Cormac Herley
Orcid: 0000-0001-8436-5776Affiliations:
- Microsoft Research
According to our database1,
Cormac Herley
authored at least 98 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
2023
Trans. Mach. Learn. Res., 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2020
IEEE Secur. Priv., 2020
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
2018
IEEE Secur. Priv., 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
2015
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 28th Large Installation System Administration Conference, 2014
2013
Proceedings of the New Security Paradigms Workshop, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Does my password go up to eleven?: the impact of password meters on password selection.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
2012
IEEE Secur. Priv., 2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
2009
Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
So long, and no thanks for the externalities: the rational rejection of security advice by users.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007
2006
IEEE Trans. Multim., 2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005
Proceedings of the 13th ACM International Conference on Multimedia, 2005
Proceedings of the 7th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2005
Proceedings of the 2005 International Conference on Image Processing, 2005
2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004
2003
Proceedings of the 2003 International Conference on Image Processing, 2003
2002
2001
Proceedings of the 2001 International Conference on Image Processing, 2001
2000
Proceedings of the 2000 International Conference on Image Processing, 2000
1999
Minimum rate sampling and reconstruction of signals with arbitrary frequency support.
IEEE Trans. Inf. Theory, 1999
Storage of Digital Camera Images.
Proceedings of the 1999 International Conference on Image Processing, 1999
1998
Correction To "occam Filters For Stochastic Sources With Application To Digital Images".
IEEE Trans. Signal Process., 1998
IEEE Trans. Signal Process., 1998
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
1997
IEEE Trans. Signal Process., 1997
Joint space-frequency segmentation using balanced wavelet packet trees for least-cost image representation.
IEEE Trans. Image Process., 1997
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997
Proceedings of the Proceedings IEEE COMPCON 97, 1997
1996
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
Proceedings of the 6th Data Compression Conference (DCC '96), Snowbird, Utah, USA, March 31, 1996
1995
IEEE Trans. Signal Process., 1995
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995
An efficient algorithm to find a jointly optimal time-frequency segmentation using time-varying filter banks.
Proceedings of the 1995 International Conference on Acoustics, 1995
Proceedings of the 1995 International Conference on Acoustics, 1995
1994
IEEE Trans. Signal Process., 1994
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994
1993
Tilings of the time-frequency plane: construction of arbitrary orthogonal bases and fast tiling algorithms.
IEEE Trans. Signal Process., 1993
Orthogonal time-varying filter banks and wavelets.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993
Proceedings of the IEEE International Conference on Acoustics, 1993
1992
Proceedings of the 1992 IEEE International Conference on Acoustics, 1992
1991
Proceedings of the 1991 International Conference on Acoustics, 1991
1990
Proceedings of the 1990 International Conference on Acoustics, 1990