The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PST"( http://dblp.L3S.de/Venues/PST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/pst

Publication years (Num. hits)
2004 (27) 2005 (32) 2006 (80) 2008 (26) 2010 (32) 2011 (39) 2012 (44) 2013 (52) 2014 (56) 2015 (28) 2016 (106) 2017 (47) 2018 (54) 2019 (51) 2021 (61) 2022 (32) 2023 (56)
Publication types (Num. hits)
inproceedings(806) proceedings(17)
Venues (Conferences, Journals, ...)
PST(823)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 156 occurrences of 123 keywords

Results
Found 823 publication records. Showing 823 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Guillaume Collard, Eric Disson, Guilaine Talens, Stephane Ducroquet Proposition of a method to aid Security Classification in Cybersecurity context. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Natasha Dwyer, Stephen Marsh 0001 How students regard trust in an elearning context. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fatih Turkmen, Muhammad Rizwan Asghar, Yuri Demchenko iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Benjamin VanderSloot, Stuart Wheaton, J. Alex Halderman A security analysis of police computer systems. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016 Search on Bibsonomy PST The full citation details ... 2016 DBLP  BibTeX  RDF
1Byung Il Kwak, Jiyoung Woo, Huy Kang Kim Know your master: Driver profiling-based anti-theft method. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giuseppe Settanni, Yegor Shovgenya, Florian Skopik, Roman Graf, Markus Wurzenberger, Roman Fiedler Correlating cyber incident information to establish situational awareness in Critical Infrastructures. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yasser Jafer, Stan Matwin, Marina Sokolova A framework for a privacy-aware feature selection evaluation measure. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tiago V. de Arruda, Yeda Regina Venturini, Tiemi C. Sakata Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anupama Aggarwal, Ponnurangam Kumaraguru What they do in shadows: Twitter underground follower market. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira ECA rules for controlling authorisation plan to satisfy dynamic constraints. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Prateek Dewan, Ponnurangam Kumaraguru Towards automatic real time identification of malicious posts on Facebook. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi, Hyoungshick Kim Devil in a box: Installing backdoors in electronic door locks. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefan Wüller, Ulrike Meyer, Fabian Förg, Susanne Wetzel Privacy-preserving conditional random selection. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol An efficient ID-based message recoverable privacy-preserving auditing scheme. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dorottya Papp, Zhendong Ma, Levente Buttyán Embedded systems security: Threats, vulnerabilities, and attack taxonomy. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hsiao-Ying Huang, Masooda N. Bashir Is privacy a human right? An empirical examination in a global context. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Masahiro Fujita, Christian Damsgaard Jensen, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki Physical trust-based persistent authentication. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mitu Kumar Debnath, Saeed Samet, Krishnamurthy Vidyasankar A secure revocable personal health record system with policy-based fine-grained access control. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz Revealing the relationship network behind link spam. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rino Falcone, Alessandro Sapienza, Cristiano Castelfranchi Recommendation of categories in an agents world: The role of (not) local communicative environments. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jaap Boender, Giuseppe Primiero, Franco Raimondi Minimizing transitive trust threats in software management systems. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Santini 0001, Artsiom Yautsiukhin Network security supported by arguments. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Balamurugan Anandan, Chris Clifton Laplace noise generation for two-party computational differential privacy. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Junsung Cho, Geumhwan Cho, Hyoungshick Kim Keyboard or keylogger?: A security analysis of third-party keyboards on Android. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Liang Chen, Peter Edwards, John D. Nelson, Timothy J. Norman An access control model for protecting provenance graphs. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas Disclosure risk assessment via record linkage by a maximum-knowledge attacker. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hiroaki Kikuchi, Katsumi Takahashi Zipf distribution model for quantifying risk of re-identification from trajectory data. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ali A. Ghorbani 0001, Vicenç Torra, Hüseyin Hisil, Ali Miri, Ahmet Koltuksuz, Jie Zhang 0002, Murat Sensoy, Joaquín García-Alfaro, Ibrahim Zincir (eds.) 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015 Search on Bibsonomy PST The full citation details ... 2015 DBLP  BibTeX  RDF
1Dilian Gurov, Peeter Laud, Roberto Guanciale Privacy preserving business process matching. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Balkis Abidi, Sadok Ben Yahia An adaptive algorithm for multivariate data-oriented microaggregation. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Brian A. Soeder, K. Suzanne Barber A model for calculating user-identity trustworthiness in online transactions. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Abdullah J. Alzahrani, Ali A. Ghorbani 0001 Real-time signature-based detection approach for SMS botnet. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jonas Breuer, Heritiana Ranaivoson, Uschi Buchinger, Pieter Ballon Who manages the manager? Identity management and user ownership in the age of data. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Arnaldo Spalvieri, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi 0001 Weighting peer reviewers. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Roberto Guanciale, Dilian Gurov, Peeter Laud Private intersection of regular languages. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz Automated generation of models for fast and precise detection of HTTP-based malware. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omar Abahmane, Luigi Logrippo Granularity based flow control. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang Direct Anonymous Attestation in practice: Implementation and efficient revocation. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ala'a El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang Identifying users with application-specific command streams. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi ZARATHUSTRA: Extracting Webinject signatures from banking trojans. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nisha Aggarwal, Swati Agarwal 0001, Ashish Sureka Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Noel Sardana, Robin Cohen Validating trust models against realworld data sets. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuuki Takano, Satoshi Ohta, Takeshi Takahashi 0001, Ruo Ando, Tomoya Inoue MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser 0001 Data-centric phishing detection based on transparent virtualization technologies. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giuseppe Primiero, Franco Raimondi A typed natural deduction calculus to reason about secure trust. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Brian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentland Building privacy-preserving location-based apps. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yusuke Takamatsu, Kenji Kono Clickjuggler: Checking for incomplete defenses against clickjacking. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Florian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg Semi-synthetic data set generation for security software evaluation. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Florian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser Communicating and visualising multicriterial trustworthiness under uncertainty. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mehrdad Nojoumian Generalization of socio-rational secret sharing with a new utility function. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohamed Fazeen, Ram Dantu Another free app: Does it have the right intentions? Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammad Saiful Islam Mamun, Atsuko Miyaji Secure VANET applications with a refined group signature. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay Can apps play by the COPPA Rules? Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jeremiah Bohr, Masooda N. Bashir Who Uses Bitcoin? An exploration of the Bitcoin community. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Halima Al Shehhi, Dua'a Abu Hamdi, IzzEddin Asad, Farkhund Iqbal A forensic analysis framework for recovering encryption keys and BB10 backup decryption. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Azzam Mourad, Hussein Jebbaoui Towards efficient evaluation of XACML policies. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin Crypto-assistant: Towards facilitating developer's encryption of sensitive data. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gianpiero Costantino, Fabio Martinelli, Paolo Santi Privacy-preserving mobility-casting in opportunistic networks. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bassam Sayed, Issa Traoré, Amany Abdelhalim Detection and mitigation of malicious JavaScript using information flow control. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Keji Hu, Wensheng Zhang 0001 Efficient verification of data encryption on cloud servers. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Muttukrishnan Rajarajan P-SPADE: GPU accelerated malware packer detection. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Filipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen Undetectable communication: The Online Social Networks case. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marcelo Luiz Brocardo, Issa Traoré Continuous authentication using micro-messages. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Bissessar, Carlisle Adams, Dong Liu Using biometric key commitments to prevent unauthorized lending of cryptographic credentials. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Oshani Seneviratne, Lalana Kagal Enabling privacy through transparency. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stefano Bistarelli, Francesco Santini 0001 Two trust networks in one: Using bipolar structures to fuse trust and distrust. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro (eds.) 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014 Search on Bibsonomy PST The full citation details ... 2014 DBLP  BibTeX  RDF
1Ali Dehghantanha, Katrin Franke Privacy-respecting digital investigation. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba i/k-Contact: A context-aware user authentication using physical social trust. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Khalid Zaman Bijon, Md Munirul Haque, Ragib Hasan A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Noel Sardana, Robin Cohen Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Glen Nielsen, Michael Vedel, Christian Damsgaard Jensen Improving usability of passphrase authentication. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Natasha Dwyer, Stephen Marsh 0001 What can the hashtag #trust tell us about how users conceptualise trust? Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese Inferring social relationships from technology-level device connections. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie A study of mnemonic image passwords. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dipen Contractor, Dhiren R. Patel Analyzing trustworthiness of virtual machines in data-intensive cloud computing. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu Assessing cryptographic signature schemes from a legal perspective. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chris Burnett, Liang Chen, Peter Edwards, Timothy J. Norman TRAAC: Trust and risk aware access control. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Donovan Isherwood, Marijke Coetzee TrustCV: Reputation-based trust for collectivist digital business ecosystems. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam Specifying and enforcing constraints in dynamic access control policies. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Clemens Martin, Amina Kadry, Ghada Abu-Shady Quantifying the financial impact of it security breaches on business processes. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anthony Morton, Martina Angela Sasse Desperately seeking assurances: Segmenting users by their information-seeking preferences. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi Automata-based approach to design and analyze security policies. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini Secure exams despite malicious management. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dragana Martinovic, Victor Ralevich, Joshua McDougall, Michael Perklin "You are what you play": Breaching privacy and identifying users in online gaming. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anca D. Jurcut, Tom Coffey, Reiner Dojen Design requirements to counter parallel session attacks in security protocols. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang 0001, Huaxiong Wang, Pieter H. Hartel, Willem Jonker Distributed Searchable Symmetric Encryption. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fabian Förg, Daniel A. Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer A secure two-party bartering protocol using privacy-preserving interval operations. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ali Miri Welcome message from the general chair. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tsubasa Takahashi 0001, Koji Sobataka, Takao Takenouchi, Yuki Toyoda, Takuya Mori, Takahide Kohro Top-down itemset recoding for releasing private complex data. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anders Andersen An implementation of secure multi-party computations to preserve privacy when processing EMR data. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hosnieh Rafiee, Christoph Meinel SSAS: A simple secure addressing scheme for IPv6 autoconfiguration. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mads I. Ingwar, Naveed Ahmed 0005, Christian Damsgaard Jensen Error-rate-based fusion of biometric experts. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dang Nguyen 0001, Jaehong Park, Ravi S. Sandhu A provenance-based access control model for dynamic separation of duties. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Lidia Fotia, Gianluca Lax Allowing privacy-preserving analysis of social network likes. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Morvarid Sehatkar, Stan Matwin HALT: Hybrid anonymization of longitudinal transactions. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Klara Stokes, Niklas Carlsson A peer-to-peer agent community for digital oblivion in online social networks. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ekaterina Kurdjokova, Michael Wißner, Stephan Hammer, Elisabeth André Trust-based decision-making for the adaptation of public displays in changing social contexts. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 823 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license