Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Guillaume Collard, Eric Disson, Guilaine Talens, Stephane Ducroquet |
Proposition of a method to aid Security Classification in Cybersecurity context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 88-95, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Natasha Dwyer, Stephen Marsh 0001 |
How students regard trust in an elearning context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 682-685, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fatih Turkmen, Muhammad Rizwan Asghar, Yuri Demchenko |
iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 407-410, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin VanderSloot, Stuart Wheaton, J. Alex Halderman |
A security analysis of police computer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 714-721, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![IEEE, 978-1-5090-4379-8 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Byung Il Kwak, Jiyoung Woo, Huy Kang Kim |
Know your master: Driver profiling-based anti-theft method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 211-218, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Settanni, Yegor Shovgenya, Florian Skopik, Roman Graf, Markus Wurzenberger, Roman Fiedler |
Correlating cyber incident information to establish situational awareness in Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 78-81, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yasser Jafer, Stan Matwin, Marina Sokolova |
A framework for a privacy-aware feature selection evaluation measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 62-69, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tiago V. de Arruda, Yeda Regina Venturini, Tiemi C. Sakata |
Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 153-156, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anupama Aggarwal, Ponnurangam Kumaraguru |
What they do in shadows: Twitter underground follower market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 93-100, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
ECA rules for controlling authorisation plan to satisfy dynamic constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 133-138, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Prateek Dewan, Ponnurangam Kumaraguru |
Towards automatic real time identification of malicious posts on Facebook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 85-92, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi, Hyoungshick Kim |
Devil in a box: Installing backdoors in electronic door locks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 139-144, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Wüller, Ulrike Meyer, Fabian Förg, Susanne Wetzel |
Privacy-preserving conditional random selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 44-53, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol |
An efficient ID-based message recoverable privacy-preserving auditing scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 117-124, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dorottya Papp, Zhendong Ma, Levente Buttyán |
Embedded systems security: Threats, vulnerabilities, and attack taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 145-152, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld |
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 1-6, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hsiao-Ying Huang, Masooda N. Bashir |
Is privacy a human right? An empirical examination in a global context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 77-84, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Masahiro Fujita, Christian Damsgaard Jensen, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki |
Physical trust-based persistent authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 186-190, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mitu Kumar Debnath, Saeed Samet, Krishnamurthy Vidyasankar |
A secure revocable personal health record system with policy-based fine-grained access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 109-116, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz |
Revealing the relationship network behind link spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 101-108, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rino Falcone, Alessandro Sapienza, Cristiano Castelfranchi |
Recommendation of categories in an agents world: The role of (not) local communicative environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 7-13, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaap Boender, Giuseppe Primiero, Franco Raimondi |
Minimizing transitive trust threats in software management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 191-198, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Francesco Santini 0001, Artsiom Yautsiukhin |
Network security supported by arguments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 165-172, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Balamurugan Anandan, Chris Clifton |
Laplace noise generation for two-party computational differential privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 54-61, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Junsung Cho, Geumhwan Cho, Hyoungshick Kim |
Keyboard or keylogger?: A security analysis of third-party keyboards on Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 173-176, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Liang Chen, Peter Edwards, John D. Nelson, Timothy J. Norman |
An access control model for protecting provenance graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 125-132, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas |
Disclosure risk assessment via record linkage by a maximum-knowledge attacker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 28-35, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Kikuchi, Katsumi Takahashi |
Zipf distribution model for quantifying risk of re-identification from trajectory data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 14-21, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ali A. Ghorbani 0001, Vicenç Torra, Hüseyin Hisil, Ali Miri, Ahmet Koltuksuz, Jie Zhang 0002, Murat Sensoy, Joaquín García-Alfaro, Ibrahim Zincir (eds.) |
13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![IEEE Computer Society, 978-1-4673-7828-4 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Dilian Gurov, Peeter Laud, Roberto Guanciale |
Privacy preserving business process matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 36-43, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Balkis Abidi, Sadok Ben Yahia |
An adaptive algorithm for multivariate data-oriented microaggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 70-76, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Brian A. Soeder, K. Suzanne Barber |
A model for calculating user-identity trustworthiness in online transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 177-185, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah J. Alzahrani, Ali A. Ghorbani 0001 |
Real-time signature-based detection approach for SMS botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 157-164, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Breuer, Heritiana Ranaivoson, Uschi Buchinger, Pieter Ballon |
Who manages the manager? Identity management and user ownership in the age of data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 22-27, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Arnaldo Spalvieri, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi 0001 |
Weighting peer reviewers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 414-419, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Guanciale, Dilian Gurov, Peeter Laud |
Private intersection of regular languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 112-120, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz |
Automated generation of models for fast and precise detection of HTTP-based malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 249-256, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omar Abahmane, Luigi Logrippo |
Granularity based flow control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 239-248, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang |
Direct Anonymous Attestation in practice: Implementation and efficient revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 67-74, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ala'a El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang |
Identifying users with application-specific command streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 232-238, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi |
ZARATHUSTRA: Extracting Webinject signatures from banking trojans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 139-148, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nisha Aggarwal, Swati Agarwal 0001, Ashish Sureka |
Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 84-93, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Noel Sardana, Robin Cohen |
Validating trust models against realworld data sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 355-362, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuuki Takano, Satoshi Ohta, Takeshi Takahashi 0001, Ruo Ando, Tomoya Inoue |
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 48-56, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser 0001 |
Data-centric phishing detection based on transparent virtualization technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 215-223, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Primiero, Franco Raimondi |
A typed natural deduction calculus to reason about secure trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 379-382, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Brian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentland |
Building privacy-preserving location-based apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 27-30, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Takamatsu, Kenji Kono |
Clickjuggler: Checking for incomplete defenses against clickjacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 224-231, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg |
Semi-synthetic data set generation for security software evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 156-163, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser |
Communicating and visualising multicriterial trustworthiness under uncertainty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 391-397, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mehrdad Nojoumian |
Generalization of socio-rational secret sharing with a new utility function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 338-341, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Fazeen, Ram Dantu |
Another free app: Does it have the right intentions? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 282-289, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Saiful Islam Mamun, Atsuko Miyaji |
Secure VANET applications with a refined group signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 199-206, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay |
Can apps play by the COPPA Rules? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 1-9, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeremiah Bohr, Masooda N. Bashir |
Who Uses Bitcoin? An exploration of the Bitcoin community. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 94-101, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Halima Al Shehhi, Dua'a Abu Hamdi, IzzEddin Asad, Farkhund Iqbal |
A forensic analysis framework for recovering encryption keys and BB10 backup decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 172-178, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Azzam Mourad, Hussein Jebbaoui |
Towards efficient evaluation of XACML policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 164-171, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin |
Crypto-assistant: Towards facilitating developer's encryption of sensitive data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 342-346, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gianpiero Costantino, Fabio Martinelli, Paolo Santi |
Privacy-preserving mobility-casting in opportunistic networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 10-18, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bassam Sayed, Issa Traoré, Amany Abdelhalim |
Detection and mitigation of malicious JavaScript using information flow control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 264-273, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Keji Hu, Wensheng Zhang 0001 |
Efficient verification of data encryption on cloud servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 314-321, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Muttukrishnan Rajarajan |
P-SPADE: GPU accelerated malware packer detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 257-263, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Filipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen |
Undetectable communication: The Online Social Networks case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 19-26, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marcelo Luiz Brocardo, Issa Traoré |
Continuous authentication using micro-messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 179-188, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Bissessar, Carlisle Adams, Dong Liu |
Using biometric key commitments to prevent unauthorized lending of cryptographic credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 75-83, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Oshani Seneviratne, Lalana Kagal |
Enabling privacy through transparency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 121-128, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Bistarelli, Francesco Santini 0001 |
Two trust networks in one: Using bipolar structures to fuse trust and distrust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 383-390, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro (eds.) |
2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![IEEE Computer Society, 978-1-4799-3502-4 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Ali Dehghantanha, Katrin Franke |
Privacy-respecting digital investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 129-138, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba |
i/k-Contact: A context-aware user authentication using physical social trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 407-413, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Zaman Bijon, Md Munirul Haque, Ragib Hasan |
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 347-354, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Noel Sardana, Robin Cohen |
Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 363-370, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Glen Nielsen, Michael Vedel, Christian Damsgaard Jensen |
Improving usability of passphrase authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 189-198, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Natasha Dwyer, Stephen Marsh 0001 |
What can the hashtag #trust tell us about how users conceptualise trust? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 398-402, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese |
Inferring social relationships from technology-level device connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 40-47, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie |
A study of mnemonic image passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 207-214, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dipen Contractor, Dhiren R. Patel |
Analyzing trustworthiness of virtual machines in data-intensive cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 403-406, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Assessing cryptographic signature schemes from a legal perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 322-329, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chris Burnett, Liang Chen, Peter Edwards, Timothy J. Norman |
TRAAC: Trust and risk aware access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 371-378, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Donovan Isherwood, Marijke Coetzee |
TrustCV: Reputation-based trust for collectivist digital business ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 420-424, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam |
Specifying and enforcing constraints in dynamic access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 290-297, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Clemens Martin, Amina Kadry, Ghada Abu-Shady |
Quantifying the financial impact of it security breaches on business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 149-155, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Morton, Martina Angela Sasse |
Desperately seeking assurances: Segmenting users by their information-seeking preferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 102-111, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi |
Automata-based approach to design and analyze security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 306-313, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini |
Secure exams despite malicious management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 274-281, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dragana Martinovic, Victor Ralevich, Joshua McDougall, Michael Perklin |
"You are what you play": Breaching privacy and identifying users in online gaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 31-39, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anca D. Jurcut, Tom Coffey, Reiner Dojen |
Design requirements to counter parallel session attacks in security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 298-305, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang 0001, Huaxiong Wang, Pieter H. Hartel, Willem Jonker |
Distributed Searchable Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 330-337, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Förg, Daniel A. Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer |
A secure two-party bartering protocol using privacy-preserving interval operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 57-66, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali Miri |
Welcome message from the general chair. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 1, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tsubasa Takahashi 0001, Koji Sobataka, Takao Takenouchi, Yuki Toyoda, Takuya Mori, Takahide Kohro |
Top-down itemset recoding for releasing private complex data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 373-376, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anders Andersen |
An implementation of secure multi-party computations to preserve privacy when processing EMR data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 381-384, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hosnieh Rafiee, Christoph Meinel |
SSAS: A simple secure addressing scheme for IPv6 autoconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 275-282, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mads I. Ingwar, Naveed Ahmed 0005, Christian Damsgaard Jensen |
Error-rate-based fusion of biometric experts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 239-246, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dang Nguyen 0001, Jaehong Park, Ravi S. Sandhu |
A provenance-based access control model for dynamic separation of duties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 247-256, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Buccafurri, Lidia Fotia, Gianluca Lax |
Allowing privacy-preserving analysis of social network likes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 36-43, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Morvarid Sehatkar, Stan Matwin |
HALT: Hybrid anonymization of longitudinal transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 127-134, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Klara Stokes, Niklas Carlsson |
A peer-to-peer agent community for digital oblivion in online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 103-110, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ekaterina Kurdjokova, Michael Wißner, Stephan Hammer, Elisabeth André |
Trust-based decision-making for the adaptation of public displays in changing social contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 317-324, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|