Home > Research > Researchers > Dr Jeff Yan > Publications

Dr Jeff Yan

Formerly at Lancaster University

  1. Published

    Enhancing collaborative spam detection with bloom filters

    Yan, J. & Cho, P. L., 2006, Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual. IEEE, p. 414-428 15 p. 4041186

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Enhancing sensor pattern noise for source camera identification: an empirical evaluation

    Liu, B., Wei, X. & Yan, J., 06/2015, IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, p. 85-90 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Failures of security APIs: a new case

    Algwil, A. & Yan, J., 23/02/2016, Financial Cryptography and Data Security: 2016 Proceedings. New York: Springer, 17 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Graphical passwords and qualitative spatial relations

    Lin, D., Dunphy, P., Olivier, P. & Yan, J., 2007, SOUPS '07 Proceedings of the 3rd symposium on Usable privacy and security. New York: ACM, p. 161-162 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Is FacePIN secure and usable?

    Dunphy, P. & Yan, J., 2007, SOUPS '07 Proceedings of the 3rd Symposium on Usable Privacy and Security. New York: ACM, p. 165-166 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Machiavelli as a poker mate: a naturalistic behavioural study on strategic deception

    Palomäki, J., Yan, J. & Laakasuo, M., 08/2016, In: Personality and Individual Differences. 98, p. 266-271 6 p.

    Research output: Contribution to journalJournal articlepeer-review

  7. Published

    Magic Bullet: a dual-purpose computer game

    Yan, J. & Yu, S., 2009, HCOMP '09 Proceedings of the ACM SIGKDD Workshop on Human Computation. New York: ACM, p. 32-33 2 p. 1600161

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Password memorability and security: empirical results

    Yan, J., Alan, B., Anderson, R. & Grant, A., 2004, In: IEEE Security and Privacy Magazine. 2, 5, p. 25-31 7 p.

    Research output: Contribution to journalJournal articlepeer-review

  9. Published

    Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Security design in human computation games

    Yu, S. Y. & Yan, J., 2014, Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 142-153 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top