Carleton University - Canada’s Capital University Carleton University - Canada’s Capital University Sitemap
Contact SCS
Campus Map
Computer Science Search:
Powered by Google
News & Seminars Future Students Current Students SCS Research People Tech Support
2008 Technical Reports
Tech Reports by Year: By Author (*):

# NUMBER Title Author Date Abstract
1 TR-08-01 Rogue Attribution Using Relative Signal Strength Based Location Estimation Christine Laurendeau and Michel Barbeau Jan. 1, 2008 View
2 TR-08-02 Spanners of Additively Weighted Point Sets Mathieu Couture, Paz Carmi and Prosenjit Bose Jan. 28, 2008 View
3 TR-08-03 Centered Discretization with Application to Graphical Passwords Sonia Chiasson, Jayakumar Srinivasan, Robert Biddle, Paul Van Oorschot Jan. 28, 2008 View
4 TR-08-04 Compounding Probabilistic Evidence for Hyperbolic Rogue Location Estimation Christine Laurendeau and Michel Barbeau Feb. 26, 2008 View
5 TR-08-05 Efficient maximum subsequence queries and updates for dynamic forests Bishnu Bhattacharyya, Frank Dehne Mar. 25, 2008 View
6 TR-08-06 Using spine decompositions to efficiently solve the length-constrained heaviest path problem for trees Bishnu Bhattacharyya, Frank Dehne Apr. 9, 2008 View
7 TR-08-07 SOMA: Mutual Approval for Included Content in Web Pages Terri Oda, Glenn Wurster, Paul Van Oorschot, and Anil Somayaji Apr. 21, 2008 View
8 TR-08-08 Weighing Down "The Unbearable Lightness of PIN Cracking'' (Extended Version) Mohammad Mannan and Paul Van Oorschot Apr. 29, 2008 View
9 TR-08-09 Malicious Node Position Bounding in Mobile WiFi/802.11 Networks Christine Laurendeau and Michel Barbeau May. 14, 2008 View
10 TR-08-10 Exploring User Reactions to Browser Cues for Extended Validation Certificates Jennifer Sobey, Robert Biddle, P.C. van Oorschot, Andrew S. Patrick May. 16, 2008 View
11 TR-08-11 OLAP for Trajectories O. Baltzer, F. Dehne, S. Hambrusch, A. Rau-Chaplin May. 29, 2008 View
12 TR-08-12 Digital Objects as Passwords Mohammad Mannan and P.C. van Oorschot Jun. 3, 2008 View
13 TR-08-13 Improving Security Visualization with Exposure Map Filtering Mansour Alsaleh, David Barrera, P.C. van Oorschot Jun. 9, 2008 View
14 TR-08-14 User interface design affects security: Patterns in click-based graphical passwords Sonia Chiasson, Alain Forget, Robert Biddle, P.C. van Oorschot Jun. 16, 2008 View
15 TR-08-15 On Purely Automated Attacks and Click-Based Graphical Passwords Amirali Salehi-Abari, Julie Thorpe, P.C. van Oorschot Jun. 20, 2008 View
16 TR-08-16 Performance evaluation on GlobeCon - a scalable context management framework Kaiyuan Lu, Doron Nussbaum and Jorg-Rudiger Sack Jun. 30, 2008 View
17 TR-08-17 CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud (Extended Version) D. Nali and P.C. van Oorschot Jul. 14, 2008 View
18 TR-08-18 Localization of Credential Information to Address Increasingly Inevitable Data Breaches Mohammad Mannan and P.C. van Oorschot Jul. 22, 2008 View
19 TR-08-19 Communication-Efficient Construction of the Plane Localized Delaunay Graph P Bose, P Carmi, M Smid, D Xu Sep. 17, 2008 View
20 TR-08-20 Multiple Password Interference in Text and Click-Based Graphical Passwords Sonia Chiasson, Alain Forget, Elizabeth Stobert, P.C. van Oorschot, Robert Biddle Sep. 25, 2008 View
21 TR-08-21 On Predicting and Exploiting Hot-Spots in Click-Based Graphical Passwords P.C. van Oorschot and J. Thorpe Nov. 7, 2008 View
* Note the SCS Tech Reports have moved to
** Note that the search by Author listing has been indexed from 2005 until 2011