<  Back to the Polytechnique Montréal portal

Items where Author is "Oorschot, Paul C. van"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Jump to: A | B | M | S
Number of items: 13.

A

Abdou, A.R., Barrera, D., & Oorschot, P. C. (2015, December). What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks [Paper]. International Conference on Passwords (PASSWORDS 2015), Cambridge, UK. External link

Alsaleh, M., Barrera, D., & Oorschot, P. C. (2008, December). Improving Security Visualization with Exposure Map Filtering [Paper]. Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA. External link

B

Barrera, D., McCarney, D., Clark, J., & Oorschot, P. C. (2014, July). Baton: certificate agility for android's decentralized signing infrastructure [Paper]. ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec 2014), Oxford, United Kingdom (12 pages). External link

Barrera, D., Enck, W., & Oorschot, P. C. (2012, May). Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems [Paper]. Mobile Security Technologies Workshop (IEEE MoST 2012), San Francisco, Calif. (10 pages). External link

Barrera, D., Clark, J., McCarney, D., & Oorschot, P. C. (2012, October). Understanding and improving app installation security mechanisms through empirical analysis of android [Paper]. 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Raleigh, North Carolina. External link

Barrera, D., Wurster, G., & Oorschot, P. C. (2011). Back to the Future: Revisiting IPv6 Privacy Extensions. ;Login:, 36(1), 16-26. External link

Barrera, D., & Oorschot, P. C. (2011). Secure Software Installation on Smartphones. IEEE Security & Privacy Magazine, 9(3), 42-48. External link

Barrera, D., & Oorschot, P. C. (2010). Accommodating IPv6 Addresses in Security Visualization Tools. Information Visualization, 10(2), 107-116. External link

Barrera, D., Kayacic, H. G., Oorschot, P. C. , & Somayaji, A. (2010, October). A methodology for empirical analysis of permission-based security models and its application to android [Paper]. 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois. External link

Barrera, D., & Oorschot, P. C. (2009, October). Security visualization tools and IPv6 addresses [Paper]. 6th International Workshop on Visualization for Cyber Security (VizSec 2009), Atlantic City, NJ. External link

M

McCarney, D., Barrera, D., Clark, J., Chiasson, S., & Oorschot, P. C. (2012, December). Tapas: design, implementation, and usability evaluation of a password manager [Paper]. 28th Annual Computer Security Applications Conference (ACSAC 2012), Orlando, Florida. External link

Mannan, M., Barrera, D., Brown, C. D., Lie, D., & Oorschot, P. C. (2011, February). Mercury: Recovering Forgotten Passwords Using Personal Devices [Paper]. 15th International Conference on Financial Cryptography and Data Security (FC 2011), Gros Islet, St. Lucia. External link

S

Skillen, A., Barrera, D., & Oorschot, P. C. (2013, November). Deadbolt: locking down android disk encryption [Paper]. ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Berlin, Germany. External link

List generated on: Tue Sep 10 08:31:51 2024 EDT