"Sign in with ...Privacy": Timely disclosure of privacy differences among web SSO login options SG Morkonda, S Chiasson, PC van Oorschot preprint arXiv:2209.04490, 2023 | 3* | 2023 |
(Chapter 14) Coding Theory and Cryptology AJ Menezes, PC van Oorschot Handbook of Discrete and Combinatorial Mathematics, pp.889-954, 1999 | 3 | 1999 |
A close look at a systematic method for analyzing sets of security advice D Barrera, C Bellman, PC van Oorschot Journal of Cybersecurity 9 (1), 1-15, 2023 | 2 | 2023 |
A comparison of practical public-key cryptosystems based on integer factorization and discrete logarithms P van Oorschot Advances in Cryptology-CRYPTO’90, 577-581, 1991 | 45 | 1991 |
A control point for reducing root abuse of file-system privileges G Wurster, PC van Oorschot ACM CCS 2010: Proc. 17th ACM Conference on Computer and Communications …, 2010 | 14 | 2010 |
A Discussion on Security Education in Academia K Butler, RK Cunningham, PC van Oorschot, R Safavi-Naini, A Matrawy, ... ACM CCS 2018: Proc. of the ACM Conference on Computer and Communications …, 2018 | 1 | 2018 |
A generic attack on checksumming-based software tamper resistance G Wurster, PC van Oorschot, A Somayaji IEEE Symp. on Security and Privacy (Oakland 2005), 127-138, 2005 | 156 | 2005 |
A geometric approach to root finding in GF (q^m) PC van Oorschot, SA Vanstone IEEE Trans. on Information Theory, 35 (2), 444-453, 1989 | 43 | 1989 |
A known-plaintext attack on two-key triple encryption P van Oorschot, M Wiener Eurocrypt’90: Advances in Cryptology, 318-325, 1990 | 145 | 1990 |
A methodology for empirical analysis of permission-based security models and its application to Android D Barrera, HG Kayacik, PC van Oorschot, A Somayaji ACM CCS 2010: Conf. on Computer and Communications Security, 73-84, 2010 | 725 | 2010 |
A monitoring system for detecting repeated packets with applications to computer worms PC van Oorschot, JM Robert, MV Martin International Journal of Information Security 5 (3), 186-199, 2006 | 22 | 2006 |
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation K Bicakci, PC van Oorschot New Security Paradigms Workshop (2011), Proceedings of, 2011 | 24 | 2011 |
A protocol for secure public instant messaging M Mannan, P van Oorschot FC 2006: Financial Cryptography and Data Security, 20-35, 2006 | 32* | 2006 |
A research agenda acknowledging the persistence of passwords C Herley, PC van Oorschot IEEE Security & Privacy 10 (1), 28-36, 2012 | 386 | 2012 |
A second look at the usability of click-based graphical passwords S Chiasson, R Biddle, PC van Oorschot SOUPS 2007: Third Symp. on Usable Privacy and Security, 1-12, 2007 | 267 | 2007 |
A selective introduction to border gateway protocol (BGP) security issues T Wan, PC van Oorschot, E Kranakis Proc. NATO Advanced Studies Institute On Network Security and Intrusion …, 2005 | 18 | 2005 |
A survey and analysis of TLS interception mechanisms and motivations X de Carné de Carnavalet, PC van Oorschot ACM Computing Surveys 55 (13s), 269:1-269:40, 2023 | 15* | 2023 |
A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability M Mohamed, N Sachdeva, M Georgescu, S Gao, N Saxena, C Zhang, ... ACM AsiaCCS'14: 9th ACM Symp. on Information, Computer and Communications …, 2014 | 76 | 2014 |
A unified cryptographic protocol logic P Syverson, PC van Oorschot Report 5540-227, Center for High Assurance Computer Systems, Naval Research Lab, 1996 | 138 | 1996 |
A usability study and critique of two password managers S Chiasson, PC van Oorschot, R Biddle USENIX Security 2006: 15th USENIX Security Symposium, 1-16, 2006 | 353 | 2006 |