Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Paul C. van
    Last name: Oorschot
    DBLP: o/PCvOorschot
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 134  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Leah Zhang-Kennedy, Sonia Chiasson, Paul C. van Oorschot.
    Revisiting password rules: facilitating human management of passwords.
    2016 APWG Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016 2016 (0) 2016
    Journal article
    AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot.
    Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying.
    IEEE Communications Letters 2015, Volume 19 (0) 2015
    Conference paper
    Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot.
    An Empirical Evaluation of Security Indicators in Mobile Web Browsers.
    IEEE Trans. Mob. Comput. 2015, Volume 14 (0) 2015
    Conference paper
    AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot.
    Accurate One-Way Delay Estimation With Reduced Client Trustworthiness.
    IEEE Communications Letters 2015, Volume 19 (0) 2015
    Conference paper
    Gerardo Reynaga, Sonia Chiasson, Paul C. van Oorschot.
    Heuristics for the evaluation of captchas on smartphones.
    Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015 2015 (0) 2015
    Conference paper
    Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano.
    Passwords and the evolution of imperfect authentication.
    Commun. ACM 2015, Volume 58 (0) 2015
    Conference paper
    Sonia Chiasson, Paul C. van Oorschot.
    Quantifying the security advantage of password expiration policies.
    Des. Codes Cryptography 2015, Volume 77 (0) 2015
    Conference paper
    AbdelRahman Abdou, David Barrera, Paul C. van Oorschot.
    What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks.
    Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings 2016 (0) 2015
    Conference paper
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
    9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 2014 (0) 2014
    Conference paper
    David Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot.
    Baton: certificate agility for android's decentralized signing infrastructure.
    7th ACM Conference on Security Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014 2014 (0) 2014
    Show item 1 to 10 of 134  

    Your query returned 134 matches in the database.