The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PST"( http://dblp.L3S.de/Venues/PST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/pst

Publication years (Num. hits)
2004 (27) 2005 (32) 2006 (80) 2008 (26) 2010 (32) 2011 (39) 2012 (44) 2013 (52) 2014 (56) 2015 (28) 2016 (106) 2017 (47) 2018 (54) 2019 (51) 2021 (61) 2022 (32) 2023 (56)
Publication types (Num. hits)
inproceedings(806) proceedings(17)
Venues (Conferences, Journals, ...)
PST(823)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 156 occurrences of 123 keywords

Results
Found 823 publication records. Showing 823 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Bo Tang, Qi Li 0002, Ravi S. Sandhu A multi-tenant RBAC model for collaborative cloud services. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vidushi Chaudhary, Ashish Sureka Contextual feature based one-class classifier approach for detecting video response spam on YouTube. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Paz Morillo, Marc Obrador Efficient polynomial delegation under standard assumptions. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kellyton dos Santos Brito, Frederico Araújo Durão, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira How people care about their personal data released on social media. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lin Cheng 0002, Zhengping Jin, Qiaoyan Wen, Hua Zhang 0001 A novel privacy preserving keyword searching for cloud storage. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sutirtha Sanyal SPIKE: A novel session key management protocol with time-varying secure cluster formation in wireless sensor networks. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Markus Gruber, Christian Schanes, Florian Fankhauser, Thomas Grechenig Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohd Rizuan Baharon, Qi Shi 0001, David Llewellyn-Jones, Madjid Merabti Secure rendering process in cloud computing. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yi Qian, Sibel Adali Extended structural balance theory for modeling trust in social networks. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vanessa Boothroyd, Sonia Chiasson Writing down your password: Does it help? Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Esther Palomar, Almudena Alcaide, Elisenda Molina, Yan Zhang Coalitional games for the management of anonymous access in online social networks. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marc Juárez, Vicenç Torra A self-adaptive classification for the dissociating privacy agent. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Davide Ceolin, Archana Nottamkandath, Wan J. Fokkink Semi-automated assessment of annotation trustworthiness. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti The role of phone numbers in understanding cyber-crime schemes. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sarah Magin, Sascha Hauke Towards engineering trust systems: Template-based, component-oriented assembly. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zahra Sohrabi-Bonab, Mahdi R. Alagheband, Mohammad Reza Aref Traceability analysis of quadratic residue-based RFID authentication protocols. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider, Helen Treharne, Adrian Waller Policy templates for relationship-based access control. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mao-Pang Pang Lin, Wei-Chih Hong, Chih-Hung Chen, Chen-Mou Cheng Design and implementation of multi-user secure indices for encrypted cloud storage. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benjamin Henne, Christian Kater, Matthew Smith 0001, Michael Brenner 0003 Selective cloaking: Need-to-know for location-based apps. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alireza Toroghi Haghighat, Mohammad Sadeq Dousti, Rasool Jalili An efficient and provably-secure coercion-resistant e-voting protocol. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ricardo Neisse, Jörg Dörr Model-based specification and refinement of usage control policies. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alegria Baquero, Allan M. Schiffman, Jeff Shrager Blend me in: Privacy-preserving input generalization for personalized online services. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani 0001, Christian Damsgaard Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang 0002 (eds.) Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013 Search on Bibsonomy PST The full citation details ... 2013 DBLP  BibTeX  RDF
1Bisheng Liu, Urs Hengartner Privacy-preserving social recommendations in geosocial networks. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nouha Oualha, Alexis Olivereau, Aymen Boudguiga Pseudonymous communications in secure industrial wireless sensor networks. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mathias Payer, Thomas R. Gross Hot-patching a web server: A case study of ASAP code repair. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jian Chang, Peter Gebhard, Andreas Haeberlen, Zachary G. Ives, Insup Lee 0001, Oleg Sokolsky, Krishna K. Venkatasubramanian TrustForge: Flexible access control for collaborative crowd-sourced environment. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tim Storer, Stephen Marsh 0001, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci Encouraging second thoughts: Obstructive user interfaces for raising security awareness. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Canh Ngo, Marc X. Makkes, Yuri Demchenko, Cees de Laat Multi-data-types interval decision diagrams for XACML evaluation engine. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Muhammad Qasim Saeed, Zeeshan Bilal, Colin D. Walter An NFC based consumer-level counterfeit detection framework. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jordi Soria-Comas, Josep Domingo-Ferrer Differential privacy via t-closeness in data publishing. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sebastian Biedermann, Martin Zittel, Stefan Katzenbeisser 0001 Improving security of virtual machines during live migrations. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Balduzzi, Vincenzo Ciangaglini, Robert McArdle Targeted attacks detection with SPuNge. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini Socio-technical formal analysis of TLS certificate validation in modern browsers. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Md. Imrul Kayes, Adriana Iamnitchi Aegis: A semantic implementation of privacy as contextual integrity in social ecosystems. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts Communicating trustworthiness using radar graphs: A detailed look. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stephen Marsh 0001, Yao Wang, Sylvie Noël, Lewis Robart, John A. Stewart Device Comfort for mobile health information accessibility. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Paolo D'Arco, Alfredo De Santis Key privacy and anonymous protocols. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Muhammad Al Mutaz, Levi Malott, Sriram Chellappan Leveraging platoon dispersion for Sybil detection in vehicular networks. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1John Ferro, Lisa Singh, Micah Sherr Identifying individual vulnerability based on public data. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alexandre Viejo, David Sánchez 0001 Providing useful and private Web search by means of social network profiling. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sergi Martinez-Bea, Sergio Castillo-Perez, Joaquín García-Alfaro Real-time malicious fast-flux detection using DNS and bot related features. Search on Bibsonomy PST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 The role of trust in computer security. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Graeme Smith 0001, Jeff W. Sanders Using conventional reasoning techniques for self-organising systems. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Denzil Correa, Ashish Sureka, Raghav Sethi WhACKY! - What anyone could know about you from Twitter. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christian Müller-Schloer, Wolfgang Reif, Jan-Philipp Steghöfer 3rd edition of the workshop on trustworthy self-organizing systems (TSOS 2012). Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marian Harbach, Sascha Fahl, Michael Brenner 0003, Thomas Muders, Matthew Smith 0001 Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Muyiwa Olurin, Carlisle Adams, Luigi Logrippo Platform for privacy preferences (P3P): Current status and future directions. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yasser Jafer, Herna L. Viktor, Eric Paquet Aggregation and privacy in multi-relational databases. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Audun Jøsang, Kent A. Varmedal, Christophe Rosenberger, Rajendra Kumar Service provider authentication assurance. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lukas Klejnowski, Yvonne Bernard, Christian Müller-Schloer, Jörg Hähner Using Trust to reduce wasteful computation in open Desktop Grid Systems. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter Out of sight, out of mind: Effects of displaying access-control information near the item it controls. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jonathan Lung Ethical and legal considerations of reCAPTCHA. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mark Vinkovits Towards requirements for trust management. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Liang Chen, Jason Crampton, Martin J. Kollingbaum, Timothy J. Norman Obligations in risk-aware access control. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fatema Rashid, Ali Miri, Isaac Woungang A secure data deduplication framework for cloud environments. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata A distributed platform of high interaction honeypots and experimental results. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anirban Basu, Natasha Dwyer, Stephen Naicken A concordance framework for building trust evidences. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yusuke Takamatsu, Yuji Kosuga, Kenji Kono Automated detection of session management vulnerabilities in web applications. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ali Nur Mohammad Noman, Carlisle M. Adams DLAS: Data Location Assurance Service for cloud computing environments. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jaehong Park, Dang Nguyen 0001, Ravi S. Sandhu A provenance-based access control model. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mehrdad Nojoumian, Douglas R. Stinson Social secret sharing in cloud computing using a new trust function. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Johannes Viehmann The theory of creating trust with a set of mistrust-parties. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gianpiero Costantino, Fabio Martinelli, Paolo Santi, Dario Amoruso An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aditi Ramachandran, Lisa Singh, Edward Porter, Frank Nagle Exploring re-identification risks in public domains. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cody Buntain, Jennifer Golbeck, Dana S. Nau, Sarit Kraus Advice and trust in games of choice. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jeremy Pitt Distributive and retributive justice in self-organising electronic institutions. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alexandre Viejo, Jordi Castellà-Roca, Oriol Bernado, Josep Maria Mateo-Sanz Single-party private web search. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Said Marouf, Mohamed Shehab, Adharsh Desikan REM: A runtime browser extension manager with fine-grained access control. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nicolas Anciaux, Benjamin Nguyen, Michalis Vazirgiannis Limiting data collection in application forms: A real-case application of a founding privacy principle. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kasper Lindberg, Christian Damsgaard Jensen Collaborative trust evaluation for wiki security. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shushan Zhao, Robert D. Kent, Akshai K. Aggarwal An integrated key management and secure routing framework for Mobile Ad-Hoc Networks. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Slim Trabelsi, Jakub Sendor Sticky policies for data control in the cloud. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Lidia Fotia, Gianluca Lax Privacy-preserving resource evaluation in social networks. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gabriele Peters, Kerstin Bunte, Marc Strickert, Michael Biehl, Thomas Villmann Visualization of processes in self-learning systems. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jennifer Golbeck, Hal Warren, Eva Winer Making trusted attribute assertions online with the publish trust framework. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pratap Chillakanti Secure collaboration in on boarding companies. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel Leblanc, Robert Biddle Risk perception of internet-related activities. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nora Cuppens-Boulahia, Philip Fong, Joaquín García-Alfaro, Stephen Marsh 0001, Jan-Philipp Steghöfer (eds.) Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012 Search on Bibsonomy PST The full citation details ... 2012 DBLP  BibTeX  RDF
1Huiying Duan, Peng Yang Building robust Reputation Systems for travel-related services. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok Towards a BPEL model-driven approach for Web services security. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Manuel Lafond, Pierre-Olivier Brosseau, Esma Aïmeur Privacy invasion in business environments. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Hervé Chabanne, Olivier Cipiere Combining the setbase approach with negative databases. Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arun Prakash, Kumara Krishnan, Bon K. Sy SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0). Search on Bibsonomy PST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Samir Ouchani, Yosr Jarraya, Otmane Aït Mohamed Model-based systems security quantification. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1 Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada Search on Bibsonomy PST The full citation details ... 2011 DBLP  BibTeX  RDF
1Jens H. Weber-Jahnke, James B. Williams 0001 Beyond privacy policies - assessing inherent privacy risks of consumer health services. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi A trust-based approach against IP-spoofing attacks. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alberto Vila Tena, Yrjö Raivio Privacy challenges of open APIs: Case location based services. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Steve R. Tate, Roopa Vishwanathan General Secure Function Evaluation using standard trusted computing hardware. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dina Said, Lisa Stirling, Peter Federolf, Ken Barker 0001 Data preprocessing for distance-based unsupervised Intrusion Detection. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shirantha Wijesekera, Xu Huang 0001, Dharmendra Sharma 0001 Performance analysis of QKD based key distribution for IEEE 802.11 networks. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Serguei A. Mokhov, Joey Paquet, Mourad Debbabi On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Riaz Ahmed Shaikh 0001, Kamel Adi, Luigi Logrippo, Serge Mankovski Risk-based decision method for access control systems. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mahmoud Ghorbel, Armen Aghasaryan, Stéphane Betgé-Brezetz, Marie-Pascale Dupont, Guy-Bertrand Kamga, Sophie Piekarec Privacy Data Envelope: Concept and implementation. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martín Barrère, Gustavo Betarte, Marcelo Rodríguez Towards machine-assisted formal procedures for the collection of digital evidence. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qian Yu, Chang N. Zhang RC4 state and its applications. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 823 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license