Wavelets and filter banks: Theory and design M Vetterli, C Herley IEEE transactions on signal processing 40 (ARTICLE), 2207-2232, 1992 | 2562 | 1992 |
A large-scale study of web password habits D Florencio, C Herley Proceedings of the 16th international conference on World Wide Web, 657-666, 2007 | 1312 | 2007 |
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes J Bonneau, C Herley, PC Van Oorschot, F Stajano 2012 IEEE Symposium on Security and Privacy, 553-567, 2012 | 953 | 2012 |
Analyzing and improving a bittorrent networks performance mechanisms AR Bharambe, C Herley, VN Padmanabhan Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006 | 615 | 2006 |
So long, and no thanks for the externalities: the rational rejection of security advice by users C Herley Proceedings of the 2009 workshop on New security paradigms workshop, 133-144, 2009 | 601 | 2009 |
Wavelets and recursive filter banks C Herley, M Vetterli IEEE Transactions on Signal Processing 41 (8), 2536-2556, 1993 | 330 | 1993 |
Tilings of the time-frequency plane: Construction of arbitrary orthogonal bases and fast tiling algorithms C Herley, J Kovacevic, K Ramchandran, M Vetterli IEEE Transactions on Signal Processing 41 (12), 3341-3359, 1993 | 325 | 1993 |
A research agenda acknowledging the persistence of passwords C Herley, P Van Oorschot IEEE Security & privacy 10 (1), 28-36, 2011 | 297 | 2011 |
Spyware detection mechanism CE Herley, BW Keogh, AM Hulett, AM Marinescu, JS Williams, S Nurilov US Patent 9,021,590, 2015 | 288 | 2015 |
System and method for identifying and segmenting repeating media objects embedded in a stream C Herley US Patent 6,766,523, 2004 | 260 | 2004 |
Does my password go up to eleven? The impact of password meters on password selection S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013 | 221 | 2013 |
Analyzing and improving BitTorrent performance AR Bharambe, C Herley, VN Padmanabhan Microsoft Research, Microsoft Corporation One Microsoft Way Redmond, WA …, 2005 | 219 | 2005 |
Wavelets, subband coding, and best bases K Ramchandran, M Vetterli, C Herley Proceedings of the IEEE 84 (4), 541-560, 1996 | 211 | 1996 |
Passwords and the evolution of imperfect authentication J Bonneau, C Herley, PC Van Oorschot, F Stajano Communications of the ACM 58 (7), 78-87, 2015 | 208 | 2015 |
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy C Herley, D Florêncio Economics of information security and privacy, 33-53, 2010 | 193 | 2010 |
Do strong web passwords accomplish anything? D Florêncio, C Herley, B Coskun HotSec 7 (6), 159, 2007 | 192 | 2007 |
Methods and apparatus for populating electronic forms from scanned documents KH Chellapilla, CE Herley, TT Kristjansson, PA Viola US Patent 7,305,129, 2007 | 187 | 2007 |
Where do security policies come from? D Florêncio, C Herley Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-14, 2010 | 182 | 2010 |
Inferring information about media stream objects CJC Burges, CE Herley US Patent 7,788,696, 2010 | 173 | 2010 |
System and method for de-noising multiple copies of a signal C Herley US Patent 7,362,918, 2008 | 171 | 2008 |