts: Learning to Cascade Rather than Create. In: Learners in the Co-Creation of Knowledge, Edinburgh, UK, 30 Oct 2008,

This list was generated on Sun Oct 22 08:36:02 2017 BST.