Comparative Analysis of Control Plane Security of SDN and Conventional Networks
Abdou, AbdelRahman, van Oorschot, Paul C., Wan, Tao
Published in IEEE Communications surveys and tutorials (01.01.2018)
Published in IEEE Communications surveys and tutorials (01.01.2018)
Get full text
Journal Article
Purely Automated Attacks on PassPoints-Style Graphical Passwords
van Oorschot, P C, Salehi-Abari, A, Thorpe, J
Published in IEEE transactions on information forensics and security (01.09.2010)
Published in IEEE transactions on information forensics and security (01.09.2010)
Get full text
Journal Article
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
Bonneau, J., Herley, C., van Oorschot, P. C., Stajano, F.
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Get full text
Conference Proceeding
Accurate One-Way Delay Estimation With Reduced Client Trustworthiness
Abdou, AbdelRahman, Matrawy, Ashraf, van Oorschot, Paul C.
Published in IEEE communications letters (01.05.2015)
Published in IEEE communications letters (01.05.2015)
Get full text
Journal Article
Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying
Abdou, AbdelRahman, Matrawy, Ashraf, van Oorschot, Paul C.
Published in IEEE communications letters (01.01.2015)
Published in IEEE communications letters (01.01.2015)
Get full text
Journal Article
Revisiting Defenses against Large-Scale Online Password Guessing Attacks
Alsaleh, M., Mannan, M., van Oorschot, P. C.
Published in IEEE transactions on dependable and secure computing (01.01.2012)
Published in IEEE transactions on dependable and secure computing (01.01.2012)
Get full text
Journal Article
On the security and usability of dynamic cognitive game CAPTCHAs
Mohamed, Manar, Gao, Song, Sachdeva, Niharika, Saxena, Nitesh, Zhang, Chengcui, Kumaraguru, Ponnurangam, Van Oorschot, Paul C.
Published in Journal of computer security (01.01.2017)
Published in Journal of computer security (01.01.2017)
Get full text
Journal Article
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion
Yi Xu, Reynaga, Gerardo, Chiasson, Sonia, Frahm, Jan-Michael, Monrose, Fabian, van Oorschot, Paul C.
Published in IEEE transactions on dependable and secure computing (01.09.2014)
Published in IEEE transactions on dependable and secure computing (01.09.2014)
Get full text
Journal Article
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects
Biddle, R., Mannan, M., van Oorschot, P. C., Whalen, T.
Published in IEEE transactions on information forensics and security (01.09.2011)
Published in IEEE transactions on information forensics and security (01.09.2011)
Get full text
Journal Article
Reducing Unauthorized Modification of Digital Objects
Van Oorschot, P. C., Wurster, G.
Published in IEEE transactions on software engineering (01.01.2012)
Published in IEEE transactions on software engineering (01.01.2012)
Get full text
Journal Article
Onboarding and Software Update Architecture for IoT Devices
Gupta, Hemant, van Oorschot, Paul C.
Published in 2019 17th International Conference on Privacy, Security and Trust (PST) (01.08.2019)
Published in 2019 17th International Conference on Privacy, Security and Trust (PST) (01.08.2019)
Get full text
Conference Proceeding