Cormac Herley
Cormac Herley
Microsoft Research
Verified email at - Homepage
Cited by
Cited by
Wavelets and filter banks: Theory and design
M Vetterli, C Herley
IEEE transactions on signal processing 40 (ARTICLE), 2207-2232, 1992
A large-scale study of web password habits
D Florencio, C Herley
Proceedings of the 16th international conference on World Wide Web, 657-666, 2007
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE symposium on security and privacy, 553-567, 2012
So long, and no thanks for the externalities: the rational rejection of security advice by users
C Herley
Proceedings of the 2009 workshop on New security paradigms workshop, 133-144, 2009
Analyzing and improving a bittorrent networks performance mechanisms
AR Bharambe, C Herley, VN Padmanabhan
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
A research agenda acknowledging the persistence of passwords
C Herley, P Van Oorschot
IEEE Security & privacy 10 (1), 28-36, 2011
Wavelets and recursive filter banks
C Herley, M Vetterli
IEEE Transactions on Signal Processing 41 (8), 2536-2556, 1993
Spyware detection mechanism
CE Herley, BW Keogh, AM Hulett, AM Marinescu, JS Williams, S Nurilov
US Patent 9,021,590, 2015
Tilings of the time-frequency plane: Construction of arbitrary orthogonal bases and fast tiling algorithms
C Herley, J Kovacevic, K Ramchandran, M Vetterli
IEEE Transactions on Signal Processing 41 (12), 3341-3359, 1993
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
System and method for identifying and segmenting repeating media objects embedded in a stream
C Herley
US Patent 6,766,523, 2004
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
C Herley, D Florêncio
Economics of information security and privacy, 33-53, 2010
Methods and apparatus for populating electronic forms from scanned documents
KH Chellapilla, CE Herley, TT Kristjansson, PA Viola
US Patent 7,305,129, 2007
Wavelets, subband coding, and best bases
K Ramchandran, M Vetterli, C Herley
Proceedings of the IEEE 84 (4), 541-560, 1996
Analyzing and improving BitTorrent performance
AR Bharambe, C Herley, VN Padmanabhan
Microsoft Research, Microsoft Corporation One Microsoft Way Redmond, WA …, 2005
An administrator’s guide to internet password research
D Florêncio, C Herley, PC Van Oorschot
28th large installation system administration conference (LISA14), 44-61, 2014
Do strong web passwords accomplish anything?
D Florêncio, C Herley, B Coskun
HotSec 7 (6), 159, 2007
Using production grammars in software testing
EG Sirer, BN Bershad
ACM SIGPLAN Notices 35 (1), 1-13, 1999
System and method for providing user control over repeating objects embedded in a stream
C Herley
US Patent 7,653,921, 2010
The system can't perform the operation now. Try again later.
Articles 1–20