Side-channel attacks: A short tour F Piessens, PC van Oorschot IEEE Security & Privacy 22 (2), 75-80, 2024 | | 2024 |
Influences of displaying permission-related information on web single sign-on login decisions SG Morkonda, S Chiasson, PC van Oorschot Computers & Security (Apr. 2024), 2024 | | 2024 |
Owl: An augmented password-authenticated key exchange scheme F Hao, S Bag, L Chen, PC van Oorschot Financial Cryptography 2024 (Cryptology ePrint), 2024 | | 2024 |
"Sign in with ...Privacy": Timely disclosure of privacy differences among web SSO login options SG Morkonda, S Chiasson, PC van Oorschot preprint arXiv:2209.04490, 2023 | 3* | 2023 |
A survey and analysis of TLS interception mechanisms and motivations X de Carné de Carnavalet, PC van Oorschot ACM Computing Surveys 55 (13s), 269:1-269:40, 2023 | 15* | 2023 |
A close look at a systematic method for analyzing sets of security advice D Barrera, C Bellman, PC van Oorschot Journal of Cybersecurity 9 (1), 1-15, 2023 | 2 | 2023 |
Memory errors and memory safety: A look at Java and Rust PC van Oorschot IEEE Security & Privacy 21 (03), 62-68, 2023 | | 2023 |
Memory errors and memory safety: C as a case study PC van Oorschot IEEE Security & Privacy 21 (2), 70-76, 2023 | 2 | 2023 |
Security best practices: A critical analysis using IoT as a case study D Barrera, C Bellman, PC van Oorschot ACM TOPS/Trans. on Privacy and Security 26 (2), 13:1-13:30, 2023 | 20* | 2023 |
Systematic analysis and comparison of security advice as datasets C Bellman, PC van Oorschot Computers & Security Jan.2023 (2022 preprint arXiv:2206.09237), 2023 | 7 | 2023 |
Security as an artificial science, system administration, and tools PC van Oorschot IEEE Security & Privacy 20 (6), 74-78, 2022 | | 2022 |
Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the World PC van Oorschot Ch.2 in: Democratizing Cryptography: The Work of Whitfield Diffie and Martin …, 2022 | 2 | 2022 |
SoK: Password-authenticated key exchange - Theory, practice, standardization and real-world lessons F Hao, PC van Oorschot AsiaCCS 2022, 2022 | 25 | 2022 |
Cyber security education: Reinvention required PC van Oorschot Cyber Today Australia, 2022 (1):41-45, https://cybertoday.partica.online …, 2022 | | 2022 |
A view of security as 20 subject areas in four themes PC van Oorschot IEEE Security & Privacy 20 (1), 102-108, 2022 | 2 | 2022 |
Empirical analysis and privacy implications in OAuth-based single sign-on systems SG Morkonda, S Chiasson, PC van Oorschot WPES@CCS 2021 (20th ACM Workshop on Privacy in the Electronic Society), 195-208, 2021 | 18* | 2021 |
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin PC van Oorschot Springer book. Open version: https://people.scs.carleton.ca/~paulv …, 2021 | 90* | 2021 |
Coevolution of security’s Body of Knowledge and curricula PC van Oorschot IEEE Security & Privacy 19 (05), 83-89, 2021 | 3 | 2021 |
Toward unseating the unsafe C programming language PC van Oorschot IEEE Security & Privacy 19 (2), 4-6, 2021 | 1 | 2021 |
Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes AR Abdou, F Alaca, PC van Oorschot IEEE TDSC 18(2); earlier arXiv.org 1708.01706 (5-aug-2017), 2021 | 9* | 2021 |