Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Paul C. van
    Last name: Oorschot
    DBLP: o/PCvOorschot
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 119  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
    9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 2014 (0) 2014
    Conference paper
    David Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot.
    Baton: certificate agility for android's decentralized signing infrastructure.
    7th ACM Conference on Security Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014 2014 (0) 2014
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. 2014 (0) 2014
    Conference paper
    Mansour Alsaleh, Paul C. van Oorschot.
    Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors.
    Int. J. Inf. Sec. 2013, Volume 12 (0) 2013
    Conference paper
    Jeremy Clark, Paul C. van Oorschot.
    SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
    2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013 2013 (0) 2013
    Journal article
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Serge Egelman, Cormac Herley, Paul C. van Oorschot.
    Markets for zero-day exploits: ethics and implications.
    New Security Paradigms Workshop, NSPW '13, Banff, AB, Canada, September 9-12, 2013 2013 (0) 2013
    Conference paper
    Adam Skillen, David Barrera, Paul C. van Oorschot.
    Deadbolt: locking down android disk encryption.
    SPSM'13, Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013, November 8, 2013, Berlin, Germany 2013 (0) 2013
    Journal article
    Mansour Alsaleh, Mohammad Mannan, Paul C. van Oorschot.
    Revisiting Defenses against Large-Scale Online Password Guessing Attacks.
    IEEE Trans. Dependable Sec. Comput. 2012, Volume 9 (0) 2012
    Conference paper
    Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, Paul C. van Oorschot.
    Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
    IEEE Trans. Dependable Sec. Comput. 2012, Volume 9 (0) 2012
    Journal article
    Paul C. van Oorschot, Glenn Wurster.
    Reducing Unauthorized Modification of Digital Objects.
    IEEE Trans. Software Eng. 2012, Volume 38 (0) 2012
    Journal article
    Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul C. van Oorschot.
    The Future of Authentication.
    IEEE Security Privacy 2012, Volume 10 (0) 2012
    Conference paper
    Cormac Herley, Paul C. van Oorschot.
    A Research Agenda Acknowledging the Persistence of Passwords.
    IEEE Security Privacy 2012, Volume 10 (0) 2012
    Conference paper
    Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano.
    The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
    IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA 2012 (0) 2012
    Conference paper
    Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot.
    Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?
    Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Robert Biddle, Sonia Chiasson, Paul C. van Oorschot.
    Graphical passwords: Learning from the first twelve years.
    ACM Comput. Surv. 2012, Volume 44 (0) 2012
    Conference paper
    Mansour Alsaleh, Paul C. van Oorschot.
    Revisiting network scanning detection using sequential hypothesis testing.
    Security and Communication Networks 2012, Volume 5 (0) 2012
    Conference paper
    Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, Paul C. van Oorschot.
    Tapas: design, implementation, and usability evaluation of a password manager.
    28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012 2012 (0) 2012
    Conference paper
    David Barrera, Jeremy Clark, Daniel McCarney, Paul C. van Oorschot.
    Understanding and improving app installation security mechanisms through empirical analysis of android.
    SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2012, October 19, 2012, Raleigh, NC, USA 2012 (0) 2012
    Conference paper
    Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot.
    Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
    Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012 2012 (0) 2012
    Conference paper
    David Barrera, Paul C. van Oorschot.
    Secure Software Installation on Smartphones.
    IEEE Security Privacy 2011, Volume 9 (0) 2011
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    Leveraging personal devices for stronger password authentication from untrusted computers.
    Journal of Computer Security 2011, Volume 19 (0) 2011
    Conference paper
    Paul C. van Oorschot, Julie Thorpe.
    Exploiting predictability in click-based graphical passwords.
    Journal of Computer Security 2011, Volume 19 (0) 2011
    Conference paper
    Robert Biddle, Mohammad Mannan, Paul C. van Oorschot, Tara Whalen.
    User Study, Analysis, and Usable Security of Passwords Based on Digital Objects.
    IEEE Transactions on Information Forensics and Security 2011, Volume 6 (0) 2011
    Journal article
    David Barrera, Paul C. van Oorschot.
    Accommodating IPv6 Addresses in Security Visualization Tools.
    Information Visualization 2011, Volume 10 (0) 2011
    Show item 1 to 25 of 119  

    Your query returned 119 matches in the database.