2008 | ||
---|---|---|
66 | Paul C. van Oorschot: Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA USENIX Association 2008 | |
65 | EE | Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji: SOMA: mutual approval for included content in web pages. ACM Conference on Computer and Communications Security 2008: 89-98 |
64 | EE | D. Nali, Paul C. van Oorschot: CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. ESORICS 2008: 130-145 |
63 | EE | Jennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick: Exploring User Reactions to New Browser Cues for Extended Validation Certificates. ESORICS 2008: 411-427 |
62 | EE | Mohammad Mannan, Paul C. van Oorschot: Weighing Down "The Unbearable Lightness of PIN Cracking". Financial Cryptography 2008: 176-181 |
61 | EE | Mohammad Mannan, Paul C. van Oorschot: Digital Objects as Passwords. HotSec 2008 |
60 | EE | Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji: Discovering Packet Structure through Lightweight Hierarchical Clustering. ICC 2008: 33-39 |
59 | EE | Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle: Persuasion for Stronger Passwords: Motivation and Pilot Study. PERSUASIVE 2008: 140-150 |
58 | EE | Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle: Improving text passwords through persuasion. SOUPS 2008: 1-12 |
57 | EE | Sonia Chiasson, Jayakumar Srinivasan, Robert Biddle, Paul C. van Oorschot: Centered Discretization with Application to Graphical Passwords. UPSEC 2008 |
56 | EE | Mohammad Mannan, Paul C. van Oorschot: Privacy-enhanced sharing of personal content on the web. WWW 2008: 487-496 |
55 | EE | Paul C. van Oorschot, Julie Thorpe: On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 | ||
54 | EE | David Whyte, Paul C. van Oorschot, Evangelos Kranakis: Tracking Darkports for Network Defense. ACSAC 2007: 161-171 |
53 | EE | Sonia Chiasson, Paul C. van Oorschot, Robert Biddle: Graphical Password Authentication Using Cued Click Points. ESORICS 2007: 359-374 |
52 | EE | Mohammad Mannan, Paul C. van Oorschot: Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Financial Cryptography 2007: 88-103 |
51 | EE | Sonia Chiasson, Robert Biddle, Paul C. van Oorschot: A second look at the usability of click-based graphical passwords. SOUPS 2007: 1-12 |
50 | EE | Jeremy Clark, Paul C. van Oorschot, Carlisle Adams: Usability of anonymous web browsing: an examination of Tor interfaces and deployability. SOUPS 2007: 41-51 |
49 | EE | Paul C. van Oorschot, Tao Wan, Evangelos Kranakis: On interdomain routing security and pretty secure BGP (psBGP). ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
2006 | ||
48 | EE | David Whyte, Paul C. van Oorschot, Evangelos Kranakis: Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. ACSAC 2006: 393-402 |
47 | EE | Mohammad Mannan, Paul C. van Oorschot: A Protocol for Secure Public Instant Messaging. Financial Cryptography 2006: 20-35 |
46 | EE | Tao Wan, Paul C. van Oorschot: Analysis of BGP prefix origins during Google's May 2005 outage. IPDPS 2006 |
45 | EE | Paul C. van Oorschot, Stuart G. Stubblebine: On countering online dictionary attacks with login histories and humans-in-the-loop. ACM Trans. Inf. Syst. Secur. 9(3): 235-258 (2006) |
44 | EE | Paul C. van Oorschot, Jean-Marc Robert, Miguel Vargas Martin: A monitoring system for detecting repeated packets with applications to computer worms. Int. J. Inf. Sec. 5(3): 186-199 (2006) |
2005 | ||
43 | EE | Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji: Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. ACNS 2005: 104-121 |
42 | EE | David Whyte, Paul C. van Oorschot, Evangelos Kranakis: Detecting Intra-enterprise Scanning Worms based on Address Resolution. ACSAC 2005: 371-380 |
41 | EE | Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov: Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396 |
40 | EE | Paul C. van Oorschot, Stuart G. Stubblebine: Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. Financial Cryptography 2005: 31-43 |
39 | EE | Glenn Wurster, Paul C. van Oorschot, Anil Somayaji: A Generic Attack on Checksumming-Based Software Tamper Resistance. IEEE Symposium on Security and Privacy 2005: 127-138 |
38 | EE | David Whyte, Evangelos Kranakis, Paul C. van Oorschot: DNS-based Detection of Scanning Worms in an Enterprise Network. NDSS 2005 |
37 | EE | Tao Wan, Evangelos Kranakis, Paul C. van Oorschot: Pretty Secure BGP, psBGP. NDSS 2005 |
36 | EE | Mohammad Mannan, Paul C. van Oorschot: On instant messaging worms, analysis and countermeasures. WORM 2005: 2-11 |
35 | EE | Paul C. van Oorschot, Anil Somayaji, Glenn Wurster: Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. IEEE Trans. Dependable Sec. Comput. 2(2): 82-92 (2005) |
2004 | ||
34 | EE | Tao Wan, Evangelos Kranakis, Paul C. van Oorschot: S-RIP: A Secure Distance Vector Routing Protocol. ACNS 2004: 103-119 |
33 | EE | Julie Thorpe, Paul C. van Oorschot: Towards Secure Design Choices for Implementing Graphical Passwords. ACSAC 2004: 50-60 |
32 | EE | Stuart G. Stubblebine, Paul C. van Oorschot: Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). Financial Cryptography 2004: 39-53 |
31 | EE | Tao Wan, Evangelos Kranakis, Paul C. van Oorschot: Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). ICICS 2004: 358-374 |
30 | EE | Mohammad Mannan, Paul C. van Oorschot: Secure Public Instant Messaging. PST 2004: 69-77 |
29 | EE | Julie Thorpe, Paul C. van Oorschot: Graphical Dictionaries and the Memorable Space of Graphical Passwords. USENIX Security Symposium 2004: 135-150 |
2003 | ||
28 | EE | Paul C. van Oorschot: Revisiting Software Protection. ISC 2003: 1-13 |
2002 | ||
27 | EE | Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot: A White-Box DES Implementation for DRM Applications. Digital Rights Management Workshop 2002: 1-15 |
26 | EE | Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot: White-Box Cryptography and an AES Implementation. Selected Areas in Cryptography 2002: 250-270 |
2000 | ||
25 | Michael Smith, Paul C. van Oorschot, Michael Willett: Cryptographic Information Recovery Using Key Recover. Computers & Security 19(1): 21-27 (2000) | |
1999 | ||
24 | EE | Mike Just, Paul C. van Oorschot: Addressing the Problem of Undetected Signature Key Compromise. NDSS 1999 |
23 | Bart Preneel, Paul C. van Oorschot: On the Security of Iterated Message Authentication Codes. IEEE Transactions on Information Theory 45(1): 188-199 (1999) | |
22 | EE | Paul C. van Oorschot, Michael J. Wiener: Parallel Collision Search with Cryptanalytic Applications. J. Cryptology 12(1): 1-28 (1999) |
1997 | ||
21 | Evangelos Kranakis, Paul C. van Oorschot: Special Issue: Selected Areas in Cryptography - Introduction. Des. Codes Cryptography 12(3): 213 (1997) | |
1996 | ||
20 | Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone: Handbook of Applied Cryptography CRC Press 1996 | |
19 | EE | Paul C. van Oorschot, Michael J. Wiener: Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. CRYPTO 1996: 229-236 |
18 | EE | Bart Preneel, Paul C. van Oorschot: On the Security of Two MAC Algorithms. EUROCRYPT 1996: 19-32 |
17 | EE | Paul C. van Oorschot, Michael J. Wiener: On Diffie-Hellman Key Agreement with Short Exponents. EUROCRYPT 1996: 332-343 |
1995 | ||
16 | EE | Bart Preneel, Paul C. van Oorschot: MDx-MAC and Building Fast MACs from Hash Functions. CRYPTO 1995: 1-14 |
15 | Paul C. van Oorschot: Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement. IMA Conf. 1995: 1 | |
1994 | ||
14 | EE | Paul C. van Oorschot, Michael J. Wiener: Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. ACM Conference on Computer and Communications Security 1994: 210-218 |
13 | EE | Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot: On Key Distribution via True Broadcasting. ACM Conference on Computer and Communications Security 1994: 81-88 |
12 | EE | Rainer A. Rueppel, Paul C. van Oorschot: Modern key agreement techniques. Computer Communications 17(7): 458-465 (1994) |
1993 | ||
11 | EE | Paul C. van Oorschot: Extending Cryptographic Logics of Belief to Key Agreement Protocols. ACM Conference on Computer and Communications Security 1993: 232-243 |
10 | EE | Paul C. van Oorschot: An Alternate Explanation of two BAN-logic "failures". EUROCRYPT 1993: 443-447 |
1992 | ||
9 | Whitfield Diffie, Paul C. van Oorschot, Michael J. Wiener: Authentication and Authenticated Key Exchanges. Des. Codes Cryptography 2(2): 107-125 (1992) | |
8 | Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone: Subgroup Refinement Algorithms for Root Finding in GF(q). SIAM J. Comput. 21(2): 228-239 (1992) | |
7 | Albrecht Beutelspacher, Dieter Jungnickel, Paul C. van Oorschot, Scott A. Vanstone: Pair-Splitting Sets in AG(m, q). SIAM J. Discrete Math. 5(4): 451-459 (1992) | |
1990 | ||
6 | EE | Paul C. van Oorschot: A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms. CRYPTO 1990: 576-581 |
5 | EE | Paul C. van Oorschot, Michael J. Wiener: A Known Plaintext Attack on Two-Key Triple Encryption. EUROCRYPT 1990: 318-325 |
4 | EE | Paul C. van Oorschot, Scott A. Vanstone: On splitting sets in block designs and finding roots of polynomials. Discrete Mathematics 84(1): 71-85 (1990) |
1989 | ||
3 | Charles J. Colbourn, Paul C. van Oorschot: Applications of Combinatorial Designs in Computer Science. ACM Comput. Surv. 21(2): 223-250 (1989) | |
2 | Paul C. van Oorschot, Scott A. Vanstone: A geometric approach to root finding in GF(qm). IEEE Transactions on Information Theory 35(2): 444-453 (1989) | |
1988 | ||
1 | Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone: Some Computational Aspects of Root Finding in GF(qm). ISSAC 1988: 259-270 |