Using a personal device to strengthen password authentication from an untrusted computer M Mannan, PC Van Oorschot International Conference on Financial Cryptography and Data Security, 88-103, 2007 | 196 | 2007 |
From Very Weak to Very Strong: Analyzing Password-Strength Meters XDC De Carnavalet, M Mannan NDSS 14, 23-26, 2014 | 189* | 2014 |
Security and usability: the gap in real-world online banking M Mannan, PC Van Oorschot Proceedings of the 2007 Workshop on New Security Paradigms, 1-14, 2008 | 146 | 2008 |
Revisiting defenses against large-scale online password guessing attacks M Alsaleh, M Mannan, PC Van Oorschot IEEE Transactions on dependable and secure computing 9 (1), 128-141, 2011 | 131 | 2011 |
On instant messaging worms, analysis and countermeasures M Mannan, PC van Oorschot Proceedings of the 2005 ACM workshop on Rapid malcode, 2-11, 2005 | 105 | 2005 |
A Large-Scale Evaluation of High-Impact Password Strength Meters X de Carné de Carnavalet, M Mannan ACM Transactions on Information and System Security (TISSEC) 18 (1), 32, 2015 | 101* | 2015 |
Killed by proxy: Analyzing client-end TLS interception software XC de Carnavalet, M Mannan Network and Distributed System Security Symposium, 2016 | 91 | 2016 |
On implementing deniable storage encryption for mobile devices A Skillen, M Mannan Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013 | 80 | 2013 |
Perspectives on the solarwinds incident S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ... IEEE Security & Privacy 19 (2), 7-13, 2021 | 75 | 2021 |
Password triggered trusted encryption key deletion M Mannan, L Zhao US Patent 10,516,533, 2019 | 72 | 2019 |
Digital Objects as Passwords M Mannan, PC van Oorschot USENIX HotSec 2008, 2008 | 66* | 2008 |
Detection of malicious payload distribution channels in DNS AM Kara, H Binsalleeh, M Mannan, A Youssef, M Debbabi Communications (ICC), 2014 IEEE International Conference on, 853-858, 2014 | 64 | 2014 |
Privacy-enhanced sharing of personal content on the web M Mannan, PC Van Oorschot Proceedings of the 17th international conference on World Wide Web, 487-496, 2008 | 59 | 2008 |
Leveraging personal devices for stronger password authentication from untrusted computers M Mannan, PC van Oorschot Journal of Computer Security 19 (4), 703-750, 2011 | 55 | 2011 |
User study, analysis, and usable security of passwords based on digital objects R Biddle, M Mannan, PC van Oorschot, T Whalen IEEE Transactions on Information Forensics and Security 6 (3), 970-979, 2011 | 53* | 2011 |
Secure public instant messaging: A survey M Mannan, PC van Oorschot Proceedings of Privacy, Security and Trust, 95, 2004 | 51 | 2004 |
Mobiflage: Deniable Storage Encryption for Mobile Devices A Skillen, M Mannan Dependable and Secure Computing, IEEE Transactions on 11 (3), 224-237, 2014 | 50* | 2014 |
Playing with danger: A taxonomy and evaluation of threats to smart toys S Shasha, M Mahmoud, M Mannan, A Youssef IEEE Internet of Things Journal 6 (2), 2986-3002, 2018 | 49 | 2018 |
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances L Waked, M Mannan, A Youssef ACM AisaCCS 2018, 399-412, 2018 | 38 | 2018 |
Towards a global perspective on web tracking N Samarasinghe, M Mannan Computers & Security 87, 101569, 2019 | 36 | 2019 |