Paul C. van Oorschot
Carleton University
H-index: 84
North America-Canada
Top articles of Paul C. van Oorschot
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Influences of displaying permission-related information on web single sign-on login decisions | Computers & Security (Apr. 2024) | Srivathsan G Morkonda Sonia Chiasson Paul C van Oorschot | 2024/4 |
Owl: An augmented password-authenticated key exchange scheme | Financial Cryptography 2024 (Cryptology ePrint) | Feng Hao Samiran Bag Liqun Chen Paul C van Oorschot | 2024 |
Systematic analysis and comparison of security advice as datasets | Computers & Security Jan.2023 (2022 preprint arXiv:2206.09237) | Christopher Bellman Paul C van Oorschot | 2023/1 |
"Sign in with ...Privacy": Timely disclosure of privacy differences among web SSO login options | preprint arXiv:2209.04490 | Srivathsan G Morkonda Sonia Chiasson Paul C van Oorschot | 2023/8/17 |
A close look at a systematic method for analyzing sets of security advice | Journal of Cybersecurity | David Barrera Christopher Bellman Paul C van Oorschot | 2023/7/3 |
Memory errors and memory safety: A look at Java and Rust | IEEE Security & Privacy | Paul C van Oorschot | 2023/5/1 |
Memory errors and memory safety: C as a case study | IEEE Security & Privacy | Paul C van Oorschot | 2023/4/14 |
Security best practices: A critical analysis using IoT as a case study | ACM TOPS/Trans. on Privacy and Security | D Barrera C Bellman PC van Oorschot | 2023/3 |
Security as an artificial science, system administration, and tools | IEEE Security & Privacy | Paul C van Oorschot | 2022/11/2 |
Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the World | Paul C van Oorschot | 2022/8 | |
SoK: Password-authenticated key exchange - Theory, practice, standardization and real-world lessons | Feng Hao Paul C van Oorschot | 2022/5 | |
A view of security as 20 subject areas in four themes | IEEE Security & Privacy | Paul C van Oorschot | 2022/1/25 |
SoK: Securing email - a stakeholder-based analysis | Financial Crypto 2021; extended report as arXiv.org1804.07706 | Jeremy Clark PC van Oorschot Scott Ruoti Kent Seamons Daniel Zappala | 2021 |
Empirical analysis and privacy implications in OAuth-based single sign-on systems | Srivathsan G Morkonda Sonia Chiasson Paul C van Oorschot | 2021/11/15 | |
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin | Paul C. van Oorschot | 2021/10 | |
Coevolution of security’s Body of Knowledge and curricula | IEEE Security & Privacy | Paul C van Oorschot | 2021/9/1 |
Toward unseating the unsafe C programming language | IEEE Security & Privacy | Paul C van Oorschot | 2021/3/1 |
Empirical scanning analysis of Censys and Shodan | Christopher Bennett AbdelRahman Abdou Paul C van Oorschot | 2021 | |
CAPS: Smoothly transitioning to a more resilient web PKI | Stephanos Matsumoto Jay Bosamiya Yucheng Dai Paul van Oorschot Bryan Parno | 2020/12 | |
Blockchains and stealth tactics for teaching security | IEEE Security & Privacy | Paul C van Oorschot | 2020/9/1 |