Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Paul C. van
    Last name: Oorschot
    DBLP: o/PCvOorschot
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 121  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
    9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 2014 (0) 2014
    Conference paper
    David Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot.
    Baton: certificate agility for android's decentralized signing infrastructure.
    7th ACM Conference on Security Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014 2014 (0) 2014
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. 2014 (0) 2014
    Conference paper
    Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot.
    Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Dinei A. F. Florêncio, Cormac Herley, Paul C. van Oorschot.
    An Administrator's Guide to Internet Password Research.
    28th Large Installation System Administration Conference, LISA '14, Seattle, WA, USA, November 9-14, 2014. 2014 (0) 2014
    Conference paper
    Mansour Alsaleh, Paul C. van Oorschot.
    Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors.
    Int. J. Inf. Sec. 2013, Volume 12 (0) 2013
    Conference paper
    Jeremy Clark, Paul C. van Oorschot.
    SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
    2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013 2013 (0) 2013
    Journal article
    Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen.
    Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Serge Egelman, Cormac Herley, Paul C. van Oorschot.
    Markets for zero-day exploits: ethics and implications.
    New Security Paradigms Workshop, NSPW '13, Banff, AB, Canada, September 9-12, 2013 2013 (0) 2013
    Conference paper
    Adam Skillen, David Barrera, Paul C. van Oorschot.
    Deadbolt: locking down android disk encryption.
    SPSM'13, Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013, November 8, 2013, Berlin, Germany 2013 (0) 2013
    Journal article
    Mansour Alsaleh, Mohammad Mannan, Paul C. van Oorschot.
    Revisiting Defenses against Large-Scale Online Password Guessing Attacks.
    IEEE Trans. Dependable Sec. Comput. 2012, Volume 9 (0) 2012
    Conference paper
    Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, Paul C. van Oorschot.
    Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
    IEEE Trans. Dependable Sec. Comput. 2012, Volume 9 (0) 2012
    Journal article
    Paul C. van Oorschot, Glenn Wurster.
    Reducing Unauthorized Modification of Digital Objects.
    IEEE Trans. Software Eng. 2012, Volume 38 (0) 2012
    Journal article
    Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul C. van Oorschot.
    The Future of Authentication.
    IEEE Security Privacy 2012, Volume 10 (0) 2012
    Conference paper
    Cormac Herley, Paul C. van Oorschot.
    A Research Agenda Acknowledging the Persistence of Passwords.
    IEEE Security Privacy 2012, Volume 10 (0) 2012
    Conference paper
    Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano.
    The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
    IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA 2012 (0) 2012
    Conference paper
    Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot.
    Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?
    Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Robert Biddle, Sonia Chiasson, Paul C. van Oorschot.
    Graphical passwords: Learning from the first twelve years.
    ACM Comput. Surv. 2012, Volume 44 (0) 2012
    Conference paper
    Mansour Alsaleh, Paul C. van Oorschot.
    Revisiting network scanning detection using sequential hypothesis testing.
    Security and Communication Networks 2012, Volume 5 (0) 2012
    Conference paper
    Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, Paul C. van Oorschot.
    Tapas: design, implementation, and usability evaluation of a password manager.
    28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012 2012 (0) 2012
    Conference paper
    David Barrera, Jeremy Clark, Daniel McCarney, Paul C. van Oorschot.
    Understanding and improving app installation security mechanisms through empirical analysis of android.
    SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2012, October 19, 2012, Raleigh, NC, USA 2012 (0) 2012
    Conference paper
    Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot.
    Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
    Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012 2012 (0) 2012
    Conference paper
    David Barrera, Paul C. van Oorschot.
    Secure Software Installation on Smartphones.
    IEEE Security Privacy 2011, Volume 9 (0) 2011
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    Leveraging personal devices for stronger password authentication from untrusted computers.
    Journal of Computer Security 2011, Volume 19 (0) 2011
    Conference paper
    Paul C. van Oorschot, Julie Thorpe.
    Exploiting predictability in click-based graphical passwords.
    Journal of Computer Security 2011, Volume 19 (0) 2011
    Conference paper
    Robert Biddle, Mohammad Mannan, Paul C. van Oorschot, Tara Whalen.
    User Study, Analysis, and Usable Security of Passwords Based on Digital Objects.
    IEEE Transactions on Information Forensics and Security 2011, Volume 6 (0) 2011
    Journal article
    David Barrera, Paul C. van Oorschot.
    Accommodating IPv6 Addresses in Security Visualization Tools.
    Information Visualization 2011, Volume 10 (0) 2011
    Conference paper
    Trent Jaeger, Paul C. van Oorschot, Glenn Wurster.
    Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification.
    Computers Security 2011, Volume 30 (0) 2011
    Conference paper
    Mansour Alsaleh, Paul C. van Oorschot.
    Network scan detection with LQS: a lightweight, quick and stateful algorithm.
    Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011 2011 (0) 2011
    Conference paper
    Mohammad Mannan, David Barrera, Carson D. Brown, David Lie, Paul C. van Oorschot.
    Mercury: Recovering Forgotten Passwords Using Personal Devices.
    Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Paul C. van Oorschot.
    Exploration and Field Study of a Password Manager Using Icon-Based Passwords.
    Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    Kemal Bicakci, Paul C. van Oorschot.
    A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation.
    2011 New Security Paradigms Workshop, NSPW '11, Marin County, CA, USA, September 12-15, 2011 2011 (0) 2011
    Journal article
    Paul C. van Oorschot, Amirali Salehi-Abari, Julie Thorpe.
    Purely automated attacks on passpoints-style graphical passwords.
    IEEE Transactions on Information Forensics and Security 2010, Volume 5 (0) 2010
    Conference paper
    David Barrera, Hilmi Günes Kayacik, Paul C. van Oorschot, Anil Somayaji.
    A methodology for empirical analysis of permission-based security models and its application to android.
    Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 2010 (0) 2010
    Conference paper
    Glenn Wurster, Paul C. van Oorschot.
    A control point for reducing root abuse of file-system privileges.
    Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 2010 (0) 2010
    Conference paper
    Elizabeth Stobert, Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle.
    Exploring usability effects of increasing security in click-based graphical passwords.
    Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010 2010 (0) 2010
    Conference paper
    Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen.
    Browser interfaces and extended validation SSL certificates: an empirical study.
    Proceedings of the first ACM Cloud Computing Security Workshop, CCSW 2009, Chicago, IL, USA, November 13, 2009 2009 (0) 2009
    Conference paper
    David Barrera, Paul C. van Oorschot.
    Security visualization tools and IPv6 addresses.
    6th International Workshop on Visualization for Cyber Security 2009, VizSec 2009, Atlantic City, New Jersey, USA, October 11, 2009 2009 (0) 2009
    Conference paper
    Sonia Chiasson, Alain Forget, Elizabeth Stobert, Paul C. van Oorschot, Robert Biddle.
    Multiple password interference in text passwords and click-based graphical passwords.
    Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 2009 (0) 2009
    Conference paper
    Cormac Herley, Paul C. van Oorschot, Andrew S. Patrick.
    Passwords: If We're So Smart, Why Are We Still Using Them?
    Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers 2009 (0) 2009
    Conference paper
    Paul C. van Oorschot, Tao Wan.
    TwoStep: An Authentication Method Combining Text and Graphical Passwords.
    E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings 2009 (0) 2009
    Conference paper
    James A. Muir, Paul C. van Oorschot.
    Internet geolocation: Evasion and counterevasion.
    ACM Comput. Surv. 2009, Volume 42 (0) 2009
    Conference paper
    Sonia Chiasson, Alain Forget, Robert Biddle, Paul C. van Oorschot.
    User interface design affects security: patterns in click-based graphical passwords.
    Int. J. Inf. Sec. 2009, Volume 8 (0) 2009
    Journal article
    Mohammad Mannan, Paul C. van Oorschot.
    Reducing threats from flawed security APIs: The banking PIN case.
    Computers Security 2009, Volume 28 (0) 2009
    Conference paper
    Glenn Wurster, Paul C. van Oorschot.
    The developer is the enemy.
    Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008 2008 (0) 2008
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    Localization of credential information to address increasingly inevitable data breaches.
    Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008 2008 (0) 2008
    Conference paper
    Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot.
    On Purely Automated Attacks and Click-Based Graphical Passwords.
    Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008 2008 (0) 2008
    Conference paper
    Mansour Alsaleh, David Barrera, Paul C. van Oorschot.
    Improving Security Visualization with Exposure Map Filtering.
    Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008 2008 (0) 2008
    Conference paper
    Sonia Chiasson, Alain Forget, Robert Biddle, Paul C. van Oorschot.
    Influencing users towards better passwords: persuasive cued click-points.
    Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction - Volume 1, BCS HCI 2008, Liverpool, United Kingdom, 1-5 September 2008 2008 (0) 2008
    Conference paper
    Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji.
    SOMA: mutual approval for included content in web pages.
    Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 2008 (0) 2008
    Conference paper
    Jennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick.
    Exploring User Reactions to New Browser Cues for Extended Validation Certificates.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    D. Nali, Paul C. van Oorschot.
    CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    Weighing Down "The Unbearable Lightness of PIN Cracking".
    Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers 2008 (0) 2008
    Conference paper
    Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji.
    Discovering Packet Structure through Lightweight Hierarchical Clustering.
    Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008 2008 (0) 2008
    Conference paper
    Sonia Chiasson, Jayakumar Srinivasan, Robert Biddle, Paul C. van Oorschot.
    Centered Discretization with Application to Graphical Passwords.
    Usability, Psychology, and Security, UPSEC'08, San Francisco, CA, USA, April 14, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle.
    Persuasion for Stronger Passwords: Motivation and Pilot Study.
    Persuasive Technology, Third International Conference, PERSUASIVE 2008, Oulu, Finland, June 4-6, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    Digital Objects as Passwords.
    3rd USENIX Workshop on Hot Topics in Security, HotSec'08, San Jose, CA, USA, July 29, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    Privacy-enhanced sharing of personal content on the web.
    Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008 2008 (0) 2008
    Conference paper
    Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle.
    Improving text passwords through persuasion.
    Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008 2008 (0) 2008
    Conference paper
    Paul C. van Oorschot, Julie Thorpe.
    On predictive models and user-drawn graphical passwords.
    ACM Trans. Inf. Syst. Secur. 2007, Volume 10 (0) 2008
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    Security and usability: the gap in real-world online banking.
    Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA - September 18-21, 2007 2007 (0) 2007
    Conference paper
    Deholo Nali, Paul C. van Oorschot, Andy Adler.
    VideoTicket: detecting identity fraud attempts via audiovisual certificates and signatures.
    Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA - September 18-21, 2007 2007 (0) 2007
    Conference paper
    Glenn Wurster, Paul C. van Oorschot.
    Self-Signed Executables: Restricting Replacement of Program Binaries by Malware.
    2nd USENIX Workshop on Hot Topics in Security, HotSec'07, Boston, MA, USA, August 7, 2007 2007 (0) 2007
    Conference paper
    Julie Thorpe, Paul C. van Oorschot.
    Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords.
    Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007 2007 (0) 2007
    Conference paper
    David Whyte, Paul C. van Oorschot, Evangelos Kranakis.
    Tracking Darkports for Network Defense.
    23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA 2007 (0) 2007
    Conference paper
    Sonia Chiasson, Paul C. van Oorschot, Robert Biddle.
    Graphical Password Authentication Using Cued Click Points.
    Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.
    Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers 2008 (0) 2007
    Conference paper
    Sonia Chiasson, Robert Biddle, Paul C. van Oorschot.
    A second look at the usability of click-based graphical passwords.
    Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007 2007 (0) 2007
    Conference paper
    Jeremy Clark, Paul C. van Oorschot, Carlisle M. Adams.
    Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
    Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007 2007 (0) 2007
    Conference paper
    Paul C. van Oorschot, Tao Wan, Evangelos Kranakis.
    On interdomain routing security and pretty secure BGP (psBGP).
    ACM Trans. Inf. Syst. Secur. 2007, Volume 10 (0) 2007
    Conference paper
    Sonia Chiasson, Paul C. van Oorschot, Robert Biddle.
    A Usability Study and Critique of Two Password Managers.
    Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006 2006 (0) 2006
    Conference paper
    David Whyte, Paul C. van Oorschot, Evangelos Kranakis.
    Exposure Maps: Removing Reliance on Attribution During Scan Detection.
    1st USENIX Workshop on Hot Topics in Security, HotSec'06, Vancouver, BC, Canada, July 31, 2006 2006 (0) 2006
    Conference paper
    David Whyte, Paul C. van Oorschot, Evangelos Kranakis.
    Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks.
    22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA 2006 (0) 2006
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    A Protocol for Secure Public Instant Messaging.
    Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers 2006 (0) 2006
    Conference paper
    Tao Wan, Paul C. van Oorschot.
    Analysis of BGP prefix origins during Google's May 2005 outage.
    20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece 2006 (0) 2006
    Conference paper
    Paul C. van Oorschot, Jean-Marc Robert, Miguel Vargas Martin.
    A monitoring system for detecting repeated packets with applications to computer worms.
    Int. J. Inf. Sec. 2006, Volume 5 (0) 2006
    Conference paper
    Paul C. van Oorschot, Stuart G. Stubblebine.
    On countering online dictionary attacks with login histories and humans-in-the-loop.
    ACM Trans. Inf. Syst. Secur. 2006, Volume 9 (0) 2006
    Journal article
    Julie Thorpe, Paul C. van Oorschot, Anil Somayaji.
    Pass-thoughts: Authenticating With Our Minds.
    IACR Cryptology ePrint Archive 2005, Volume 2005 (0) 2005
    Conference paper
    Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji.
    Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.
    Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov.
    Highlights from the 2005 New Security Paradigms Workshop.
    21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA 2005 (0) 2005
    Conference paper
    David Whyte, Paul C. van Oorschot, Evangelos Kranakis.
    Detecting Intra-enterprise Scanning Worms based on Address Resolution.
    21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA 2005 (0) 2005
    Conference paper
    Paul C. van Oorschot, Stuart G. Stubblebine.
    Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling.
    Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers 2005 (0) 2005
    Conference paper
    Tao Wan, Evangelos Kranakis, Paul C. van Oorschot.
    Pretty Secure BGP, psBGP.
    Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA 2005 (0) 2005
    Conference paper
    David Whyte, Evangelos Kranakis, Paul C. van Oorschot.
    DNS-based Detection of Scanning Worms in an Enterprise Network.
    Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA 2005 (0) 2005
    Conference paper
    Glenn Wurster, Paul C. van Oorschot, Anil Somayaji.
    A Generic Attack on Checksumming-Based Software Tamper Resistance.
    2005 IEEE Symposium on Security and Privacy (SP 2005), 8-11 May 2005, Oakland, CA, USA 2005 (0) 2005
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    On instant messaging worms, analysis and countermeasures.
    Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 2005 (0) 2005
    Conference paper
    Paul C. van Oorschot, Anil Somayaji, Glenn Wurster.
    Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance.
    IEEE Trans. Dependable Sec. Comput. 2005, Volume 2 (0) 2005
    Conference paper
    Tao Wan, Evangelos Kranakis, Paul C. van Oorschot.
    S-RIP: A Secure Distance Vector Routing Protocol.
    Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings 2004 (0) 2004
    Conference paper
    Julie Thorpe, Paul C. van Oorschot.
    Towards Secure Design Choices for Implementing Graphical Passwords.
    20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA 2004 (0) 2004
    Conference paper
    Stuart G. Stubblebine, Paul C. van Oorschot.
    Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract).
    Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers 2004 (0) 2004
    Conference paper
    Tao Wan, Evangelos Kranakis, Paul C. van Oorschot.
    Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV).
    Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings 2004 (0) 2004
    Conference paper
    Mohammad Mannan, Paul C. van Oorschot.
    Secure Public Instant Messaging.
    Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings 2004 (0) 2004
    Conference paper
    Julie Thorpe, Paul C. van Oorschot.
    Graphical Dictionaries and the Memorable Space of Graphical Passwords.
    Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA 2004 (0) 2004
    Conference paper
    Paul C. van Oorschot.
    Revisiting Software Protection.
    Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings 2003 (0) 2003
    Conference paper
    Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot.
    A White-Box DES Implementation for DRM Applications.
    Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers 2003 (0) 2002
    Conference paper
    Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot.
    White-Box Cryptography and an AES Implementation.
    Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers 2003 (0) 2002
    Conference paper
    Michael Smith, Paul C. van Oorschot, Michael Willett.
    Cryptographic Information Recovery Using Key Recover.
    Computers Security 2000, Volume 19 (0) 2000
    Conference paper
    Mike Just, Paul C. van Oorschot.
    Addressing the Problem of Undetected Signature Key Compromise.
    Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA 1999 (0) 1999
    Conference paper
    Paul C. van Oorschot, Michael J. Wiener.
    Parallel Collision Search with Cryptanalytic Applications.
    J. Cryptology 1999, Volume 12 (0) 1999
    Conference paper
    Bart Preneel, Paul C. van Oorschot.
    On the Security of Iterated Message Authentication Codes.
    IEEE Transactions on Information Theory 1999, Volume 45 (0) 1999
    Show item 1 to 100 of 121  

    Your query returned 121 matches in the database.