CPV: Delay-Based Location Verification for the Internet
Abdou, AbdelRahman, Matrawy, Ashraf, van Oorschot, P. C.
Published in IEEE transactions on dependable and secure computing (01.03.2017)
Published in IEEE transactions on dependable and secure computing (01.03.2017)
Get full text
Journal Article
Non-adherence in difficult-to-treat rheumatoid arthritis from the perspectives of patients and rheumatologists: a concept mapping study
Roodenrijs, Nadia M T, van der Goes, Marlies C, Welsing, Paco M J, van Oorschot, Eline P C, Nikiphorou, Elena, Nijhof, Nienke C, Tekstra, Janneke, Lafeber, Floris P J G, Jacobs, Johannes W G, van Laar, Jacob M, Geenen, Rinie
Published in Rheumatology (Oxford, England) (03.11.2021)
Published in Rheumatology (Oxford, England) (03.11.2021)
Get full text
Journal Article
Hardware-assisted circumvention of self-hashing software tamper resistance
van Oorschot, P.C., Somayaji, A., Wurster, G.
Published in IEEE transactions on dependable and secure computing (01.04.2005)
Published in IEEE transactions on dependable and secure computing (01.04.2005)
Get full text
Journal Article
SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements
Clark, J., van Oorschot, P. C.
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Get full text
Conference Proceeding
SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit
Herley, Cormac, Van Oorschot, P.C.
Published in 2017 IEEE Symposium on Security and Privacy (SP) (01.05.2017)
Published in 2017 IEEE Symposium on Security and Privacy (SP) (01.05.2017)
Get full text
Conference Proceeding
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
Bonneau, J., Herley, C., van Oorschot, P. C., Stajano, F.
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Get full text
Conference Proceeding
Revisiting Defenses against Large-Scale Online Password Guessing Attacks
Alsaleh, M., Mannan, M., van Oorschot, P. C.
Published in IEEE transactions on dependable and secure computing (01.01.2012)
Published in IEEE transactions on dependable and secure computing (01.01.2012)
Get full text
Journal Article
Purely Automated Attacks on PassPoints-Style Graphical Passwords
van Oorschot, P C, Salehi-Abari, A, Thorpe, J
Published in IEEE transactions on information forensics and security (01.09.2010)
Published in IEEE transactions on information forensics and security (01.09.2010)
Get full text
Journal Article
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects
Biddle, R., Mannan, M., van Oorschot, P. C., Whalen, T.
Published in IEEE transactions on information forensics and security (01.09.2011)
Published in IEEE transactions on information forensics and security (01.09.2011)
Get full text
Journal Article