Cormac Herley
Cormac Herley
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Wavelets and filter banks: Theory and design
M Vetterli, C Herley
IEEE transactions on signal processing 40 (ARTICLE), 2207-2232, 1992
25321992
A large-scale study of web password habits
D Florencio, C Herley
Proceedings of the 16th international conference on World Wide Web, 657-666, 2007
12712007
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE Symposium on Security and Privacy, 553-567, 2012
9052012
Analyzing and improving a bittorrent networks performance mechanisms
AR Bharambe, C Herley, VN Padmanabhan
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
6002006
So long, and no thanks for the externalities: the rational rejection of security advice by users
C Herley
Proceedings of the 2009 workshop on New security paradigms workshop, 133-144, 2009
5832009
Wavelets and recursive filter banks
C Herley, M Vetterli
IEEE Transactions on Signal Processing 41 (8), 2536-2556, 1993
3281993
Tilings of the time-frequency plane: Construction of arbitrary orthogonal bases and fast tiling algorithms
C Herley, J Kovacevic, K Ramchandran, M Vetterli
IEEE Transactions on Signal Processing 41 (12), 3341-3359, 1993
3181993
A research agenda acknowledging the persistence of passwords
C Herley, P Van Oorschot
IEEE Security & privacy 10 (1), 28-36, 2011
2852011
Spyware detection mechanism
CE Herley, BW Keogh, AM Hulett, AM Marinescu, JS Williams, S Nurilov
US Patent 9,021,590, 2015
2652015
System and method for identifying and segmenting repeating media objects embedded in a stream
C Herley
US Patent 6,766,523, 2004
2532004
Analyzing and improving BitTorrent performance
AR Bharambe, C Herley, VN Padmanabhan
Microsoft Research, Microsoft Corporation One Microsoft Way Redmond, WA …, 2005
2182005
Wavelets, subband coding, and best bases
K Ramchandran, M Vetterli, C Herley
Proceedings of the IEEE 84 (4), 541-560, 1996
2131996
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
2122013
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
1972015
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
C Herley, D Florêncio
Economics of information security and privacy, 33-53, 2010
1882010
Do strong web passwords accomplish anything?
D Florêncio, C Herley, B Coskun
HotSec 7 (6), 159, 2007
1872007
Where do security policies come from?
D Florêncio, C Herley
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-14, 2010
1762010
Methods and apparatus for populating electronic forms from scanned documents
KH Chellapilla, CE Herley, TT Kristjansson, PA Viola
US Patent 7,305,129, 2007
1702007
Orthogonal time-varying filter banks and wavelet packets
C Herley, M Vetterli
IEEE Transactions on Signal Processing 42 (10), 2650-2663, 1994
1671994
Passwords: If we’re so smart, why are we still using them?
C Herley, PC Van Oorschot, AS Patrick
International Conference on Financial Cryptography and Data Security, 230-237, 2009
1652009
The system can't perform the operation now. Try again later.
Articles 1–20