Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Guillaume Collard, Eric Disson, Guilaine Talens, Stephane Ducroquet |
Proposition of a method to aid Security Classification in Cybersecurity context. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Natasha Dwyer, Stephen Marsh 0001 |
How students regard trust in an elearning context. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fatih Turkmen, Muhammad Rizwan Asghar, Yuri Demchenko |
iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin VanderSloot, Stuart Wheaton, J. Alex Halderman |
A security analysis of police computer systems. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016 |
PST |
2016 |
DBLP BibTeX RDF |
|
1 | Byung Il Kwak, Jiyoung Woo, Huy Kang Kim |
Know your master: Driver profiling-based anti-theft method. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Settanni, Yegor Shovgenya, Florian Skopik, Roman Graf, Markus Wurzenberger, Roman Fiedler |
Correlating cyber incident information to establish situational awareness in Critical Infrastructures. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yasser Jafer, Stan Matwin, Marina Sokolova |
A framework for a privacy-aware feature selection evaluation measure. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tiago V. de Arruda, Yeda Regina Venturini, Tiemi C. Sakata |
Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anupama Aggarwal, Ponnurangam Kumaraguru |
What they do in shadows: Twitter underground follower market. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
ECA rules for controlling authorisation plan to satisfy dynamic constraints. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Prateek Dewan, Ponnurangam Kumaraguru |
Towards automatic real time identification of malicious posts on Facebook. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi, Hyoungshick Kim |
Devil in a box: Installing backdoors in electronic door locks. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Wüller, Ulrike Meyer, Fabian Förg, Susanne Wetzel |
Privacy-preserving conditional random selection. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol |
An efficient ID-based message recoverable privacy-preserving auditing scheme. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dorottya Papp, Zhendong Ma, Levente Buttyán |
Embedded systems security: Threats, vulnerabilities, and attack taxonomy. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld |
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hsiao-Ying Huang, Masooda N. Bashir |
Is privacy a human right? An empirical examination in a global context. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Masahiro Fujita, Christian Damsgaard Jensen, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki |
Physical trust-based persistent authentication. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mitu Kumar Debnath, Saeed Samet, Krishnamurthy Vidyasankar |
A secure revocable personal health record system with policy-based fine-grained access control. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz |
Revealing the relationship network behind link spam. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rino Falcone, Alessandro Sapienza, Cristiano Castelfranchi |
Recommendation of categories in an agents world: The role of (not) local communicative environments. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaap Boender, Giuseppe Primiero, Franco Raimondi |
Minimizing transitive trust threats in software management systems. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Francesco Santini 0001, Artsiom Yautsiukhin |
Network security supported by arguments. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Balamurugan Anandan, Chris Clifton |
Laplace noise generation for two-party computational differential privacy. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Junsung Cho, Geumhwan Cho, Hyoungshick Kim |
Keyboard or keylogger?: A security analysis of third-party keyboards on Android. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Liang Chen, Peter Edwards, John D. Nelson, Timothy J. Norman |
An access control model for protecting provenance graphs. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas |
Disclosure risk assessment via record linkage by a maximum-knowledge attacker. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Kikuchi, Katsumi Takahashi |
Zipf distribution model for quantifying risk of re-identification from trajectory data. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ali A. Ghorbani 0001, Vicenç Torra, Hüseyin Hisil, Ali Miri, Ahmet Koltuksuz, Jie Zhang 0002, Murat Sensoy, Joaquín García-Alfaro, Ibrahim Zincir (eds.) |
13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015 |
PST |
2015 |
DBLP BibTeX RDF |
|
1 | Dilian Gurov, Peeter Laud, Roberto Guanciale |
Privacy preserving business process matching. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Balkis Abidi, Sadok Ben Yahia |
An adaptive algorithm for multivariate data-oriented microaggregation. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Brian A. Soeder, K. Suzanne Barber |
A model for calculating user-identity trustworthiness in online transactions. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah J. Alzahrani, Ali A. Ghorbani 0001 |
Real-time signature-based detection approach for SMS botnet. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Breuer, Heritiana Ranaivoson, Uschi Buchinger, Pieter Ballon |
Who manages the manager? Identity management and user ownership in the age of data. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Arnaldo Spalvieri, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi 0001 |
Weighting peer reviewers. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Guanciale, Dilian Gurov, Peeter Laud |
Private intersection of regular languages. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz |
Automated generation of models for fast and precise detection of HTTP-based malware. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omar Abahmane, Luigi Logrippo |
Granularity based flow control. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang |
Direct Anonymous Attestation in practice: Implementation and efficient revocation. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ala'a El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang |
Identifying users with application-specific command streams. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi |
ZARATHUSTRA: Extracting Webinject signatures from banking trojans. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nisha Aggarwal, Swati Agarwal 0001, Ashish Sureka |
Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Noel Sardana, Robin Cohen |
Validating trust models against realworld data sets. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuuki Takano, Satoshi Ohta, Takeshi Takahashi 0001, Ruo Ando, Tomoya Inoue |
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser 0001 |
Data-centric phishing detection based on transparent virtualization technologies. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Primiero, Franco Raimondi |
A typed natural deduction calculus to reason about secure trust. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Brian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentland |
Building privacy-preserving location-based apps. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Takamatsu, Kenji Kono |
Clickjuggler: Checking for incomplete defenses against clickjacking. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg |
Semi-synthetic data set generation for security software evaluation. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser |
Communicating and visualising multicriterial trustworthiness under uncertainty. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mehrdad Nojoumian |
Generalization of socio-rational secret sharing with a new utility function. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Fazeen, Ram Dantu |
Another free app: Does it have the right intentions? |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Saiful Islam Mamun, Atsuko Miyaji |
Secure VANET applications with a refined group signature. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay |
Can apps play by the COPPA Rules? |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeremiah Bohr, Masooda N. Bashir |
Who Uses Bitcoin? An exploration of the Bitcoin community. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Halima Al Shehhi, Dua'a Abu Hamdi, IzzEddin Asad, Farkhund Iqbal |
A forensic analysis framework for recovering encryption keys and BB10 backup decryption. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Azzam Mourad, Hussein Jebbaoui |
Towards efficient evaluation of XACML policies. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin |
Crypto-assistant: Towards facilitating developer's encryption of sensitive data. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gianpiero Costantino, Fabio Martinelli, Paolo Santi |
Privacy-preserving mobility-casting in opportunistic networks. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bassam Sayed, Issa Traoré, Amany Abdelhalim |
Detection and mitigation of malicious JavaScript using information flow control. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Keji Hu, Wensheng Zhang 0001 |
Efficient verification of data encryption on cloud servers. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Muttukrishnan Rajarajan |
P-SPADE: GPU accelerated malware packer detection. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Filipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen |
Undetectable communication: The Online Social Networks case. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marcelo Luiz Brocardo, Issa Traoré |
Continuous authentication using micro-messages. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Bissessar, Carlisle Adams, Dong Liu |
Using biometric key commitments to prevent unauthorized lending of cryptographic credentials. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Oshani Seneviratne, Lalana Kagal |
Enabling privacy through transparency. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Bistarelli, Francesco Santini 0001 |
Two trust networks in one: Using bipolar structures to fuse trust and distrust. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro (eds.) |
2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014 |
PST |
2014 |
DBLP BibTeX RDF |
|
1 | Ali Dehghantanha, Katrin Franke |
Privacy-respecting digital investigation. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba |
i/k-Contact: A context-aware user authentication using physical social trust. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Zaman Bijon, Md Munirul Haque, Ragib Hasan |
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Noel Sardana, Robin Cohen |
Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Glen Nielsen, Michael Vedel, Christian Damsgaard Jensen |
Improving usability of passphrase authentication. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Natasha Dwyer, Stephen Marsh 0001 |
What can the hashtag #trust tell us about how users conceptualise trust? |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese |
Inferring social relationships from technology-level device connections. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie |
A study of mnemonic image passwords. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dipen Contractor, Dhiren R. Patel |
Analyzing trustworthiness of virtual machines in data-intensive cloud computing. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Assessing cryptographic signature schemes from a legal perspective. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chris Burnett, Liang Chen, Peter Edwards, Timothy J. Norman |
TRAAC: Trust and risk aware access control. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Donovan Isherwood, Marijke Coetzee |
TrustCV: Reputation-based trust for collectivist digital business ecosystems. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam |
Specifying and enforcing constraints in dynamic access control policies. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Clemens Martin, Amina Kadry, Ghada Abu-Shady |
Quantifying the financial impact of it security breaches on business processes. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Morton, Martina Angela Sasse |
Desperately seeking assurances: Segmenting users by their information-seeking preferences. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi |
Automata-based approach to design and analyze security policies. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini |
Secure exams despite malicious management. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dragana Martinovic, Victor Ralevich, Joshua McDougall, Michael Perklin |
"You are what you play": Breaching privacy and identifying users in online gaming. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anca D. Jurcut, Tom Coffey, Reiner Dojen |
Design requirements to counter parallel session attacks in security protocols. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang 0001, Huaxiong Wang, Pieter H. Hartel, Willem Jonker |
Distributed Searchable Symmetric Encryption. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Förg, Daniel A. Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer |
A secure two-party bartering protocol using privacy-preserving interval operations. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali Miri |
Welcome message from the general chair. |
PST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tsubasa Takahashi 0001, Koji Sobataka, Takao Takenouchi, Yuki Toyoda, Takuya Mori, Takahide Kohro |
Top-down itemset recoding for releasing private complex data. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anders Andersen |
An implementation of secure multi-party computations to preserve privacy when processing EMR data. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hosnieh Rafiee, Christoph Meinel |
SSAS: A simple secure addressing scheme for IPv6 autoconfiguration. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mads I. Ingwar, Naveed Ahmed 0005, Christian Damsgaard Jensen |
Error-rate-based fusion of biometric experts. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dang Nguyen 0001, Jaehong Park, Ravi S. Sandhu |
A provenance-based access control model for dynamic separation of duties. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Buccafurri, Lidia Fotia, Gianluca Lax |
Allowing privacy-preserving analysis of social network likes. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Morvarid Sehatkar, Stan Matwin |
HALT: Hybrid anonymization of longitudinal transactions. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Klara Stokes, Niklas Carlsson |
A peer-to-peer agent community for digital oblivion in online social networks. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ekaterina Kurdjokova, Michael Wißner, Stephan Hammer, Elisabeth André |
Trust-based decision-making for the adaptation of public displays in changing social contexts. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|