Wavelets and filter banks: Theory and design M Vetterli, C Herley IEEE transactions on signal processing 40 (9), 2207-2232, 1992 | 2841 | 1992 |
A large-scale study of web password habits D Florencio, C Herley Proceedings of the 16th international conference on World Wide Web, 657-666, 2007 | 1562 | 2007 |
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes J Bonneau, C Herley, PC Van Oorschot, F Stajano 2012 IEEE symposium on security and privacy, 553-567, 2012 | 1404 | 2012 |
So long, and no thanks for the externalities: the rational rejection of security advice by users C Herley Proceedings of the 2009 workshop on New security paradigms workshop, 133-144, 2009 | 768 | 2009 |
Analyzing and improving a bittorrent networks performance mechanisms AR Bharambe, C Herley, VN Padmanabhan Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006 | 638 | 2006 |
A research agenda acknowledging the persistence of passwords C Herley, P Van Oorschot IEEE Security & privacy 10 (1), 28-36, 2011 | 386 | 2011 |
Spyware detection mechanism CE Herley, BW Keogh, AM Hulett, AM Marinescu, JS Williams, S Nurilov US Patent 9,021,590, 2015 | 357 | 2015 |
Wavelets and recursive filter banks C Herley, M Vetterli IEEE Transactions on Signal Processing 41 (8), 2536-2556, 1993 | 356 | 1993 |
Do strong web passwords accomplish anything? D Florêncio, C Herley, B Coskun HotSec 7 (6), 159, 2007 | 353* | 2007 |
Passwords and the evolution of imperfect authentication J Bonneau, C Herley, PC Van Oorschot, F Stajano Communications of the ACM 58 (7), 78-87, 2015 | 352 | 2015 |
Tilings of the time-frequency plane: Construction of arbitrary orthogonal bases and fast tiling algorithms C Herley, J Kovacevic, K Ramchandran, M Vetterli IEEE Transactions on Signal Processing 41 (12), 3341-3359, 1993 | 346 | 1993 |
Does my password go up to eleven? The impact of password meters on password selection S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013 | 298 | 2013 |
System and method for identifying and segmenting repeating media objects embedded in a stream C Herley US Patent 6,766,523, 2004 | 298 | 2004 |
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy C Herley, D Florêncio Economics of information security and privacy, 33-53, 2010 | 254 | 2010 |
Methods and apparatus for populating electronic forms from scanned documents KH Chellapilla, CE Herley, TT Kristjansson, PA Viola US Patent 7,305,129, 2007 | 241 | 2007 |
An {Administrator’s} Guide to Internet Password Research D Florêncio, C Herley, PC Van Oorschot 28th large installation system administration conference (LISA14), 44-61, 2014 | 236 | 2014 |
Wavelets, subband coding, and best bases K Ramchandran, M Vetterli, C Herley Proceedings of the IEEE 84 (4), 541-560, 1996 | 231 | 1996 |
Analyzing and improving BitTorrent performance AR Bharambe, C Herley, VN Padmanabhan Microsoft Research, Microsoft Corporation One Microsoft Way Redmond, WA …, 2005 | 230 | 2005 |
Using production grammars in software testing EG Sirer, BN Bershad ACM SIGPLAN Notices 35 (1), 1-13, 1999 | 222 | 1999 |
System and method for providing user control over repeating objects embedded in a stream C Herley US Patent 7,653,921, 2010 | 216 | 2010 |