Paul C. van Oorschot
Paul C. van Oorschot
Professor of Computer Science, Carleton University, Canada
Verified email at scs.carleton.ca - Homepage
TitleCited byYear
Handbook of Applied Cryptography
AJ Menezes, PC van Oorschot, SA Vanstone
CRC Press, 1996
19201*1996
Authentication and authenticated key exchanges
W Diffie, PC van Oorschot, MJ Wiener
Designs, Codes and Cryptography 2 (2), 107-125, 1992
14231992
Parallel collision search with cryptanalytic applications
PC van Oorschot, MJ Wiener
Journal of Cryptology 12 (1), 1-28, 1999
7091999
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC van Oorschot, F Stajano
IEEE Symp. on Security and Privacy (Oakland 2012), 2012
6712012
Graphical passwords: Learning from the first twelve years
R Biddle, S Chiasson, PC van Oorschot
ACM Computing Surveys 44 (4), 19:1-41, 2012
6272012
A methodology for empirical analysis of permission-based security models and its application to Android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
ACM CCS 2010: Proc. 17th ACM Conference on Computer and Communications …, 2010
5512010
On unifying some cryptographic protocol logics
PF Syverson, PC van Oorschot
IEEE Symp. on Security and Privacy (Oakland 1994), 14-28, 1994
4641994
White-box cryptography and an AES implementation
S Chow, P Eisen, H Johnson, P van Oorschot
Selected Areas in Cryptography (SAC 2003), 250-270, 2003
3652003
MDx-MAC and building fast MACs from hash functions
B Preneel, P van Oorschot
Advances in Cryptology—CRYPTO’95, 1-14, 1995
3481995
Graphical password authentication using cued click points
S Chiasson, P van Oorschot, R Biddle
Computer Security–ESORICS 2007, 359-374, 2007
3422007
A white-box DES implementation for DRM applications
S Chow, P Eisen, H Johnson, P van Oorschot
ACM CCS Workshop on Digital Rights Management, 1-15, 2003
3072003
Method and apparatus for extending secure communication operations via a shared list
JA Turnbull, IH Curry, PC Van Oorschot, SW Hillier
US Patent 6,092,201, 2000
2652000
Computer network security system and method having unilateral enforceable security policy provision
M Brownlie, S Hillier, PC Van Oorschot
US Patent 6,202,157, 2001
2642001
Human-seeded attacks and exploiting hot-spots in graphical passwords
J Thorpe, PC van Oorschot
USENIX Security 2007: Proc. 16th USENIX Security Symposium, 2007
2342007
A usability study and critique of two password managers
S Chiasson, PC van Oorschot, R Biddle
USENIX Security 2006: Proc. 15th USENIX Security Symposium, 1-16, 2006
2342006
A research agenda acknowledging the persistence of passwords
C Herley, PC van Oorschot
IEEE Security & Privacy 10 (1), 28-36, 2012
2282012
An introduction to error correcting codes with applications
SA Vanstone, PC van Oorschot
Kluwer Academic Publishers, 1989
228*1989
Multiple password interference in text and click-based graphical passwords
S Chiasson, A Forget, E Stobert, P Van Oorschot, R Biddle
ACM Computer and Communications Security (CCS) 11, 2009
224*2009
A second look at the usability of click-based graphical passwords
S Chiasson, R Biddle, PC van Oorschot
SOUPS 2007: Proc. 3rd Symposium on Usable Privacy and Security, 1-12, 2007
2212007
Key management system for mixed-trust environments
PC Van Oorschot, MJ Wiener
US Patent 5,850,443, 1998
2161998
The system can't perform the operation now. Try again later.
Articles 1–20