Follow
Cormac Herley
Cormac Herley
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Wavelets and filter banks: Theory and design
M Vetterli, C Herley
IEEE transactions on signal processing 40 (9), 2207-2232, 1992
28681992
A large-scale study of web password habits
D Florencio, C Herley
Proceedings of the 16th international conference on World Wide Web, 657-666, 2007
15942007
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE symposium on security and privacy, 553-567, 2012
14532012
So long, and no thanks for the externalities: the rational rejection of security advice by users
C Herley
Proceedings of the 2009 workshop on New security paradigms workshop, 133-144, 2009
7932009
Analyzing and improving a bittorrent networks performance mechanisms
AR Bharambe, C Herley, VN Padmanabhan
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
6412006
A research agenda acknowledging the persistence of passwords
C Herley, P Van Oorschot
IEEE Security & privacy 10 (1), 28-36, 2011
3982011
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
3712015
Spyware detection mechanism
CE Herley, BW Keogh, AM Hulett, AM Marinescu, JS Williams, S Nurilov
US Patent 9,021,590, 2015
3602015
Do strong web passwords accomplish anything?
D Florêncio, C Herley, B Coskun
HotSec 7 (6), 159, 2007
358*2007
Wavelets and recursive filter banks
C Herley, M Vetterli
IEEE Transactions on Signal Processing 41 (8), 2536-2556, 1993
3581993
Tilings of the time-frequency plane: Construction of arbitrary orthogonal bases and fast tiling algorithms
C Herley, J Kovacevic, K Ramchandran, M Vetterli
IEEE Transactions on Signal Processing 41 (12), 3341-3359, 1993
3471993
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
3032013
System and method for identifying and segmenting repeating media objects embedded in a stream
C Herley
US Patent 6,766,523, 2004
2982004
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
C Herley, D Florêncio
Economics of information security and privacy, 33-53, 2010
2572010
Methods and apparatus for populating electronic forms from scanned documents
KH Chellapilla, CE Herley, TT Kristjansson, PA Viola
US Patent 7,305,129, 2007
2432007
An {Administrator’s} Guide to Internet Password Research
D Florêncio, C Herley, PC Van Oorschot
28th large installation system administration conference (LISA14), 44-61, 2014
2402014
Wavelets, subband coding, and best bases
K Ramchandran, M Vetterli, C Herley
Proceedings of the IEEE 84 (4), 541-560, 1996
2331996
Analyzing and improving BitTorrent performance
AR Bharambe, C Herley, VN Padmanabhan
Microsoft Research, Microsoft Corporation One Microsoft Way Redmond, WA …, 2005
2322005
Using production grammars in software testing
EG Sirer, BN Bershad
ACM SIGPLAN Notices 35 (1), 1-13, 1999
2271999
Where do security policies come from?
D Florêncio, C Herley
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-14, 2010
2202010
The system can't perform the operation now. Try again later.
Articles 1–20