Paul C. van Oorschot
Orcid: 0000-0002-5038-5370Affiliations:
- Carleton University, Ottawa, Canada
According to our database1,
Paul C. van Oorschot
authored at least 191 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2016, "For contributions to applied cryptography, authentication and computer security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Influences of displaying permission-related information on web single sign-on login decisions.
Comput. Secur., 2024
2023
ACM Trans. Priv. Secur., May, 2023
J. Cybersecur., January, 2023
IACR Cryptol. ePrint Arch., 2023
A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made "end-to-me" for web traffic.
ACM Comput. Surv., 2023
Comput. Secur., 2023
2022
IEEE Secur. Priv., 2022
CoRR, 2022
Public Key Cryptography's Impact on Society: How Diffie and Hellman Changed the World.
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
2021
Computer Security and the Internet - Tools and Jewels from Malware to Bitcoin, Second Edition
Information Security and Cryptography, Springer, ISBN: 978-3-030-83410-4, 2021
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes.
IEEE Trans. Dependable Secur. Comput., 2021
SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons.
IACR Cryptol. ePrint Arch., 2021
ACM Comput. Surv., 2021
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
2020
Information Security and Cryptography, Springer, ISBN: 978-3-030-33648-6, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Analysis, Implications, and Challenges of an Evolving Consumer IoT Security Landscape.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
2018
Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication.
ACM Trans. Priv. Secur., 2018
IEEE Secur. Priv., 2018
Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management.
CoRR, 2018
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Emerg. Top. Comput., 2017
IEEE Trans. Dependable Secur. Comput., 2017
J. Comput. Secur., 2017
A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks.
CoRR, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Server Location Verification and Server Location Pinning: Augmenting TLS Authentication.
CoRR, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Device fingerprinting for augmenting web authentication: classification and analysis of methods.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
IEEE Trans. Mob. Comput., 2015
IEEE Commun. Lett., 2015
Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying.
IEEE Commun. Lett., 2015
Des. Codes Cryptogr., 2015
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015
2014
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion.
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 28th Large Installation System Administration Conference, 2014
Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors.
Int. J. Inf. Sec., 2013
Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
CoRR, 2013
SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the New Security Paradigms Workshop, 2013
2012
login Usenix Mag., 2012
IEEE Trans. Software Eng., 2012
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Secur. Commun. Networks, 2012
IEEE Secur. Priv., 2012
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Understanding and improving app installation security mechanisms through empirical analysis of android.
Proceedings of the SPSM'12, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
J. Comput. Secur., 2011
Leveraging personal devices for stronger password authentication from untrusted computers.
J. Comput. Secur., 2011
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification.
Comput. Secur., 2011
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation.
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
A methodology for empirical analysis of permission-based security models and its application to android.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Exploring usability effects of increasing security in click-based graphical passwords.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Int. J. Inf. Sec., 2009
Comput. Secur., 2009
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009
Proceedings of the E-Technologies: Innovation in an Open World, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Multiple password interference in text passwords and click-based graphical passwords.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Proceedings of the Persuasive Technology, Third International Conference, 2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Localization of credential information to address increasingly inevitable data breaches.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the Computer Security, 2008
Proceedings of the Computer Security, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
VideoTicket: detecting identity fraud attempts via audiovisual certificates and signatures.
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Computer Security, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
ACM Trans. Inf. Syst. Secur., 2006
A monitoring system for detecting repeated packets with applications to computer worms.
Int. J. Inf. Sec., 2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling.
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract).
Proceedings of the Financial Cryptography, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
2000
1999
Proceedings of the Handbook of Discrete and Combinatorial Mathematics., 1999
IEEE Trans. Inf. Theory, 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
1997
Eur. Trans. Telecommun., 1997
Des. Codes Cryptogr., 1997
1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement.
Proceedings of the Cryptography and Coding, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.
Proceedings of the CCS '94, 1994
1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the CCS '93, 1993
1992
1990
Discret. Math., 1990
Proceedings of the Advances in Cryptology, 1990
A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms.
Proceedings of the Advances in Cryptology, 1990
1989
IEEE Trans. Inf. Theory, 1989
1988
Proceedings of the Symbolic and Algebraic Computation, 1988