Cormac Herley
Cormac Herley
Microsoft Research
Adresse e-mail validée de microsoft.com - Page d'accueil
Titre
Citée par
Citée par
Année
Wavelets and filter banks: Theory and design
M Vetterli, C Herley
IEEE transactions on signal processing 40 (ARTICLE), 2207-2232, 1992
26861992
A large-scale study of web password habits
D Florencio, C Herley
Proceedings of the 16th international conference on World Wide Web, 657-666, 2007
13582007
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE Symposium on Security and Privacy, 553-567, 2012
10162012
So long, and no thanks for the externalities: the rational rejection of security advice by users
C Herley
Proceedings of the 2009 workshop on New security paradigms workshop, 133-144, 2009
6222009
Analyzing and improving a bittorrent networks performance mechanisms
AR Bharambe, C Herley, VN Padmanabhan
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
6212006
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization.
JR Santos, Y Turner, GJ Janakiraman, I Pratt
USENIX Annual Technical Conference, 29-42, 2008
408*2008
Wavelets and recursive filter banks
C Herley, M Vetterli
IEEE Transactions on Signal Processing 41 (8), 2536-2556, 1993
3431993
Tilings of the time-frequency plane: Construction of arbitrary orthogonal bases and fast tiling algorithms
C Herley, J Kovacevic, K Ramchandran, M Vetterli
IEEE Transactions on Signal Processing 41 (12), 3341-3359, 1993
3381993
A research agenda acknowledging the persistence of passwords
C Herley, P Van Oorschot
IEEE Security & privacy 10 (1), 28-36, 2011
3102011
Spyware detection mechanism
CE Herley, BW Keogh, AM Hulett, AM Marinescu, JS Williams, S Nurilov
US Patent 9,021,590, 2015
2942015
System and method for identifying and segmenting repeating media objects embedded in a stream
C Herley
US Patent 6,766,523, 2004
2642004
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
2322013
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
2222015
Analyzing and improving BitTorrent performance
AR Bharambe, C Herley, VN Padmanabhan
Microsoft Research, Microsoft Corporation One Microsoft Way Redmond, WA …, 2005
2202005
Wavelets, subband coding, and best bases
K Ramchandran, M Vetterli, C Herley
Proceedings of the IEEE 84 (4), 541-560, 1996
2191996
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
C Herley, D Florêncio
Economics of information security and privacy, 33-53, 2010
2062010
Do strong web passwords accomplish anything?
D Florêncio, C Herley, B Coskun
HotSec 7 (6), 159, 2007
1962007
Methods and apparatus for populating electronic forms from scanned documents
KH Chellapilla, CE Herley, TT Kristjansson, PA Viola
US Patent 7,305,129, 2007
1952007
Where do security policies come from?
D Florêncio, C Herley
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-14, 2010
1872010
An administrator’s guide to internet password research
D Florêncio, C Herley, PC Van Oorschot
28th Large Installation System Administration Conference (LISA14), 44-61, 2014
1802014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20