Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,649,471 papers from all fields of science
Search
Sign In
Create Free Account
Paul van Oorschot
Known as:
PVO
, Paul C. van Oorschot
Paul C. van Oorschot is a cryptographer and computer security researcher, currently a professor of computer science at Carleton University, where he…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Books on cryptography
Computer science
Computer security
Diffie–Hellman key exchange
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Improved K-Pass Pixel Value Ordering Based Data Hiding
S. Weng
,
Yi Chen
,
Bo Ou
,
Chinchen Chang
,
Chunyu Zhang
IEEE Access
2019
Corpus ID: 88499985
K-pass pixel value ordering (PVO) is an effective reversible data hiding (RDH) technique. In k-pass PVO, the complexity…
Expand
2014
2014
Synchronizing chaotification with support vector machine and wolf pack search algorithm for estimation of peripheral vascular occlusion in diabetes mellitus
Chien-Ming Li
,
Yi-Chun Du
,
+4 authors
Tainsong Chen
Biomedical Signal Processing and Control
2014
Corpus ID: 206358228
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
Highly Cited
2000
Highly Cited
2000
Statistical Copolymers with Side-Chain Hole and Electron Transport Groups for Single-Layer Electroluminescent Device Applications
Xuezhong Jiang
,
R. Register
,
Kelly A. Killeen
,
M. Thompson
,
F. Pschenitzka
,
J. Sturm
2000
Corpus ID: 18368166
New statistical copolymers with bipolar carrier transport abilities were synthesized through free radical copolymerization of N…
Expand
1998
1998
Some Timestamping Protocol Failures
Mike Just
Network and Distributed System Security Symposium
1998
Corpus ID: 1580557
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of…
Expand
1997
1997
The GCHQ Protocol and Its Problems
Ross J. Anderson
,
M. Roe
International Conference on the Theory and…
1997
Corpus ID: 10911977
The UK government is fielding an architecture for secure electronic mail based on the NSA's Message Security Protocol, with a key…
Expand
1990
1990
The paraventricular and posterior recess organs of elasmobranchs: A system of cerebrospinal fluid-contacting neurons containing immunoreactive serotonin and somatostatin
P. Meurling
,
E. Rodríguez
Cell and Tissue Research
1990
Corpus ID: 9405686
SummaryThe paraventricular organ (PVO) and the posterior recess organ (PRO) of two elasmobranch species, the spiny dogfish…
Expand
1987
1987
The effect of the hot oxygen corona on the interaction of the solar wind with Venus
O. Belotserkovskii
,
T. Breus
,
A. M. Krymskii
,
V. Mitnitskii
,
A. Nagy
,
T. Gombosi
1987
Corpus ID: 34115262
A numerical gas dynamic model, which includes the effects of mass loading of the shocked solar wind, was used to calculate the…
Expand
1982
1982
Orientation of planetary O+ fluxes and magnetic field lines in the Venus wake
H. Pérez-de-Tejada
,
D. Intriligator
,
C. Russell
Nature
1982
Corpus ID: 4313688
The presence of ‘contaminant’ heavy ions of planetary origin in the solar wind has long been the subject of intense theoretical…
Expand
1980
1980
Periodicity of the γ-ray transient event of 5 March 1979
J. Terrell
,
W. Evans
,
R. Klebesadel
,
J. Laros
Nature
1980
Corpus ID: 4309341
An unusual γ-ray burst event was observed on 5 March 1979 by nine different spacecraft1–5. The position of the event has been…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE