Search the dblp DataBase
Paul C. van Oorschot :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Charles J. Colbourn , Paul C. van Oorschot Applications of Combinatorial Designs in Computer Science. [Citation Graph (1, 0)][DBLP ] ACM Comput. Surv., 1989, v:21, n:2, pp:223-250 [Journal ] Ashraf Matrawy , Paul C. van Oorschot , Anil Somayaji Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:104-121 [Conf ] Tao Wan , Evangelos Kranakis , Paul C. van Oorschot S-RIP: A Secure Distance Vector Routing Protocol. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:103-119 [Conf ] Simon N. Foley , Abe Singer , Michael E. Locasto , Stelios Sidiroglou , Angelos D. Keromytis , John McDermott , Julie Thorpe , Paul C. van Oorschot , Anil Somayaji , Richard Ford , Mark Bush , Alex Boulatov Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:393-396 [Conf ] Julie Thorpe , Paul C. van Oorschot Towards Secure Design Choices for Implementing Graphical Passwords. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:50-60 [Conf ] David Whyte , Paul C. van Oorschot , Evangelos Kranakis Detecting Intra-enterprise Scanning Worms based on Address Resolution. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:371-380 [Conf ] Stanley Chow , Philip A. Eisen , Harold Johnson , Paul C. van Oorschot A White-Box DES Implementation for DRM Applications. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2002, pp:1-15 [Conf ] Mike Just , Evangelos Kranakis , Danny Krizanc , Paul C. van Oorschot On Key Distribution via True Broadcasting. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:81-88 [Conf ] Paul C. van Oorschot Extending Cryptographic Logics of Belief to Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:232-243 [Conf ] Paul C. van Oorschot , Michael J. Wiener Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:210-218 [Conf ] Paul C. van Oorschot A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:576-581 [Conf ] Paul C. van Oorschot , Michael J. Wiener Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:229-236 [Conf ] Bart Preneel , Paul C. van Oorschot MDx-MAC and Building Fast MACs from Hash Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:1-14 [Conf ] Paul C. van Oorschot An Alternate Explanation of two BAN-logic "failures". [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:443-447 [Conf ] Paul C. van Oorschot , Michael J. Wiener A Known Plaintext Attack on Two-Key Triple Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:318-325 [Conf ] Paul C. van Oorschot , Michael J. Wiener On Diffie-Hellman Key Agreement with Short Exponents. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:332-343 [Conf ] Bart Preneel , Paul C. van Oorschot On the Security of Two MAC Algorithms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:19-32 [Conf ] Paul C. van Oorschot , Stuart G. Stubblebine Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:31-43 [Conf ] Mohammad Mannan , Paul C. van Oorschot A Protocol for Secure Public Instant Messaging. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:20-35 [Conf ] Stuart G. Stubblebine , Paul C. van Oorschot Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:39-53 [Conf ] Tao Wan , Evangelos Kranakis , Paul C. van Oorschot Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:358-374 [Conf ] Paul C. van Oorschot Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement. [Citation Graph (0, 0)][DBLP ] IMA Conf., 1995, pp:1- [Conf ] Tao Wan , Paul C. van Oorschot Analysis of BGP prefix origins during Google's May 2005 outage. [Citation Graph (0, 0)][DBLP ] IPDPS, 2006, pp:- [Conf ] Alfred Menezes , Paul C. van Oorschot , Scott A. Vanstone Some Computational Aspects of Root Finding in GF(qm ). [Citation Graph (0, 0)][DBLP ] ISSAC, 1988, pp:259-270 [Conf ] Paul C. van Oorschot Revisiting Software Protection. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:1-13 [Conf ] Mike Just , Paul C. van Oorschot Addressing the Problem of Undetected Signature Key Compromise. [Citation Graph (0, 0)][DBLP ] NDSS, 1999, pp:- [Conf ] Tao Wan , Evangelos Kranakis , Paul C. van Oorschot Pretty Secure BGP, psBGP. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] David Whyte , Evangelos Kranakis , Paul C. van Oorschot DNS-based Detection of Scanning Worms in an Enterprise Network. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] Mohammad Mannan , Paul C. van Oorschot Secure Public Instant Messaging. [Citation Graph (0, 0)][DBLP ] PST, 2004, pp:69-77 [Conf ] Stanley Chow , Philip A. Eisen , Harold Johnson , Paul C. van Oorschot White-Box Cryptography and an AES Implementation. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:250-270 [Conf ] Glenn Wurster , Paul C. van Oorschot , Anil Somayaji A Generic Attack on Checksumming-Based Software Tamper Resistance. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:127-138 [Conf ] Julie Thorpe , Paul C. van Oorschot Graphical Dictionaries and the Memorable Space of Graphical Passwords. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:135-150 [Conf ] Mohammad Mannan , Paul C. van Oorschot On instant messaging worms, analysis and countermeasures. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:2-11 [Conf ] Rainer A. Rueppel , Paul C. van Oorschot Modern key agreement techniques. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:458-465 [Journal ] Michael Smith , Paul C. van Oorschot , Michael Willett Cryptographic Information Recovery Using Key Recover. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:1, pp:21-27 [Journal ] Whitfield Diffie , Paul C. van Oorschot , Michael J. Wiener Authentication and Authenticated Key Exchanges. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1992, v:2, n:2, pp:107-125 [Journal ] Evangelos Kranakis , Paul C. van Oorschot Special Issue: Selected Areas in Cryptography - Introduction. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1997, v:12, n:3, pp:213- [Journal ] Paul C. van Oorschot , Jean-Marc Robert , Miguel Vargas Martin A monitoring system for detecting repeated packets with applications to computer worms. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:3, pp:186-199 [Journal ] Paul C. van Oorschot , Michael J. Wiener Parallel Collision Search with Cryptanalytic Applications. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:1, pp:1-28 [Journal ] Alfred Menezes , Paul C. van Oorschot , Scott A. Vanstone Subgroup Refinement Algorithms for Root Finding in GF(q). [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1992, v:21, n:2, pp:228-239 [Journal ] Albrecht Beutelspacher , Dieter Jungnickel , Paul C. van Oorschot , Scott A. Vanstone Pair-Splitting Sets in AG(m, q) . [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1992, v:5, n:4, pp:451-459 [Journal ] Paul C. van Oorschot , Anil Somayaji , Glenn Wurster Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:82-92 [Journal ] Paul C. van Oorschot , Stuart G. Stubblebine On countering online dictionary attacks with login histories and humans-in-the-loop. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:235-258 [Journal ] Paul C. van Oorschot , Scott A. Vanstone A geometric approach to root finding in GF(qm ). [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1989, v:35, n:2, pp:444-453 [Journal ] Bart Preneel , Paul C. van Oorschot On the Security of Iterated Message Authentication Codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:1, pp:188-199 [Journal ] David Whyte , Paul C. van Oorschot , Evangelos Kranakis Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:393-402 [Conf ] Sonia Chiasson , Paul C. van Oorschot , Robert Biddle Graphical Password Authentication Using Cued Click Points. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:359-374 [Conf ] Paul C. van Oorschot , Scott A. Vanstone On splitting sets in block designs and finding roots of polynomials. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1990, v:84, n:1, pp:71-85 [Journal ] Paul C. van Oorschot , Tao Wan , Evangelos Kranakis On interdomain routing security and pretty secure BGP (psBGP). [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal ] Tracking Darkports for Network Defense. [Citation Graph (, )][DBLP ] On Purely Automated Attacks and Click-Based Graphical Passwords. [Citation Graph (, )][DBLP ] Improving Security Visualization with Exposure Map Filtering. [Citation Graph (, )][DBLP ] Influencing users towards better passwords: persuasive cued click-points. [Citation Graph (, )][DBLP ] SOMA: mutual approval for included content in web pages. [Citation Graph (, )][DBLP ] Multiple password interference in text passwords and click-based graphical passwords. [Citation Graph (, )][DBLP ] Exploring User Reactions to New Browser Cues for Extended Validation Certificates. [Citation Graph (, )][DBLP ] CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. [Citation Graph (, )][DBLP ] Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. [Citation Graph (, )][DBLP ] Weighing Down "The Unbearable Lightness of PIN Cracking". [Citation Graph (, )][DBLP ] Passwords: If We're So Smart, Why Are We Still Using Them? [Citation Graph (, )][DBLP ] Discovering Packet Structure through Lightweight Hierarchical Clustering. [Citation Graph (, )][DBLP ] Centered Discretization with Application to Graphical Passwords. [Citation Graph (, )][DBLP ] Persuasion for Stronger Passwords: Motivation and Pilot Study. [Citation Graph (, )][DBLP ] Digital Objects as Passwords. [Citation Graph (, )][DBLP ] Privacy-enhanced sharing of personal content on the web. [Citation Graph (, )][DBLP ] A second look at the usability of click-based graphical passwords. [Citation Graph (, )][DBLP ] Usability of anonymous web browsing: an examination of Tor interfaces and deployability. [Citation Graph (, )][DBLP ] Improving text passwords through persuasion. [Citation Graph (, )][DBLP ] TwoStep: An Authentication Method Combining Text and Graphical Passwords. [Citation Graph (, )][DBLP ] Reducing threats from flawed security APIs: The banking PIN case. [Citation Graph (, )][DBLP ] Internet geolocation: Evasion and counterevasion. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.009secs