van Oorschot, P. C.
372  results:
Search for persons X
?
1

SoK: Securing Email—A Stakeholder-Based Analysis:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
Clark, Jeremy ; van Oorschot, P. C. ; Ruoti, Scott.. - p. 360-390 , 2021
 
?
3

Letter to the Editor:

McLean, John D. ; Herley, Cormac ; Van Oorschot, P.C.
IEEE Security & Privacy.  16 (2018)  3 - p. 6-10 , 2018
 
?
4

Server Location Verification (SLV) and Server Location Pinn..:

Abdou, Abdelrahman ; Oorschot, P. C. Van
ACM Transactions on Privacy and Security.  21 (2017)  1 - p. 1-26 , 2017
 
?
5

Server Location Verification (SLV) and Server Location Pinn..:

Abdou, Abdelrahman ; Oorschot, P. C. Van
ACM Transactions on Privacy and Security (TOPS).  21 (2017)  1 - p. 1-26 , 2017
 
?
6

CPV: Delay-Based Location Verification for the Internet:

Abdou, AbdelRahman ; Matrawy, Ashraf ; van Oorschot, P. C.
IEEE Transactions on Dependable and Secure Computing.  14 (2017)  2 - p. 130-144 , 2017
 
?
7

SoK: Science, Security and the Elusive Goal of Security as ..:

, In: 2017 IEEE Symposium on Security and Privacy (SP),
Herley, Cormac ; Van Oorschot, P.C. - p. 99-120 , 2017
 
?
8

Device fingerprinting for augmenting web authentication ..:

, In: Proceedings of the 32nd Annual Conference on Computer Security Applications,
Alaca, Furkan ; van Oorschot, P. C. - p. 289-301 , 2016
 
?
9

Quantifying the security advantage of password expiration p..:

Chiasson, Sonia ; van Oorschot, P. C.
Designs, Codes and Cryptography.  77 (2015)  2-3 - p. 401-408 , 2015
 
?
11

Evaluation in the absence of absolute ground truth: toward ..:

Alsaleh, Mansour ; van Oorschot, P. C.
International Journal of Information Security.  12 (2012)  2 - p. 97-110 , 2012
 
?
13

Revisiting Defenses against Large-Scale Online Password Gue..:

Alsaleh, M. ; Mannan, M. ; van Oorschot, P. C.
IEEE Transactions on Dependable and Secure Computing.  9 (2012)  1 - p. 128-141 , 2012
 
?
14

Network scan detection with LQS : a lightweight, quick a..:

, In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security,
Alsaleh, Mansour ; van Oorschot, P. C. - p. 102-113 , 2011
 
?
15

Exploring usability effects of increasing security in click..:

, In: Proceedings of the 26th Annual Computer Security Applications Conference,
 
1-15