Author image not provided
 Paul C Van Oorschot

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.00
Citation Count2
Publication count2
Publication years2012-2016
Available for download1
Average downloads per article226.00
Downloads (cumulative)226
Downloads (12 Months)199
Downloads (6 Weeks)43
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


3 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 3 of 3
Sort by:

1 published by ACM
December 2017 ACM Transactions on Privacy and Security (TOPS): Volume 21 Issue 1, January 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 39,   Downloads (12 Months): 50,   Downloads (Overall): 50

Full text available: PDFPDF
We introduce the first known mechanism providing realtime server location verification. Its uses include enhancing server authentication by enabling browsers to automatically interpret server location information. We describe the design of this new measurement-based technique, Server Location Verification (SLV), and evaluate it using PlanetLab. We explain how SLV is compatible ...
Keywords: SSL/TLS, location-based authentication, Server authentication, internet measurements

2 published by ACM
December 2016 ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 149,   Downloads (Overall): 176

Full text available: PDFPDF
Device fingerprinting is commonly used for tracking users. We explore device fingerprinting but in the specific context of use for augmenting authentication, providing a state-of-the-art view and analysis. We summarize and classify 29 available methods and their properties; define attack models relevant to augmenting passwords for user authentication; and qualitatively ...
Keywords: comparative criteria, multi-dimensional authentication, device fingerprinting, passwords, comparative analysis

3
January 2012 IEEE Security and Privacy: Volume 10 Issue 1, January 2012
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 1

As part of this special issue on authentication, guest editors Richard Chow, Markus Jakobsson, and Jesus Molina put together a roundtable discussion with leaders in the field, who discuss here their views on the biggest problems in authentication, potential solutions, and the direction in which the field is moving.
Keywords: authentication, verification, cloud computing, public key, sign on



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us