dblp.uni-trier.dewww.uni-trier.de

Paul C. van Oorschot

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
66 Paul C. van Oorschot: Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA USENIX Association 2008
65EETerri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji: SOMA: mutual approval for included content in web pages. ACM Conference on Computer and Communications Security 2008: 89-98
64EED. Nali, Paul C. van Oorschot: CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. ESORICS 2008: 130-145
63EEJennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick: Exploring User Reactions to New Browser Cues for Extended Validation Certificates. ESORICS 2008: 411-427
62EEMohammad Mannan, Paul C. van Oorschot: Weighing Down "The Unbearable Lightness of PIN Cracking". Financial Cryptography 2008: 176-181
61EEMohammad Mannan, Paul C. van Oorschot: Digital Objects as Passwords. HotSec 2008
60EEAbdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji: Discovering Packet Structure through Lightweight Hierarchical Clustering. ICC 2008: 33-39
59EEAlain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle: Persuasion for Stronger Passwords: Motivation and Pilot Study. PERSUASIVE 2008: 140-150
58EEAlain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle: Improving text passwords through persuasion. SOUPS 2008: 1-12
57EESonia Chiasson, Jayakumar Srinivasan, Robert Biddle, Paul C. van Oorschot: Centered Discretization with Application to Graphical Passwords. UPSEC 2008
56EEMohammad Mannan, Paul C. van Oorschot: Privacy-enhanced sharing of personal content on the web. WWW 2008: 487-496
55EEPaul C. van Oorschot, Julie Thorpe: On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur. 10(4): (2008)
2007
54EEDavid Whyte, Paul C. van Oorschot, Evangelos Kranakis: Tracking Darkports for Network Defense. ACSAC 2007: 161-171
53EESonia Chiasson, Paul C. van Oorschot, Robert Biddle: Graphical Password Authentication Using Cued Click Points. ESORICS 2007: 359-374
52EEMohammad Mannan, Paul C. van Oorschot: Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Financial Cryptography 2007: 88-103
51EESonia Chiasson, Robert Biddle, Paul C. van Oorschot: A second look at the usability of click-based graphical passwords. SOUPS 2007: 1-12
50EEJeremy Clark, Paul C. van Oorschot, Carlisle Adams: Usability of anonymous web browsing: an examination of Tor interfaces and deployability. SOUPS 2007: 41-51
49EEPaul C. van Oorschot, Tao Wan, Evangelos Kranakis: On interdomain routing security and pretty secure BGP (psBGP). ACM Trans. Inf. Syst. Secur. 10(3): (2007)
2006
48EEDavid Whyte, Paul C. van Oorschot, Evangelos Kranakis: Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. ACSAC 2006: 393-402
47EEMohammad Mannan, Paul C. van Oorschot: A Protocol for Secure Public Instant Messaging. Financial Cryptography 2006: 20-35
46EETao Wan, Paul C. van Oorschot: Analysis of BGP prefix origins during Google's May 2005 outage. IPDPS 2006
45EEPaul C. van Oorschot, Stuart G. Stubblebine: On countering online dictionary attacks with login histories and humans-in-the-loop. ACM Trans. Inf. Syst. Secur. 9(3): 235-258 (2006)
44EEPaul C. van Oorschot, Jean-Marc Robert, Miguel Vargas Martin: A monitoring system for detecting repeated packets with applications to computer worms. Int. J. Inf. Sec. 5(3): 186-199 (2006)
2005
43EEAshraf Matrawy, Paul C. van Oorschot, Anil Somayaji: Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. ACNS 2005: 104-121
42EEDavid Whyte, Paul C. van Oorschot, Evangelos Kranakis: Detecting Intra-enterprise Scanning Worms based on Address Resolution. ACSAC 2005: 371-380
41EESimon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov: Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396
40EEPaul C. van Oorschot, Stuart G. Stubblebine: Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. Financial Cryptography 2005: 31-43
39EEGlenn Wurster, Paul C. van Oorschot, Anil Somayaji: A Generic Attack on Checksumming-Based Software Tamper Resistance. IEEE Symposium on Security and Privacy 2005: 127-138
38EEDavid Whyte, Evangelos Kranakis, Paul C. van Oorschot: DNS-based Detection of Scanning Worms in an Enterprise Network. NDSS 2005
37EETao Wan, Evangelos Kranakis, Paul C. van Oorschot: Pretty Secure BGP, psBGP. NDSS 2005
36EEMohammad Mannan, Paul C. van Oorschot: On instant messaging worms, analysis and countermeasures. WORM 2005: 2-11
35EEPaul C. van Oorschot, Anil Somayaji, Glenn Wurster: Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. IEEE Trans. Dependable Sec. Comput. 2(2): 82-92 (2005)
2004
34EETao Wan, Evangelos Kranakis, Paul C. van Oorschot: S-RIP: A Secure Distance Vector Routing Protocol. ACNS 2004: 103-119
33EEJulie Thorpe, Paul C. van Oorschot: Towards Secure Design Choices for Implementing Graphical Passwords. ACSAC 2004: 50-60
32EEStuart G. Stubblebine, Paul C. van Oorschot: Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). Financial Cryptography 2004: 39-53
31EETao Wan, Evangelos Kranakis, Paul C. van Oorschot: Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). ICICS 2004: 358-374
30EEMohammad Mannan, Paul C. van Oorschot: Secure Public Instant Messaging. PST 2004: 69-77
29EEJulie Thorpe, Paul C. van Oorschot: Graphical Dictionaries and the Memorable Space of Graphical Passwords. USENIX Security Symposium 2004: 135-150
2003
28EEPaul C. van Oorschot: Revisiting Software Protection. ISC 2003: 1-13
2002
27EEStanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot: A White-Box DES Implementation for DRM Applications. Digital Rights Management Workshop 2002: 1-15
26EEStanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot: White-Box Cryptography and an AES Implementation. Selected Areas in Cryptography 2002: 250-270
2000
25 Michael Smith, Paul C. van Oorschot, Michael Willett: Cryptographic Information Recovery Using Key Recover. Computers & Security 19(1): 21-27 (2000)
1999
24EEMike Just, Paul C. van Oorschot: Addressing the Problem of Undetected Signature Key Compromise. NDSS 1999
23 Bart Preneel, Paul C. van Oorschot: On the Security of Iterated Message Authentication Codes. IEEE Transactions on Information Theory 45(1): 188-199 (1999)
22EEPaul C. van Oorschot, Michael J. Wiener: Parallel Collision Search with Cryptanalytic Applications. J. Cryptology 12(1): 1-28 (1999)
1997
21 Evangelos Kranakis, Paul C. van Oorschot: Special Issue: Selected Areas in Cryptography - Introduction. Des. Codes Cryptography 12(3): 213 (1997)
1996
20 Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone: Handbook of Applied Cryptography CRC Press 1996
19EEPaul C. van Oorschot, Michael J. Wiener: Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. CRYPTO 1996: 229-236
18EEBart Preneel, Paul C. van Oorschot: On the Security of Two MAC Algorithms. EUROCRYPT 1996: 19-32
17EEPaul C. van Oorschot, Michael J. Wiener: On Diffie-Hellman Key Agreement with Short Exponents. EUROCRYPT 1996: 332-343
1995
16EEBart Preneel, Paul C. van Oorschot: MDx-MAC and Building Fast MACs from Hash Functions. CRYPTO 1995: 1-14
15 Paul C. van Oorschot: Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement. IMA Conf. 1995: 1
1994
14EEPaul C. van Oorschot, Michael J. Wiener: Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. ACM Conference on Computer and Communications Security 1994: 210-218
13EEMike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot: On Key Distribution via True Broadcasting. ACM Conference on Computer and Communications Security 1994: 81-88
12EERainer A. Rueppel, Paul C. van Oorschot: Modern key agreement techniques. Computer Communications 17(7): 458-465 (1994)
1993
11EEPaul C. van Oorschot: Extending Cryptographic Logics of Belief to Key Agreement Protocols. ACM Conference on Computer and Communications Security 1993: 232-243
10EEPaul C. van Oorschot: An Alternate Explanation of two BAN-logic "failures". EUROCRYPT 1993: 443-447
1992
9 Whitfield Diffie, Paul C. van Oorschot, Michael J. Wiener: Authentication and Authenticated Key Exchanges. Des. Codes Cryptography 2(2): 107-125 (1992)
8 Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone: Subgroup Refinement Algorithms for Root Finding in GF(q). SIAM J. Comput. 21(2): 228-239 (1992)
7 Albrecht Beutelspacher, Dieter Jungnickel, Paul C. van Oorschot, Scott A. Vanstone: Pair-Splitting Sets in AG(m, q). SIAM J. Discrete Math. 5(4): 451-459 (1992)
1990
6EEPaul C. van Oorschot: A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms. CRYPTO 1990: 576-581
5EEPaul C. van Oorschot, Michael J. Wiener: A Known Plaintext Attack on Two-Key Triple Encryption. EUROCRYPT 1990: 318-325
4EEPaul C. van Oorschot, Scott A. Vanstone: On splitting sets in block designs and finding roots of polynomials. Discrete Mathematics 84(1): 71-85 (1990)
1989
3 Charles J. Colbourn, Paul C. van Oorschot: Applications of Combinatorial Designs in Computer Science. ACM Comput. Surv. 21(2): 223-250 (1989)
2 Paul C. van Oorschot, Scott A. Vanstone: A geometric approach to root finding in GF(qm). IEEE Transactions on Information Theory 35(2): 444-453 (1989)
1988
1 Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone: Some Computational Aspects of Root Finding in GF(qm). ISSAC 1988: 259-270

Coauthor Index

1Carlisle M. Adams (Carlisle Adams) [50]
2Albrecht Beutelspacher [7]
3Robert Biddle [51] [53] [57] [58] [59] [63]
4Alex Boulatov [41]
5Mark Bush [41]
6Sonia Chiasson [51] [53] [57] [58] [59]
7Stanley Chow [26] [27]
8Jeremy Clark [50]
9Charles J. Colbourn [3]
10Whitfield Diffie [9]
11Philip A. Eisen [26] [27]
12Simon N. Foley [41]
13Richard Ford [41]
14Alain Forget [58] [59]
15Abdulrahman Hijazi [60]
16Hajime Inoue [60]
17Harold Johnson [26] [27]
18Dieter Jungnickel [7]
19Mike Just [13] [24]
20Angelos D. Keromytis [41]
21Evangelos Kranakis [13] [21] [31] [34] [37] [38] [42] [48] [49] [54]
22Danny Krizanc [13]
23Michael E. Locasto [41]
24Mohammad Mannan [30] [36] [47] [52] [56] [61] [62]
25Miguel Vargas Martin [44]
26Ashraf Matrawy [43] [60]
27John McDermott [41]
28Alfred Menezes [1] [8] [20]
29D. Nali [64]
30Terri Oda [65]
31Andrew S. Patrick [63]
32Bart Preneel [16] [18] [23]
33Jean-Marc Robert [44]
34Rainer A. Rueppel [12]
35Stelios Sidiroglou [41]
36Abe Singer [41]
37Michael Smith [25]
38Jennifer Sobey [63]
39Anil Somayaji [35] [39] [41] [43] [60] [65]
40Jayakumar Srinivasan [57]
41Stuart G. Stubblebine [32] [40] [45]
42Julie Thorpe [29] [33] [41] [55]
43Scott A. Vanstone [1] [2] [4] [7] [8] [20]
44Tao Wan [31] [34] [37] [46] [49]
45David Whyte [38] [42] [48] [54]
46Michael J. Wiener [5] [9] [14] [17] [19] [22]
47Michael Willett [25]
48Glenn Wurster [35] [39] [65]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)