Paul C. van Oorschot
Paul C. van Oorschot
Professor of Computer Science, Carleton University, Canada
scs.carleton.ca üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Handbook of Applied Cryptography
AJ Menezes, PC van Oorschot, SA Vanstone
CRC Press, 1996
20844*1996
Authentication and authenticated key exchanges
W Diffie, PC van Oorschot, MJ Wiener
Designs, Codes and Cryptography 2 (2), 107-125, 1992
15151992
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC van Oorschot, F Stajano
IEEE Symp. on Security and Privacy (Oakland 2012), 2012
8982012
Graphical passwords: Learning from the first twelve years
R Biddle, S Chiasson, PC van Oorschot
ACM Computing Surveys 44 (4), 19:1-41, 2012
7892012
Parallel collision search with cryptanalytic applications
PC van Oorschot, MJ Wiener
Journal of Cryptology 12 (1), 1-28, 1999
7081999
A methodology for empirical analysis of permission-based security models and its application to Android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
ACM CCS 2010: Proc. 17th ACM Conference on Computer and Communications …, 2010
6182010
On unifying some cryptographic protocol logics
PF Syverson, PC van Oorschot
IEEE Symp. on Security and Privacy (Oakland 1994), 14-28, 1994
4881994
White-box cryptography and an AES implementation
S Chow, P Eisen, H Johnson, P van Oorschot
Selected Areas in Cryptography (SAC 2003), 250-270, 2003
4662003
Graphical password authentication using cued click points
S Chiasson, P van Oorschot, R Biddle
Computer Security–ESORICS 2007, 359-374, 2007
4312007
A white-box DES implementation for DRM applications
S Chow, P Eisen, H Johnson, P van Oorschot
ACM CCS Workshop on Digital Rights Management, 1-15, 2003
3692003
MDx-MAC and building fast MACs from hash functions
B Preneel, P van Oorschot
Advances in Cryptology—CRYPTO’95, 1-14, 1995
3571995
A usability study and critique of two password managers
S Chiasson, PC van Oorschot, R Biddle
USENIX Security 2006: Proc. 15th USENIX Security Symposium, 1-16, 2006
2872006
A research agenda acknowledging the persistence of passwords
C Herley, PC van Oorschot
IEEE Security & Privacy 10 (1), 28-36, 2012
2842012
Human-seeded attacks and exploiting hot-spots in graphical passwords
J Thorpe, PC van Oorschot
USENIX Security 2007: Proc. 16th USENIX Security Symposium, 2007
2782007
Computer network security system and method having unilateral enforceable security policy provision
M Brownlie, S Hillier, PC Van Oorschot
US Patent 6,202,157, 2001
2642001
Multiple password interference in text and click-based graphical passwords
S Chiasson, A Forget, E Stobert, P Van Oorschot, R Biddle
ACM Computer and Communications Security (CCS) 11, 2009
258*2009
Method and apparatus for extending secure communication operations via a shared list
JA Turnbull, IH Curry, PC Van Oorschot, SW Hillier
US Patent 6,092,201, 2000
2582000
An introduction to error correcting codes with applications
SA Vanstone, PC van Oorschot
Kluwer Academic Publishers, 1989
256*1989
Influencing users towards better passwords: persuasive cued click-points
S Chiasson, A Forget, R Biddle, PC van Oorschot
BCS-HCI 2008: Proc. 22nd British HCI Group Annual Conference on People and …, 2008
2482008
A second look at the usability of click-based graphical passwords
S Chiasson, R Biddle, PC van Oorschot
SOUPS 2007: Proc. 3rd Symposium on Usable Privacy and Security, 1-12, 2007
2482007
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20