Cormac Herley
Cormac Herley
Microsoft Research
Verified email at - Homepage
Cited by
Cited by
Wavelets and filter banks: Theory and design
M Vetterli, C Herley
IEEE transactions on signal processing 40 (9), 2207-2232, 1992
A large-scale study of web password habits
D Florencio, C Herley
Proceedings of the 16th international conference on World Wide Web, 657-666, 2007
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE symposium on security and privacy, 553-567, 2012
So long, and no thanks for the externalities: the rational rejection of security advice by users
C Herley
Proceedings of the 2009 workshop on New security paradigms workshop, 133-144, 2009
Analyzing and improving a bittorrent networks performance mechanisms
AR Bharambe, C Herley, VN Padmanabhan
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
A research agenda acknowledging the persistence of passwords
C Herley, P Van Oorschot
IEEE Security & privacy 10 (1), 28-36, 2011
Spyware detection mechanism
CE Herley, BW Keogh, AM Hulett, AM Marinescu, JS Williams, S Nurilov
US Patent 9,021,590, 2015
Do strong web passwords accomplish anything?
D Florêncio, C Herley, B Coskun
HotSec 7 (6), 159, 2007
Wavelets and recursive filter banks
C Herley, M Vetterli
IEEE Transactions on Signal Processing 41 (8), 2536-2556, 1993
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
Tilings of the time-frequency plane: Construction of arbitrary orthogonal bases and fast tiling algorithms
C Herley, J Kovacevic, K Ramchandran, M Vetterli
IEEE Transactions on Signal Processing 41 (12), 3341-3359, 1993
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
System and method for identifying and segmenting repeating media objects embedded in a stream
C Herley
US Patent 6,766,523, 2004
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
C Herley, D Florêncio
Economics of information security and privacy, 33-53, 2010
Methods and apparatus for populating electronic forms from scanned documents
KH Chellapilla, CE Herley, TT Kristjansson, PA Viola
US Patent 7,305,129, 2007
An {Administrator’s} Guide to Internet Password Research
D Florêncio, C Herley, PC Van Oorschot
28th large installation system administration conference (LISA14), 44-61, 2014
Wavelets, subband coding, and best bases
K Ramchandran, M Vetterli, C Herley
Proceedings of the IEEE 84 (4), 541-560, 1996
Analyzing and improving BitTorrent performance
AR Bharambe, C Herley, VN Padmanabhan
Microsoft Research, Microsoft Corporation One Microsoft Way Redmond, WA …, 2005
Using production grammars in software testing
EG Sirer, BN Bershad
ACM SIGPLAN Notices 35 (1), 1-13, 1999
System and method for de-noising multiple copies of a signal
C Herley
US Patent 7,362,918, 2008
The system can't perform the operation now. Try again later.
Articles 1–20