Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Paul C. van
    Last name: Oorschot
    DBLP: o/PCvOorschot
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 121  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
    9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 2014 (0) 2014
    Conference paper
    David Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot.
    Baton: certificate agility for android's decentralized signing infrastructure.
    7th ACM Conference on Security Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014 2014 (0) 2014
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. 2014 (0) 2014
    Conference paper
    Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot.
    Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    An Administrator's Guide to Internet Password Research.
    28th Large Installation System Administration Conference, LISA '14, Seattle, WA, USA, November 9-14, 2014. 2014 (0) 2014
    Conference paper
    Mansour Alsaleh, Paul C. van Oorschot.
    Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors.
    Int. J. Inf. Sec. 2013, Volume 12 (0) 2013
    Conference paper
    Jeremy Clark, Paul C. van Oorschot.
    SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
    2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013 2013 (0) 2013
    Journal article
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Serge Egelman, Cormac Herley, Paul C. van Oorschot.
    Markets for zero-day exploits: ethics and implications.
    New Security Paradigms Workshop, NSPW '13, Banff, AB, Canada, September 9-12, 2013 2013 (0) 2013
    Conference paper
    Adam Skillen, David Barrera, Paul C. van Oorschot.
    Deadbolt: locking down android disk encryption.
    SPSM'13, Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013, November 8, 2013, Berlin, Germany 2013 (0) 2013
    Show item 1 to 10 of 121  

    Your query returned 121 matches in the database.