The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Paul C. van Oorschot: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Charles J. Colbourn, Paul C. van Oorschot
    Applications of Combinatorial Designs in Computer Science. [Citation Graph (1, 0)][DBLP]
    ACM Comput. Surv., 1989, v:21, n:2, pp:223-250 [Journal]
  2. Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji
    Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:104-121 [Conf]
  3. Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
    S-RIP: A Secure Distance Vector Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:103-119 [Conf]
  4. Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
    Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:393-396 [Conf]
  5. Julie Thorpe, Paul C. van Oorschot
    Towards Secure Design Choices for Implementing Graphical Passwords. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:50-60 [Conf]
  6. David Whyte, Paul C. van Oorschot, Evangelos Kranakis
    Detecting Intra-enterprise Scanning Worms based on Address Resolution. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:371-380 [Conf]
  7. Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot
    A White-Box DES Implementation for DRM Applications. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:1-15 [Conf]
  8. Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot
    On Key Distribution via True Broadcasting. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:81-88 [Conf]
  9. Paul C. van Oorschot
    Extending Cryptographic Logics of Belief to Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:232-243 [Conf]
  10. Paul C. van Oorschot, Michael J. Wiener
    Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:210-218 [Conf]
  11. Paul C. van Oorschot
    A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:576-581 [Conf]
  12. Paul C. van Oorschot, Michael J. Wiener
    Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:229-236 [Conf]
  13. Bart Preneel, Paul C. van Oorschot
    MDx-MAC and Building Fast MACs from Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:1-14 [Conf]
  14. Paul C. van Oorschot
    An Alternate Explanation of two BAN-logic "failures". [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:443-447 [Conf]
  15. Paul C. van Oorschot, Michael J. Wiener
    A Known Plaintext Attack on Two-Key Triple Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:318-325 [Conf]
  16. Paul C. van Oorschot, Michael J. Wiener
    On Diffie-Hellman Key Agreement with Short Exponents. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:332-343 [Conf]
  17. Bart Preneel, Paul C. van Oorschot
    On the Security of Two MAC Algorithms. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:19-32 [Conf]
  18. Paul C. van Oorschot, Stuart G. Stubblebine
    Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:31-43 [Conf]
  19. Mohammad Mannan, Paul C. van Oorschot
    A Protocol for Secure Public Instant Messaging. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:20-35 [Conf]
  20. Stuart G. Stubblebine, Paul C. van Oorschot
    Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:39-53 [Conf]
  21. Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
    Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:358-374 [Conf]
  22. Paul C. van Oorschot
    Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:1- [Conf]
  23. Tao Wan, Paul C. van Oorschot
    Analysis of BGP prefix origins during Google's May 2005 outage. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  24. Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone
    Some Computational Aspects of Root Finding in GF(qm). [Citation Graph (0, 0)][DBLP]
    ISSAC, 1988, pp:259-270 [Conf]
  25. Paul C. van Oorschot
    Revisiting Software Protection. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:1-13 [Conf]
  26. Mike Just, Paul C. van Oorschot
    Addressing the Problem of Undetected Signature Key Compromise. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  27. Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
    Pretty Secure BGP, psBGP. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  28. David Whyte, Evangelos Kranakis, Paul C. van Oorschot
    DNS-based Detection of Scanning Worms in an Enterprise Network. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  29. Mohammad Mannan, Paul C. van Oorschot
    Secure Public Instant Messaging. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:69-77 [Conf]
  30. Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot
    White-Box Cryptography and an AES Implementation. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:250-270 [Conf]
  31. Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
    A Generic Attack on Checksumming-Based Software Tamper Resistance. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:127-138 [Conf]
  32. Julie Thorpe, Paul C. van Oorschot
    Graphical Dictionaries and the Memorable Space of Graphical Passwords. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:135-150 [Conf]
  33. Mohammad Mannan, Paul C. van Oorschot
    On instant messaging worms, analysis and countermeasures. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:2-11 [Conf]
  34. Rainer A. Rueppel, Paul C. van Oorschot
    Modern key agreement techniques. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:458-465 [Journal]
  35. Michael Smith, Paul C. van Oorschot, Michael Willett
    Cryptographic Information Recovery Using Key Recover. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:21-27 [Journal]
  36. Whitfield Diffie, Paul C. van Oorschot, Michael J. Wiener
    Authentication and Authenticated Key Exchanges. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:2, pp:107-125 [Journal]
  37. Evangelos Kranakis, Paul C. van Oorschot
    Special Issue: Selected Areas in Cryptography - Introduction. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:12, n:3, pp:213- [Journal]
  38. Paul C. van Oorschot, Jean-Marc Robert, Miguel Vargas Martin
    A monitoring system for detecting repeated packets with applications to computer worms. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:3, pp:186-199 [Journal]
  39. Paul C. van Oorschot, Michael J. Wiener
    Parallel Collision Search with Cryptanalytic Applications. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:1, pp:1-28 [Journal]
  40. Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone
    Subgroup Refinement Algorithms for Root Finding in GF(q). [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1992, v:21, n:2, pp:228-239 [Journal]
  41. Albrecht Beutelspacher, Dieter Jungnickel, Paul C. van Oorschot, Scott A. Vanstone
    Pair-Splitting Sets in AG(m, q). [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1992, v:5, n:4, pp:451-459 [Journal]
  42. Paul C. van Oorschot, Anil Somayaji, Glenn Wurster
    Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:82-92 [Journal]
  43. Paul C. van Oorschot, Stuart G. Stubblebine
    On countering online dictionary attacks with login histories and humans-in-the-loop. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:235-258 [Journal]
  44. Paul C. van Oorschot, Scott A. Vanstone
    A geometric approach to root finding in GF(qm). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1989, v:35, n:2, pp:444-453 [Journal]
  45. Bart Preneel, Paul C. van Oorschot
    On the Security of Iterated Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:1, pp:188-199 [Journal]
  46. David Whyte, Paul C. van Oorschot, Evangelos Kranakis
    Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:393-402 [Conf]
  47. Sonia Chiasson, Paul C. van Oorschot, Robert Biddle
    Graphical Password Authentication Using Cued Click Points. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:359-374 [Conf]
  48. Paul C. van Oorschot, Scott A. Vanstone
    On splitting sets in block designs and finding roots of polynomials. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1990, v:84, n:1, pp:71-85 [Journal]
  49. Paul C. van Oorschot, Tao Wan, Evangelos Kranakis
    On interdomain routing security and pretty secure BGP (psBGP). [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal]

  50. Tracking Darkports for Network Defense. [Citation Graph (, )][DBLP]


  51. On Purely Automated Attacks and Click-Based Graphical Passwords. [Citation Graph (, )][DBLP]


  52. Improving Security Visualization with Exposure Map Filtering. [Citation Graph (, )][DBLP]


  53. Influencing users towards better passwords: persuasive cued click-points. [Citation Graph (, )][DBLP]


  54. SOMA: mutual approval for included content in web pages. [Citation Graph (, )][DBLP]


  55. Multiple password interference in text passwords and click-based graphical passwords. [Citation Graph (, )][DBLP]


  56. Exploring User Reactions to New Browser Cues for Extended Validation Certificates. [Citation Graph (, )][DBLP]


  57. CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. [Citation Graph (, )][DBLP]


  58. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. [Citation Graph (, )][DBLP]


  59. Weighing Down "The Unbearable Lightness of PIN Cracking". [Citation Graph (, )][DBLP]


  60. Passwords: If We're So Smart, Why Are We Still Using Them? [Citation Graph (, )][DBLP]


  61. Discovering Packet Structure through Lightweight Hierarchical Clustering. [Citation Graph (, )][DBLP]


  62. Centered Discretization with Application to Graphical Passwords. [Citation Graph (, )][DBLP]


  63. Persuasion for Stronger Passwords: Motivation and Pilot Study. [Citation Graph (, )][DBLP]


  64. Digital Objects as Passwords. [Citation Graph (, )][DBLP]


  65. Privacy-enhanced sharing of personal content on the web. [Citation Graph (, )][DBLP]


  66. A second look at the usability of click-based graphical passwords. [Citation Graph (, )][DBLP]


  67. Usability of anonymous web browsing: an examination of Tor interfaces and deployability. [Citation Graph (, )][DBLP]


  68. Improving text passwords through persuasion. [Citation Graph (, )][DBLP]


  69. TwoStep: An Authentication Method Combining Text and Graphical Passwords. [Citation Graph (, )][DBLP]


  70. Reducing threats from flawed security APIs: The banking PIN case. [Citation Graph (, )][DBLP]


  71. Internet geolocation: Evasion and counterevasion. [Citation Graph (, )][DBLP]


Search in 0.107secs, Finished in 0.110secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002