Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Zainab M. Aljazzaf, Miriam A. M. Capretz, Mark Perry 0001 |
Trust bootstrapping services and service providers. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mark Manulis, Marion Steiner |
UPBA: User-Authenticated Property-Based Attestation. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Abbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Shervin Shirmohammadi, Carlisle M. Adams, Abdulmotaleb El-Saddik |
Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Md. Moniruzzaman, Ken Barker 0001 |
Delegation of access rights in a privacy preserving access control model. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Viehmann |
Secure communication with secret sharing in static computer networks with partition in mistrust parties. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sherif Saad, Issa Traoré, Ali A. Ghorbani 0001, Bassam Sayed, David Zhao, Wei Lu 0018, John Felix, Payman Hakimian |
Detecting P2P botnets through network behavior analysis and machine learning. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yoshihiro Kaneko, Yuji Kinpara, Yuta Shiomi |
A hamming distance-like filtering in keystroke dynamics. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lilia Georgieva |
Modelling of security properties in Alloy. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Parham, John William Atwood |
Validation of security for participant control exchanges in multicast content distribution. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Abdulsalam Yassine, Ali A. Nazari Shirehjini, Shervin Shirmohammadi, Thomas T. Tran |
Online information privacy: Agent-mediated payoff. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Naveed Ahmad 0003, Haitham S. Cruickshank, Zhili Sun, Muhammad Asif 0006 |
Pseudonymised communication in delay tolerant networks. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | François Gauthier 0001, Dominic Letarte, Thierry Lavoie, Ettore Merlo |
Extraction and comprehension of moodle's access control model: A case study. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiangong Weng, Amy P. Felty |
An implementation of a verification condition generator for foundational proof-carrying code. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nick Mailloux, Ali Miri, Monica Nevins |
Forward secure identity-based key agreement for dynamic groups. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat |
I-RBAC: Isolation enabled role-based access control. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tristan Allard, Benjamin Nguyen, Philippe Pucheral |
Safe realization of the Generalization privacy mechanism. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ali Nur Mohammad Noman, Sk. Md. Mizanur Rahman, Carlisle Adams |
Improving security and usability of low cost RFID tags. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hagen Stübing, Murat Ceven, Sorin A. Huss |
A Diffie-Hellman based privacy protocol for Car-to-X communication. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dakshita Khurana, Aditya Gaurav |
Ensuring tight computational security against higher-order DPA attacks. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qi Xie, Urs Hengartner |
Privacy-preserving matchmaking For mobile social networking secure against malicious users. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Esma Aïmeur, David Schönfeld |
The ultimate invasion of privacy: Identity theft. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto |
Cryptographic security models for eHealth P2P database management systems network. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Gorner, Jie Zhang 0002, Robin Cohen |
Improving the use of advisor networks for multi-agent trust modelling. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bernard Stepien, Stan Matwin, Amy P. Felty |
Advantages of a non-technical XACML notation in role-based models. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis |
A probabilistic-based approach towards trust evaluation using Poisson Hidden Markov Models and Bonus Malus Systems. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Gasti, Alessio Merlo |
On Re-use of randomness in broadcast encryption. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nabil Seddigh, Biswajit Nandy, Rupinder Makkar, Jean-Francois Beaumont |
Security advances and challenges in 4G wireless networks. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Brent Carrara, Carlisle Adams |
On achieving a digital identity management system with support for non-transferability. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Omar Hasan, Elisa Bertino, Lionel Brunie |
Efficient privacy preserving reputation protocols inspired by secure sum. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Nürnberger, Thomas Feller 0002, Sorin A. Huss |
Ray - a secure micro kernel architecture. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Brent Carrara, Carlisle Adams |
You are the key: Generating cryptographic keys from voice biometrics. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hamad Binsalleeh, Thomas C. Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang 0001 |
On the analysis of the Zeus botnet crimeware toolkit. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bon K. Sy, Adam Ramirez, Arun Prakash Kumara Krishnan |
Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yunli Wang, Yan Cui, Liqiang Geng, Hongyu Liu |
A new perspective of privacy protection: Unique distinct l-SR diversity. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Amirali Salehi-Abari, Tony White |
The relationship of trust, demand, and utility: Be more trustworthy, then i will buy more. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Leblanc, Alain Forget, Robert Biddle |
Guessing click-based graphical passwords by eye tracking. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok |
New approach for the dynamic enforcement of Web services security. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Perumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan |
Design of distributed security architecture for multihop WiMAX networks. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | David Tancock, Siani Pearson, Andrew Charlesworth |
Analysis of Privacy Impact Assessments within Major jurisdictions. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nauman Abdullah Shah, Muhammad Arif Wahla |
Secure architecture for RFID enabled supply chain hierarchy. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sherif Saad, Issa Traoré |
Method ontology for intelligent network forensics analysis. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | James P. Delgrande, Aaron Hunter 0001, Torsten Grote |
On the representation and verification of cryptographic protocols in a theory of action. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Linda Briesemeister, Steven Cheung, Ulf Lindqvist, Alfonso Valdes |
Detection, correlation, and visualization of attacks against critical infrastructure systems. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo |
Risk analysis in access control systems. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Palanivel Andiappan Kodeswaran, Evelyne Viegas |
Towards a privacy preserving policy based infrastructure for social data access to enable scientific research. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ray Hunt, Jill Slay |
Achieving critical infrastructure protection through the interaction of computer security and network forensics. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Paul Rabinovich |
Transaction signing in applications using identity federation. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | James B. Williams 0001, Jens H. Weber-Jahnke |
Social networks for health care: Addressing regulatory gaps with privacy-by-design. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pulei Xiong, Liam Peyton |
A model-driven penetration test framework for Web applications. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carlisle Adams, Guy-Vincent Jourdan, Jean-Pierre Levac, François Prevost |
Lightweight protection against brute force login attacks on Web applications. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Aziz Bouras |
Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alex Stoianov |
Security of Error Correcting Code for biometric Encryption. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Heather Crawford |
Keystroke dynamics: Characteristics and opportunities. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tracy Ann Kosa |
Vampire bats: Trust in Privacy. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mahendra Kumar, Richard E. Newman |
J3: High payload histogram neutral JPEG steganography. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Haïdar Safa, Farah Abu Shahla |
Trust-aware monitoring scheme for WiMAX networks. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael Hay, Basil Saeed, Chung-Horng Lung, Anand Srinivasan |
Co-located Physical-Layer Network Coding to mitigate passive eavesdropping. |
PST |
2010 |
DBLP DOI BibTeX RDF |
|
1 | |
Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada |
PST |
2010 |
DBLP BibTeX RDF |
|
1 | Heidar Pirzadeh, Danny Dubé |
Encoding the Program Correctness Proofs as Programs in PCC Technology. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michel Deriaz |
The Uncertainty of the Truth. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Azzam Mourad, Dima Alhadidi, Mourad Debbabi |
Cross-Language Weaving Approach Targeting Software Security Hardening. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Farag Azzedin, Ahmad Ridha |
The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Riyad Alshammari, Nur Zincir-Heywood |
Investigating Two Different Approaches for Encrypted Traffic Classification. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Princely Ifinedo |
IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter? |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles |
A Multiple-Control Fuzzy Vault. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Baishakhi Ray, Shivakant Mishra |
A Protocol for Building Secure and Reliable Covert Channel. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan |
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Viktor Krammer |
An Effective Defense against Intrusive Web Advertising. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sheikh Iqbal Ahamed, Mehrab Monjur, Mohammad Saiful Islam |
CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel 0001 |
Unlinkable Communication. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Larry Korba, Stephen Marsh 0001, Reihaneh Safavi-Naini (eds.) |
Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada |
PST |
2008 |
DBLP BibTeX RDF |
|
1 | Piotr Cofta |
Confidence-Compensating Privacy Protection. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nathan Lewis, Noria Foukia |
An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi |
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie |
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao 0019 |
Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Apurva Mohan, Douglas M. Blough |
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Wilfred Villegas, Bader Ali, Muthucumaru Maheswaran |
An Access Control Scheme for Protecting Personal Data. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Adetokunbo Makanju, Stephen Brooks, Nur Zincir-Heywood, Evangelos E. Milios |
LogView: Visualizing Event Log Clusters. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David Benjamin, Mikhail J. Atallah |
Private and Cheating-Free Outsourcing of Algebraic Computations. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ed Brown, Tracy Ann Kosa |
Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jie Zhang 0002, Murat Sensoy, Robin Cohen |
A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jani Suomalainen, Seamus Moloney, Juha Koivisto, Kari Keinänen |
OpenHouse: A Secure Platform for Distributed Home Services. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Vikram Goyal, Shyam K. Gupta 0001, Shobhit Saxena |
Query rewriting for detection of privacy violation through inferencing. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | EunJoung Byun, SeokIn Kim, HongSoo Kim, SungJin Choi, JangWon Choi, Chong-Sun Hwang |
MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sylvia L. Osborn |
Role-based access control: past, present and future. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Viktor Krammer |
Phishing defense against IDN address spoofing attacks. |
PST |
2006 |
DBLP DOI BibTeX RDF |
usability, web browsers, phishing, internet security, unicode, internationalized domain names |
1 | Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl |
Embedding verifiable information flow analysis. |
PST |
2006 |
DBLP DOI BibTeX RDF |
embedded systems, static analysis, information flow, confidentiality, language-based security, smart objects |
1 | Candido Rodriguez, Ajay Daryanani, Diego R. López, Jose M. Macias |
AA-RR: working with authentication and authorization infrastructures. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy, software testing, identification, computer network security |
1 | Wenyin Zhang, Ningde Jin |
Chinese text watermarking based on occlusive components. |
PST |
2006 |
DBLP DOI BibTeX RDF |
Chinese text watermarking, digital watermarking |
1 | A. K. M. Harun-Ar-Rashid |
The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Stephanie Chow |
Ontario healthcare privacy act: compliant ad hoc healthcare applications. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Gregory B. Newby |
Paths to creativity in security careers. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mathew Graves, Mohammad Zulkernine |
Bridging the gap: software specification meets intrusion detector. |
PST |
2006 |
DBLP DOI BibTeX RDF |
attack languages, intrusion detection, software security, software specification |
1 | Muhammad Alam, Michael Hafner, Ruth Breu |
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. |
PST |
2006 |
DBLP DOI BibTeX RDF |
administrative role based access control, permission-level delegation, service oriented architectures, model-driven architecture |
1 | Reto Kohlas, Jacek Jonczy, Rolf Haenni |
Towards a precise semantics for authenticity and trust. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michel Deriaz, Jean-Marc Seigneur |
Trust and security in spatial messaging: FoxyTag, the speed camera case study. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jinshan Liu, Valérie Issarny |
An incentive compatible reputation mechanism for ubiquitous computing environments. |
PST |
2006 |
DBLP DOI BibTeX RDF |
ubiquitous computing, mobile ad hoc networks, incentive compatibility, reputation mechanism |
1 | Thomas W. Lauer, Xiaodong Deng |
Building online trust through privacy policies. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|