Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Paul C. van
    Last name: Oorschot
    DBLP: o/PCvOorschot
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 136  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Leah Zhang-Kennedy, Sonia Chiasson, Paul C. van Oorschot.
    Revisiting password rules: facilitating human management of passwords.
    2016 APWG Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016 2016 (0) 2016
    Journal article
    AbdelRahman Abdou, Paul C. van Oorschot.
    Server Location Verification and Server Location Pinning: Augmenting TLS Authentication.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    Pushing on string: the 'don't care' region of password strength.
    Commun. ACM 2016, Volume 59 (0) 2016
    Journal article
    AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot.
    Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying.
    IEEE Communications Letters 2015, Volume 19 (0) 2015
    Conference paper
    Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot.
    An Empirical Evaluation of Security Indicators in Mobile Web Browsers.
    IEEE Trans. Mob. Comput. 2015, Volume 14 (0) 2015
    Conference paper
    AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot.
    Accurate One-Way Delay Estimation With Reduced Client Trustworthiness.
    IEEE Communications Letters 2015, Volume 19 (0) 2015
    Conference paper
    Gerardo Reynaga, Sonia Chiasson, Paul C. van Oorschot.
    Heuristics for the evaluation of captchas on smartphones.
    Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015 2015 (0) 2015
    Conference paper
    Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano.
    Passwords and the evolution of imperfect authentication.
    Commun. ACM 2015, Volume 58 (0) 2015
    Conference paper
    Sonia Chiasson, Paul C. van Oorschot.
    Quantifying the security advantage of password expiration policies.
    Des. Codes Cryptography 2015, Volume 77 (0) 2015
    Conference paper
    AbdelRahman Abdou, David Barrera, Paul C. van Oorschot.
    What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks.
    Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings 2016 (0) 2015
    Conference paper
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
    9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 2014 (0) 2014
    Conference paper
    David Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot.
    Baton: certificate agility for android's decentralized signing infrastructure.
    7th ACM Conference on Security Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014 2014 (0) 2014
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. 2014 (0) 2014
    Conference paper
    Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot.
    Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    An Administrator's Guide to Internet Password Research.
    28th Large Installation System Administration Conference, LISA '14, Seattle, WA, USA, November 9-14, 2014. 2014 (0) 2014
    Conference paper
    AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot.
    Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients.
    IEEE Conference on Communications and Network Security, CNS 2014, San Francisco, CA, USA, October 29-31, 2014 2014 (0) 2014
    Conference paper
    Mansour Alsaleh, Paul C. van Oorschot.
    Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors.
    Int. J. Inf. Sec. 2013, Volume 12 (0) 2013
    Conference paper
    Jeremy Clark, Paul C. van Oorschot.
    SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
    2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013 2013 (0) 2013
    Journal article
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Serge Egelman, Cormac Herley, Paul C. van Oorschot.
    Markets for zero-day exploits: ethics and implications.
    New Security Paradigms Workshop, NSPW '13, Banff, AB, Canada, September 9-12, 2013 2013 (0) 2013
    Conference paper
    Adam Skillen, David Barrera, Paul C. van Oorschot.
    Deadbolt: locking down android disk encryption.
    SPSM'13, Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013, November 8, 2013, Berlin, Germany 2013 (0) 2013
    Journal article
    Mansour Alsaleh, Mohammad Mannan, Paul C. van Oorschot.
    Revisiting Defenses against Large-Scale Online Password Guessing Attacks.
    IEEE Trans. Dependable Sec. Comput. 2012, Volume 9 (0) 2012
    Conference paper
    Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, Paul C. van Oorschot.
    Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
    IEEE Trans. Dependable Sec. Comput. 2012, Volume 9 (0) 2012
    Journal article
    Paul C. van Oorschot, Glenn Wurster.
    Reducing Unauthorized Modification of Digital Objects.
    IEEE Trans. Software Eng. 2012, Volume 38 (0) 2012
    Journal article
    Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul C. van Oorschot.
    The Future of Authentication.
    IEEE Security Privacy 2012, Volume 10 (0) 2012
    Show item 1 to 25 of 136  

    Your query returned 136 matches in the database.