<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Oorschot, Paul C. van"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Aller à : A | B | M | S
Nombre de documents: 13

A

Abdou, A.R., Barrera, D., & Oorschot, P. C. (décembre 2015). What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks [Communication écrite]. International Conference on Passwords (PASSWORDS 2015), Cambridge, UK. Lien externe

Alsaleh, M., Barrera, D., & Oorschot, P. C. (décembre 2008). Improving Security Visualization with Exposure Map Filtering [Communication écrite]. Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA. Lien externe

B

Barrera, D., McCarney, D., Clark, J., & Oorschot, P. C. (juillet 2014). Baton: certificate agility for android's decentralized signing infrastructure [Communication écrite]. ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec 2014), Oxford, United Kingdom (12 pages). Lien externe

Barrera, D., Enck, W., & Oorschot, P. C. (mai 2012). Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems [Communication écrite]. Mobile Security Technologies Workshop (IEEE MoST 2012), San Francisco, Calif. (10 pages). Lien externe

Barrera, D., Clark, J., McCarney, D., & Oorschot, P. C. (octobre 2012). Understanding and improving app installation security mechanisms through empirical analysis of android [Communication écrite]. 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Raleigh, North Carolina. Lien externe

Barrera, D., Wurster, G., & Oorschot, P. C. (2011). Back to the Future: Revisiting IPv6 Privacy Extensions. ;Login:, 36(1), 16-26. Lien externe

Barrera, D., & Oorschot, P. C. (2011). Secure Software Installation on Smartphones. IEEE Security & Privacy Magazine, 9(3), 42-48. Lien externe

Barrera, D., & Oorschot, P. C. (2010). Accommodating IPv6 Addresses in Security Visualization Tools. Information Visualization, 10(2), 107-116. Lien externe

Barrera, D., Kayacic, H. G., Oorschot, P. C. , & Somayaji, A. (octobre 2010). A methodology for empirical analysis of permission-based security models and its application to android [Communication écrite]. 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois. Lien externe

Barrera, D., & Oorschot, P. C. (octobre 2009). Security visualization tools and IPv6 addresses [Communication écrite]. 6th International Workshop on Visualization for Cyber Security (VizSec 2009), Atlantic City, NJ. Lien externe

M

McCarney, D., Barrera, D., Clark, J., Chiasson, S., & Oorschot, P. C. (décembre 2012). Tapas: design, implementation, and usability evaluation of a password manager [Communication écrite]. 28th Annual Computer Security Applications Conference (ACSAC 2012), Orlando, Florida. Lien externe

Mannan, M., Barrera, D., Brown, C. D., Lie, D., & Oorschot, P. C. (février 2011). Mercury: Recovering Forgotten Passwords Using Personal Devices [Communication écrite]. 15th International Conference on Financial Cryptography and Data Security (FC 2011), Gros Islet, St. Lucia. Lien externe

S

Skillen, A., Barrera, D., & Oorschot, P. C. (novembre 2013). Deadbolt: locking down android disk encryption [Communication écrite]. ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Berlin, Germany. Lien externe

Liste produite: Thu Dec 26 05:24:11 2024 EST.