Paul C Van Oorschot


Ontology type: schema:Person     


Person Info

NAME

Paul C

SURNAME

Van Oorschot

Publications in SciGraph latest 50 shown

  • 2021-10-23 SoK: Securing Email—A Stakeholder-Based Analysis in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2021 Computer Security and the Internet, Tools and Jewels from Malware to Bitcoin in NONE
  • 2020 Computer Security and the Internet, Tools and Jewels in NONE
  • 2016 What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks in TECHNOLOGY AND PRACTICE OF PASSWORDS
  • 2015-04-04 Quantifying the security advantage of password expiration policies in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2012-11-08 Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2012 Mercury: Recovering Forgotten Passwords Using Personal Devices in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2012 Exploration and Field Study of a Password Manager Using Icon-Based Passwords in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2012 Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? in INFORMATION SECURITY
  • 2009-05-08 User interface design affects security: patterns in click-based graphical passwords in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2009 TwoStep: An Authentication Method Combining Text and Graphical Passwords in E-TECHNOLOGIES: INNOVATION IN AN OPEN WORLD
  • 2009 Passwords: If We’re So Smart, Why Are We Still Using Them? in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2008 Persuasion for Stronger Passwords: Motivation and Pilot Study in PERSUASIVE TECHNOLOGY
  • 2008 Exploring User Reactions to New Browser Cues for Extended Validation Certificates in COMPUTER SECURITY - ESORICS 2008
  • 2008 Weighing Down “The Unbearable Lightness of PIN Cracking” in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2008 CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud in COMPUTER SECURITY - ESORICS 2008
  • 2007 Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2007 Graphical Password Authentication Using Cued Click Points in COMPUTER SECURITY – ESORICS 2007
  • 2006-03-08 A monitoring system for detecting repeated packets with applications to computer worms in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2006 A Protocol for Secure Public Instant Messaging in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2005 Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2005 Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2004 Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop in FINANCIAL CRYPTOGRAPHY
  • 2004 Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) in INFORMATION AND COMMUNICATIONS SECURITY
  • 2004 S-RIP: A Secure Distance Vector Routing Protocol in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2003-02-17 White-Box Cryptography and an AES Implementation in SELECTED AREAS IN CRYPTOGRAPHY
  • 2003 Revisiting Software Protection in INFORMATION SECURITY
  • 2003 A White-Box DES Implementation for DRM Applications in DIGITAL RIGHTS MANAGEMENT
  • 1999-01 Parallel Collision Search with Cryptanalytic Applications in JOURNAL OF CRYPTOLOGY
  • 1997-11 Introduction in DESIGNS, CODES AND CRYPTOGRAPHY
  • 1997 Introduction in SELECTED AREAS IN CRYPTOGRAPHY
  • 1996 On Diffie-Hellman Key Agreement with Short Exponents in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’96
  • 1996 On the Security of Two MAC Algorithms in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’96
  • 1996 Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude in ADVANCES IN CRYPTOLOGY — CRYPTO ’96
  • 1995 MDx-MAC and Building Fast MACs from Hash Functions in ADVANCES IN CRYPTOLOGY — CRYPT0’ 95
  • 1995 Design choices and security implications in implementing Diffie-Hellman key agreement in CRYPTOGRAPHY AND CODING
  • 1994 An Alternate Explanation of two BAN-logic “failures” in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’93
  • 1992-06 Authentication and authenticated key exchanges in DESIGNS, CODES AND CRYPTOGRAPHY
  • 1991 A Comparison of Practical Public-Key Cryptosystems based on Integer Factorization and Discrete Logarithms in ADVANCES IN CRYPTOLOGY-CRYPT0’ 90
  • 1991 A Known-Plaintext Attack on Two-Key Triple Encryption in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’90
  • 1989 An Introduction to Error Correcting Codes with Applications in NONE
  • 1989 Some computational aspects of root finding in GF(qm) in SYMBOLIC AND ALGEBRAIC COMPUTATION
  • 1988 Complexity Issues for Public Key Cryptography in PERFORMANCE LIMITS IN COMMUNICATION THEORY AND PRACTICE
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.34428.39", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.46078.3d", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.10698.36", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.1008.9", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.439950.2", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.419815.0", 
            "type": "Organization"
          }
        ], 
        "familyName": "Van Oorschot", 
        "givenName": "Paul C", 
        "id": "sg:person.014304371661.89", 
        "identifier": [
          {
            "name": "orcid_id", 
            "type": "PropertyValue", 
            "value": "0000-0002-5038-5370"
          }
        ], 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014304371661.89", 
          "https://orcid.org/0000-0002-5038-5370"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-12-01T07:14", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/person/person_954.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.014304371661.89'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.014304371661.89'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.014304371661.89'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.014304371661.89'


     

    This table displays all metadata directly associated to this object as RDF triples.

    31 TRIPLES      11 PREDICATES      18 URIs      8 LITERALS      3 BLANK NODES

    Subject Predicate Object
    1 sg:person.014304371661.89 schema:affiliation Nea58a6140ac34eacb4b3e5f648551129
    2 grid-institutes:grid.1008.9
    3 grid-institutes:grid.10698.36
    4 grid-institutes:grid.419815.0
    5 grid-institutes:grid.439950.2
    6 grid-institutes:grid.46078.3d
    7 schema:familyName Van Oorschot
    8 schema:givenName Paul C
    9 schema:identifier Nbcd67ee27837435e809aee45c391d96a
    10 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014304371661.89
    11 https://orcid.org/0000-0002-5038-5370
    12 schema:sdDatePublished 2022-12-01T07:14
    13 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    14 schema:sdPublisher Nea1521d051764dd3abe6146972870526
    15 sgo:license sg:explorer/license/
    16 sgo:sdDataset persons
    17 rdf:type schema:Person
    18 Nbcd67ee27837435e809aee45c391d96a schema:name orcid_id
    19 schema:value 0000-0002-5038-5370
    20 rdf:type schema:PropertyValue
    21 Nea1521d051764dd3abe6146972870526 schema:name Springer Nature - SN SciGraph project
    22 rdf:type schema:Organization
    23 Nea58a6140ac34eacb4b3e5f648551129 schema:affiliation grid-institutes:grid.34428.39
    24 sgo:isCurrent true
    25 rdf:type schema:OrganizationRole
    26 grid-institutes:grid.1008.9 schema:Organization
    27 grid-institutes:grid.10698.36 schema:Organization
    28 grid-institutes:grid.34428.39 schema:Organization
    29 grid-institutes:grid.419815.0 schema:Organization
    30 grid-institutes:grid.439950.2 schema:Organization
    31 grid-institutes:grid.46078.3d schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...