Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Paul C. van
    Last name: Oorschot
    DBLP: o/PCvOorschot
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 128  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot.
    Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying.
    IEEE Communications Letters 2015, Volume 19 (0) 2015
    Conference paper
    Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot.
    An Empirical Evaluation of Security Indicators in Mobile Web Browsers.
    IEEE Trans. Mob. Comput. 2015, Volume 14 (0) 2015
    Conference paper
    AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot.
    Accurate One-Way Delay Estimation With Reduced Client Trustworthiness.
    IEEE Communications Letters 2015, Volume 19 (0) 2015
    Conference paper
    Gerardo Reynaga, Sonia Chiasson, Paul C. van Oorschot.
    Heuristics for the evaluation of captchas on smartphones.
    Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015 2015 (0) 2015
    Conference paper
    Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano.
    Passwords and the evolution of imperfect authentication.
    Commun. ACM 2015, Volume 58 (0) 2015
    Conference paper
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
    9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 2014 (0) 2014
    Conference paper
    David Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot.
    Baton: certificate agility for android's decentralized signing infrastructure.
    7th ACM Conference on Security Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014 2014 (0) 2014
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. 2014 (0) 2014
    Conference paper
    Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot.
    Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    An Administrator's Guide to Internet Password Research.
    28th Large Installation System Administration Conference, LISA '14, Seattle, WA, USA, November 9-14, 2014. 2014 (0) 2014
    Show item 1 to 10 of 128  

    Your query returned 128 matches in the database.