238 results on '"Paul C. van Oorschot"'
Search Results
2. SoK: Securing Email - A Stakeholder-Based Analysis.
3. Empirical Analysis and Privacy Implications in OAuth-based Single Sign-On Systems.
4. Computer Security and the Internet - Tools and Jewels from Malware to Bitcoin, Second Edition
5. CAPS: Smoothly Transitioning to a More Resilient Web PKI.
6. Computer Security and the Internet - Tools and Jewels
7. Onboarding and Software Update Architecture for IoT Devices.
8. Analysis, Implications, and Challenges of an Evolving Consumer IoT Security Landscape.
9. BP: Formal Proofs, the Fine Print and Side Effects.
10. Memory Errors and Memory Safety: A Look at Java and Rust
11. Memory Errors and Memory Safety: C as a Case Study
12. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit.
13. Accurate Manipulation of Delay-based Internet Geolocation.
14. Revisiting password rules: facilitating human management of passwords.
15. Device fingerprinting for augmenting web authentication: classification and analysis of methods.
16. Security as an Artificial Science, System Administration, and Tools
17. What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks.
18. Heuristics for the evaluation of captchas on smartphones.
19. Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients.
20. Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.
21. A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
22. Baton: certificate agility for android's decentralized signing infrastructure.
23. An Administrator's Guide to Internet Password Research.
24. A Discussion on Security Education in Academia.
25. A View of Security as 20 Subject Areas in Four Themes
26. Markets for zero-day exploits: ethics and implications.
27. SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
28. Deadbolt: locking down android disk encryption.
29. Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
30. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
31. Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?
32. Tapas: design, implementation, and usability evaluation of a password manager.
33. Understanding and improving app installation security mechanisms through empirical analysis of android.
34. Coevolution of Security’s Body of Knowledge and Curricula
35. Science, Security and Academic Literature: Can We Learn from History?
36. A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation.
37. Exploration and Field Study of a Password Manager Using Icon-Based Passwords.
38. Mercury: Recovering Forgotten Passwords Using Personal Devices.
39. Network scan detection with LQS: a lightweight, quick and stateful algorithm.
40. Exploring usability effects of increasing security in click-based graphical passwords.
41. A control point for reducing root abuse of file-system privileges.
42. A methodology for empirical analysis of permission-based security models and its application to android.
43. TwoStep: An Authentication Method Combining Text and Graphical Passwords.
44. Security visualization tools and IPv6 addresses.
45. Passwords: If We're So Smart, Why Are We Still Using Them?
46. Browser interfaces and extended validation SSL certificates: an empirical study.
47. Multiple password interference in text passwords and click-based graphical passwords.
48. Localization of credential information to address increasingly inevitable data breaches.
49. The developer is the enemy.
50. Privacy-enhanced sharing of personal content on the web.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.