Handbook of Applied Cryptography AJ Menezes, PC van Oorschot, SA Vanstone CRC Press, 1996 | 24611* | 1996 |
Authentication and authenticated key exchanges W Diffie, PC van Oorschot, MJ Wiener Designs, Codes and Cryptography 2 (2), 107-125, 1992 | 1712 | 1992 |
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes J Bonneau, C Herley, PC van Oorschot, F Stajano IEEE Symp. on Security and Privacy (Oakland 2012), 2012 | 1404 | 2012 |
Graphical passwords: Learning from the first twelve years R Biddle, S Chiasson, PC van Oorschot ACM Computing Surveys 44 (4), 19:1-41, 2012 | 953 | 2012 |
Parallel collision search with cryptanalytic applications PC van Oorschot, MJ Wiener Journal of Cryptology 12 (1), 1-28, 1999 | 894 | 1999 |
A methodology for empirical analysis of permission-based security models and its application to Android D Barrera, HG Kayacik, PC van Oorschot, A Somayaji ACM CCS 2010: Conf. on Computer and Communications Security, 73-84, 2010 | 733 | 2010 |
White-box cryptography and an AES implementation S Chow, P Eisen, H Johnson, P van Oorschot Selected Areas in Cryptography (SAC 2003), 250-270, 2003 | 656 | 2003 |
Graphical password authentication using cued click points S Chiasson, P van Oorschot, R Biddle ESORICS 2007: European Symp. on Research in Computer Security, 359-374, 2007 | 513 | 2007 |
A white-box DES implementation for DRM applications S Chow, P Eisen, H Johnson, P van Oorschot ACM CCS Workshop on Digital Rights Management, 1-15, 2003 | 510 | 2003 |
On unifying some cryptographic protocol logics PF Syverson, PC van Oorschot IEEE Symp. on Security and Privacy (Oakland 1994), 14-28, 1994 | 510 | 1994 |
A research agenda acknowledging the persistence of passwords C Herley, PC van Oorschot IEEE Security & Privacy 10 (1), 28-36, 2012 | 385 | 2012 |
MDx-MAC and building fast MACs from hash functions B Preneel, P van Oorschot CRYPTO’95: Advances in Cryptology, 1-14, 1995 | 382 | 1995 |
Passwords and the evolution of imperfect authentication J Bonneau, C Herley, PC van Oorschot, F Stajano Communications of the ACM 58 (7), 78-87, 2015 | 359 | 2015 |
A usability study and critique of two password managers S Chiasson, PC van Oorschot, R Biddle USENIX Security 2006: 15th USENIX Security Symposium, 1-16, 2006 | 355 | 2006 |
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements J Clark, PC van Oorschot IEEE Symp. on Security and Privacy (Oakland 2013), 2013 | 343 | 2013 |
Human-seeded attacks and exploiting hot-spots in graphical passwords J Thorpe, PC van Oorschot USENIX Security 2007: 16th USENIX Security Symposium, 2007 | 310 | 2007 |
Influencing users towards better passwords: persuasive cued click-points S Chiasson, A Forget, R Biddle, PC van Oorschot BCS-HCI 2008: Proc. 22nd British HCI Group Annual Conference on People and …, 2008 | 296 | 2008 |
Multiple password interference in text and click-based graphical passwords S Chiasson, A Forget, E Stobert, P Van Oorschot, R Biddle ACM CCS 2009: Conf. on Computer and Communications Security 11, 2009 | 289* | 2009 |
Method and apparatus for correcting improper encryption and/or for reducing memory storage L Dilkie, PC Van Oorschot US Patent 6,341,164, 2002 | 282 | 2002 |
An Introduction to Error Correcting Codes with Applications SA Vanstone, PC van Oorschot Kluwer Academic Publishers, 1989 | 273* | 1989 |