关注
Paul C. van Oorschot
Paul C. van Oorschot
Professor of Computer Science, Carleton University, Canada
在 scs.carleton.ca 的电子邮件经过验证 - 首页
标题
引用次数
年份
Side-channel attacks: A short tour
F Piessens, PC van Oorschot
IEEE Security & Privacy 22 (2), 75-80, 2024
2024
Influences of displaying permission-related information on web single sign-on login decisions
SG Morkonda, S Chiasson, PC van Oorschot
Computers & Security (Apr. 2024), 2024
2024
Owl: An augmented password-authenticated key exchange scheme
F Hao, S Bag, L Chen, PC van Oorschot
Financial Cryptography 2024 (Cryptology ePrint), 2024
2024
"Sign in with ...Privacy": Timely disclosure of privacy differences among web SSO login options
SG Morkonda, S Chiasson, PC van Oorschot
preprint arXiv:2209.04490, 2023
3*2023
A survey and analysis of TLS interception mechanisms and motivations
X de Carné de Carnavalet, PC van Oorschot
ACM Computing Surveys 55 (13s), 269:1-269:40, 2023
15*2023
A close look at a systematic method for analyzing sets of security advice
D Barrera, C Bellman, PC van Oorschot
Journal of Cybersecurity 9 (1), 1-15, 2023
22023
Memory errors and memory safety: A look at Java and Rust
PC van Oorschot
IEEE Security & Privacy 21 (03), 62-68, 2023
2023
Memory errors and memory safety: C as a case study
PC van Oorschot
IEEE Security & Privacy 21 (2), 70-76, 2023
22023
Security best practices: A critical analysis using IoT as a case study
D Barrera, C Bellman, PC van Oorschot
ACM TOPS/Trans. on Privacy and Security 26 (2), 13:1-13:30, 2023
20*2023
Systematic analysis and comparison of security advice as datasets
C Bellman, PC van Oorschot
Computers & Security Jan.2023 (2022 preprint arXiv:2206.09237), 2023
72023
Security as an artificial science, system administration, and tools
PC van Oorschot
IEEE Security & Privacy 20 (6), 74-78, 2022
2022
Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the World
PC van Oorschot
Ch.2 in: Democratizing Cryptography: The Work of Whitfield Diffie and Martin …, 2022
22022
SoK: Password-authenticated key exchange - Theory, practice, standardization and real-world lessons
F Hao, PC van Oorschot
AsiaCCS 2022, 2022
252022
Cyber security education: Reinvention required
PC van Oorschot
Cyber Today Australia, 2022 (1):41-45, https://cybertoday.partica.online …, 2022
2022
A view of security as 20 subject areas in four themes
PC van Oorschot
IEEE Security & Privacy 20 (1), 102-108, 2022
22022
Empirical analysis and privacy implications in OAuth-based single sign-on systems
SG Morkonda, S Chiasson, PC van Oorschot
WPES@CCS 2021 (20th ACM Workshop on Privacy in the Electronic Society), 195-208, 2021
18*2021
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin
PC van Oorschot
Springer book. Open version: https://people.scs.carleton.ca/~paulv …, 2021
90*2021
Coevolution of security’s Body of Knowledge and curricula
PC van Oorschot
IEEE Security & Privacy 19 (05), 83-89, 2021
32021
Toward unseating the unsafe C programming language
PC van Oorschot
IEEE Security & Privacy 19 (2), 4-6, 2021
12021
Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes
AR Abdou, F Alaca, PC van Oorschot
IEEE TDSC 18(2); earlier arXiv.org 1708.01706 (5-aug-2017), 2021
9*2021
系统目前无法执行此操作,请稍后再试。
文章 1–20