2008 |
66 | | Paul C. van Oorschot:
Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA
USENIX Association 2008 |
65 | EE | Terri Oda,
Glenn Wurster,
Paul C. van Oorschot,
Anil Somayaji:
SOMA: mutual approval for included content in web pages.
ACM Conference on Computer and Communications Security 2008: 89-98 |
64 | EE | D. Nali,
Paul C. van Oorschot:
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud.
ESORICS 2008: 130-145 |
63 | EE | Jennifer Sobey,
Robert Biddle,
Paul C. van Oorschot,
Andrew S. Patrick:
Exploring User Reactions to New Browser Cues for Extended Validation Certificates.
ESORICS 2008: 411-427 |
62 | EE | Mohammad Mannan,
Paul C. van Oorschot:
Weighing Down "The Unbearable Lightness of PIN Cracking".
Financial Cryptography 2008: 176-181 |
61 | EE | Mohammad Mannan,
Paul C. van Oorschot:
Digital Objects as Passwords.
HotSec 2008 |
60 | EE | Abdulrahman Hijazi,
Hajime Inoue,
Ashraf Matrawy,
Paul C. van Oorschot,
Anil Somayaji:
Discovering Packet Structure through Lightweight Hierarchical Clustering.
ICC 2008: 33-39 |
59 | EE | Alain Forget,
Sonia Chiasson,
Paul C. van Oorschot,
Robert Biddle:
Persuasion for Stronger Passwords: Motivation and Pilot Study.
PERSUASIVE 2008: 140-150 |
58 | EE | Alain Forget,
Sonia Chiasson,
Paul C. van Oorschot,
Robert Biddle:
Improving text passwords through persuasion.
SOUPS 2008: 1-12 |
57 | EE | Sonia Chiasson,
Jayakumar Srinivasan,
Robert Biddle,
Paul C. van Oorschot:
Centered Discretization with Application to Graphical Passwords.
UPSEC 2008 |
56 | EE | Mohammad Mannan,
Paul C. van Oorschot:
Privacy-enhanced sharing of personal content on the web.
WWW 2008: 487-496 |
55 | EE | Paul C. van Oorschot,
Julie Thorpe:
On predictive models and user-drawn graphical passwords.
ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 |
54 | EE | David Whyte,
Paul C. van Oorschot,
Evangelos Kranakis:
Tracking Darkports for Network Defense.
ACSAC 2007: 161-171 |
53 | EE | Sonia Chiasson,
Paul C. van Oorschot,
Robert Biddle:
Graphical Password Authentication Using Cued Click Points.
ESORICS 2007: 359-374 |
52 | EE | Mohammad Mannan,
Paul C. van Oorschot:
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.
Financial Cryptography 2007: 88-103 |
51 | EE | Sonia Chiasson,
Robert Biddle,
Paul C. van Oorschot:
A second look at the usability of click-based graphical passwords.
SOUPS 2007: 1-12 |
50 | EE | Jeremy Clark,
Paul C. van Oorschot,
Carlisle Adams:
Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
SOUPS 2007: 41-51 |
49 | EE | Paul C. van Oorschot,
Tao Wan,
Evangelos Kranakis:
On interdomain routing security and pretty secure BGP (psBGP).
ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
2006 |
48 | EE | David Whyte,
Paul C. van Oorschot,
Evangelos Kranakis:
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks.
ACSAC 2006: 393-402 |
47 | EE | Mohammad Mannan,
Paul C. van Oorschot:
A Protocol for Secure Public Instant Messaging.
Financial Cryptography 2006: 20-35 |
46 | EE | Tao Wan,
Paul C. van Oorschot:
Analysis of BGP prefix origins during Google's May 2005 outage.
IPDPS 2006 |
45 | EE | Paul C. van Oorschot,
Stuart G. Stubblebine:
On countering online dictionary attacks with login histories and humans-in-the-loop.
ACM Trans. Inf. Syst. Secur. 9(3): 235-258 (2006) |
44 | EE | Paul C. van Oorschot,
Jean-Marc Robert,
Miguel Vargas Martin:
A monitoring system for detecting repeated packets with applications to computer worms.
Int. J. Inf. Sec. 5(3): 186-199 (2006) |
2005 |
43 | EE | Ashraf Matrawy,
Paul C. van Oorschot,
Anil Somayaji:
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.
ACNS 2005: 104-121 |
42 | EE | David Whyte,
Paul C. van Oorschot,
Evangelos Kranakis:
Detecting Intra-enterprise Scanning Worms based on Address Resolution.
ACSAC 2005: 371-380 |
41 | EE | Simon N. Foley,
Abe Singer,
Michael E. Locasto,
Stelios Sidiroglou,
Angelos D. Keromytis,
John McDermott,
Julie Thorpe,
Paul C. van Oorschot,
Anil Somayaji,
Richard Ford,
Mark Bush,
Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop.
ACSAC 2005: 393-396 |
40 | EE | Paul C. van Oorschot,
Stuart G. Stubblebine:
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling.
Financial Cryptography 2005: 31-43 |
39 | EE | Glenn Wurster,
Paul C. van Oorschot,
Anil Somayaji:
A Generic Attack on Checksumming-Based Software Tamper Resistance.
IEEE Symposium on Security and Privacy 2005: 127-138 |
38 | EE | David Whyte,
Evangelos Kranakis,
Paul C. van Oorschot:
DNS-based Detection of Scanning Worms in an Enterprise Network.
NDSS 2005 |
37 | EE | Tao Wan,
Evangelos Kranakis,
Paul C. van Oorschot:
Pretty Secure BGP, psBGP.
NDSS 2005 |
36 | EE | Mohammad Mannan,
Paul C. van Oorschot:
On instant messaging worms, analysis and countermeasures.
WORM 2005: 2-11 |
35 | EE | Paul C. van Oorschot,
Anil Somayaji,
Glenn Wurster:
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance.
IEEE Trans. Dependable Sec. Comput. 2(2): 82-92 (2005) |
2004 |
34 | EE | Tao Wan,
Evangelos Kranakis,
Paul C. van Oorschot:
S-RIP: A Secure Distance Vector Routing Protocol.
ACNS 2004: 103-119 |
33 | EE | Julie Thorpe,
Paul C. van Oorschot:
Towards Secure Design Choices for Implementing Graphical Passwords.
ACSAC 2004: 50-60 |
32 | EE | Stuart G. Stubblebine,
Paul C. van Oorschot:
Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract).
Financial Cryptography 2004: 39-53 |
31 | EE | Tao Wan,
Evangelos Kranakis,
Paul C. van Oorschot:
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV).
ICICS 2004: 358-374 |
30 | EE | Mohammad Mannan,
Paul C. van Oorschot:
Secure Public Instant Messaging.
PST 2004: 69-77 |
29 | EE | Julie Thorpe,
Paul C. van Oorschot:
Graphical Dictionaries and the Memorable Space of Graphical Passwords.
USENIX Security Symposium 2004: 135-150 |
2003 |
28 | EE | Paul C. van Oorschot:
Revisiting Software Protection.
ISC 2003: 1-13 |
2002 |
27 | EE | Stanley Chow,
Philip A. Eisen,
Harold Johnson,
Paul C. van Oorschot:
A White-Box DES Implementation for DRM Applications.
Digital Rights Management Workshop 2002: 1-15 |
26 | EE | Stanley Chow,
Philip A. Eisen,
Harold Johnson,
Paul C. van Oorschot:
White-Box Cryptography and an AES Implementation.
Selected Areas in Cryptography 2002: 250-270 |
2000 |
25 | | Michael Smith,
Paul C. van Oorschot,
Michael Willett:
Cryptographic Information Recovery Using Key Recover.
Computers & Security 19(1): 21-27 (2000) |
1999 |
24 | EE | Mike Just,
Paul C. van Oorschot:
Addressing the Problem of Undetected Signature Key Compromise.
NDSS 1999 |
23 | | Bart Preneel,
Paul C. van Oorschot:
On the Security of Iterated Message Authentication Codes.
IEEE Transactions on Information Theory 45(1): 188-199 (1999) |
22 | EE | Paul C. van Oorschot,
Michael J. Wiener:
Parallel Collision Search with Cryptanalytic Applications.
J. Cryptology 12(1): 1-28 (1999) |
1997 |
21 | | Evangelos Kranakis,
Paul C. van Oorschot:
Special Issue: Selected Areas in Cryptography - Introduction.
Des. Codes Cryptography 12(3): 213 (1997) |
1996 |
20 | | Alfred Menezes,
Paul C. van Oorschot,
Scott A. Vanstone:
Handbook of Applied Cryptography
CRC Press 1996 |
19 | EE | Paul C. van Oorschot,
Michael J. Wiener:
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude.
CRYPTO 1996: 229-236 |
18 | EE | Bart Preneel,
Paul C. van Oorschot:
On the Security of Two MAC Algorithms.
EUROCRYPT 1996: 19-32 |
17 | EE | Paul C. van Oorschot,
Michael J. Wiener:
On Diffie-Hellman Key Agreement with Short Exponents.
EUROCRYPT 1996: 332-343 |
1995 |
16 | EE | Bart Preneel,
Paul C. van Oorschot:
MDx-MAC and Building Fast MACs from Hash Functions.
CRYPTO 1995: 1-14 |
15 | | Paul C. van Oorschot:
Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement.
IMA Conf. 1995: 1 |
1994 |
14 | EE | Paul C. van Oorschot,
Michael J. Wiener:
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.
ACM Conference on Computer and Communications Security 1994: 210-218 |
13 | EE | Mike Just,
Evangelos Kranakis,
Danny Krizanc,
Paul C. van Oorschot:
On Key Distribution via True Broadcasting.
ACM Conference on Computer and Communications Security 1994: 81-88 |
12 | EE | Rainer A. Rueppel,
Paul C. van Oorschot:
Modern key agreement techniques.
Computer Communications 17(7): 458-465 (1994) |
1993 |
11 | EE | Paul C. van Oorschot:
Extending Cryptographic Logics of Belief to Key Agreement Protocols.
ACM Conference on Computer and Communications Security 1993: 232-243 |
10 | EE | Paul C. van Oorschot:
An Alternate Explanation of two BAN-logic "failures".
EUROCRYPT 1993: 443-447 |
1992 |
9 | | Whitfield Diffie,
Paul C. van Oorschot,
Michael J. Wiener:
Authentication and Authenticated Key Exchanges.
Des. Codes Cryptography 2(2): 107-125 (1992) |
8 | | Alfred Menezes,
Paul C. van Oorschot,
Scott A. Vanstone:
Subgroup Refinement Algorithms for Root Finding in GF(q).
SIAM J. Comput. 21(2): 228-239 (1992) |
7 | | Albrecht Beutelspacher,
Dieter Jungnickel,
Paul C. van Oorschot,
Scott A. Vanstone:
Pair-Splitting Sets in AG(m, q).
SIAM J. Discrete Math. 5(4): 451-459 (1992) |
1990 |
6 | EE | Paul C. van Oorschot:
A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms.
CRYPTO 1990: 576-581 |
5 | EE | Paul C. van Oorschot,
Michael J. Wiener:
A Known Plaintext Attack on Two-Key Triple Encryption.
EUROCRYPT 1990: 318-325 |
4 | EE | Paul C. van Oorschot,
Scott A. Vanstone:
On splitting sets in block designs and finding roots of polynomials.
Discrete Mathematics 84(1): 71-85 (1990) |
1989 |
3 | | Charles J. Colbourn,
Paul C. van Oorschot:
Applications of Combinatorial Designs in Computer Science.
ACM Comput. Surv. 21(2): 223-250 (1989) |
2 | | Paul C. van Oorschot,
Scott A. Vanstone:
A geometric approach to root finding in GF(qm).
IEEE Transactions on Information Theory 35(2): 444-453 (1989) |
1988 |
1 | | Alfred Menezes,
Paul C. van Oorschot,
Scott A. Vanstone:
Some Computational Aspects of Root Finding in GF(qm).
ISSAC 1988: 259-270 |