关注
Paul C. van Oorschot
Paul C. van Oorschot
Professor of Computer Science, Carleton University, Canada
在 scs.carleton.ca 的电子邮件经过验证 - 首页
标题
引用次数
年份
"Sign in with ...Privacy": Timely disclosure of privacy differences among web SSO login options
SG Morkonda, S Chiasson, PC van Oorschot
preprint arXiv:2209.04490, 2023
3*2023
(Chapter 14) Coding Theory and Cryptology
AJ Menezes, PC van Oorschot
Handbook of Discrete and Combinatorial Mathematics, pp.889-954, 1999
31999
A close look at a systematic method for analyzing sets of security advice
D Barrera, C Bellman, PC van Oorschot
Journal of Cybersecurity 9 (1), 1-15, 2023
22023
A comparison of practical public-key cryptosystems based on integer factorization and discrete logarithms
P van Oorschot
Advances in Cryptology-CRYPTO’90, 577-581, 1991
451991
A control point for reducing root abuse of file-system privileges
G Wurster, PC van Oorschot
ACM CCS 2010: Proc. 17th ACM Conference on Computer and Communications …, 2010
142010
A Discussion on Security Education in Academia
K Butler, RK Cunningham, PC van Oorschot, R Safavi-Naini, A Matrawy, ...
ACM CCS 2018: Proc. of the ACM Conference on Computer and Communications …, 2018
12018
A generic attack on checksumming-based software tamper resistance
G Wurster, PC van Oorschot, A Somayaji
IEEE Symp. on Security and Privacy (Oakland 2005), 127-138, 2005
1562005
A geometric approach to root finding in GF (q^m)
PC van Oorschot, SA Vanstone
IEEE Trans. on Information Theory, 35 (2), 444-453, 1989
431989
A known-plaintext attack on two-key triple encryption
P van Oorschot, M Wiener
Eurocrypt’90: Advances in Cryptology, 318-325, 1990
1451990
A methodology for empirical analysis of permission-based security models and its application to Android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
ACM CCS 2010: Conf. on Computer and Communications Security, 73-84, 2010
7252010
A monitoring system for detecting repeated packets with applications to computer worms
PC van Oorschot, JM Robert, MV Martin
International Journal of Information Security 5 (3), 186-199, 2006
222006
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation
K Bicakci, PC van Oorschot
New Security Paradigms Workshop (2011), Proceedings of, 2011
242011
A protocol for secure public instant messaging
M Mannan, P van Oorschot
FC 2006: Financial Cryptography and Data Security, 20-35, 2006
32*2006
A research agenda acknowledging the persistence of passwords
C Herley, PC van Oorschot
IEEE Security & Privacy 10 (1), 28-36, 2012
3862012
A second look at the usability of click-based graphical passwords
S Chiasson, R Biddle, PC van Oorschot
SOUPS 2007: Third Symp. on Usable Privacy and Security, 1-12, 2007
2672007
A selective introduction to border gateway protocol (BGP) security issues
T Wan, PC van Oorschot, E Kranakis
Proc. NATO Advanced Studies Institute On Network Security and Intrusion …, 2005
182005
A survey and analysis of TLS interception mechanisms and motivations
X de Carné de Carnavalet, PC van Oorschot
ACM Computing Surveys 55 (13s), 269:1-269:40, 2023
15*2023
A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability
M Mohamed, N Sachdeva, M Georgescu, S Gao, N Saxena, C Zhang, ...
ACM AsiaCCS'14: 9th ACM Symp. on Information, Computer and Communications …, 2014
762014
A unified cryptographic protocol logic
P Syverson, PC van Oorschot
Report 5540-227, Center for High Assurance Computer Systems, Naval Research Lab, 1996
1381996
A usability study and critique of two password managers
S Chiasson, PC van Oorschot, R Biddle
USENIX Security 2006: 15th USENIX Security Symposium, 1-16, 2006
3532006
系统目前无法执行此操作,请稍后再试。
文章 1–20