The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PST"( http://dblp.L3S.de/Venues/PST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/pst

Publication years (Num. hits)
2004 (27) 2005 (32) 2006 (80) 2008 (26) 2010 (32) 2011 (39) 2012 (44) 2013 (52) 2014 (56) 2015 (28) 2016 (106) 2017 (47) 2018 (54) 2019 (51) 2021 (61) 2022 (32) 2023 (56)
Publication types (Num. hits)
inproceedings(806) proceedings(17)
Venues (Conferences, Journals, ...)
PST(823)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 156 occurrences of 123 keywords

Results
Found 823 publication records. Showing 823 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Zainab M. Aljazzaf, Miriam A. M. Capretz, Mark Perry 0001 Trust bootstrapping services and service providers. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Marion Steiner UPBA: User-Authenticated Property-Based Attestation. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Abbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Shervin Shirmohammadi, Carlisle M. Adams, Abdulmotaleb El-Saddik Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Md. Moniruzzaman, Ken Barker 0001 Delegation of access rights in a privacy preserving access control model. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Johannes Viehmann Secure communication with secret sharing in static computer networks with partition in mistrust parties. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sherif Saad, Issa Traoré, Ali A. Ghorbani 0001, Bassam Sayed, David Zhao, Wei Lu 0018, John Felix, Payman Hakimian Detecting P2P botnets through network behavior analysis and machine learning. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yoshihiro Kaneko, Yuji Kinpara, Yuta Shiomi A hamming distance-like filtering in keystroke dynamics. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lilia Georgieva Modelling of security properties in Alloy. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohammad Parham, John William Atwood Validation of security for participant control exchanges in multicast content distribution. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Abdulsalam Yassine, Ali A. Nazari Shirehjini, Shervin Shirmohammadi, Thomas T. Tran Online information privacy: Agent-mediated payoff. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Naveed Ahmad 0003, Haitham S. Cruickshank, Zhili Sun, Muhammad Asif 0006 Pseudonymised communication in delay tolerant networks. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1François Gauthier 0001, Dominic Letarte, Thierry Lavoie, Ettore Merlo Extraction and comprehension of moodle's access control model: A case study. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiangong Weng, Amy P. Felty An implementation of a verification condition generator for foundational proof-carrying code. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nick Mailloux, Ali Miri, Monica Nevins Forward secure identity-based key agreement for dynamic groups. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat I-RBAC: Isolation enabled role-based access control. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tristan Allard, Benjamin Nguyen, Philippe Pucheral Safe realization of the Generalization privacy mechanism. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ali Nur Mohammad Noman, Sk. Md. Mizanur Rahman, Carlisle Adams Improving security and usability of low cost RFID tags. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hagen Stübing, Murat Ceven, Sorin A. Huss A Diffie-Hellman based privacy protocol for Car-to-X communication. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dakshita Khurana, Aditya Gaurav Ensuring tight computational security against higher-order DPA attacks. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qi Xie, Urs Hengartner Privacy-preserving matchmaking For mobile social networking secure against malicious users. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Esma Aïmeur, David Schönfeld The ultimate invasion of privacy: Identity theft. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto Cryptographic security models for eHealth P2P database management systems network. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Joshua Gorner, Jie Zhang 0002, Robin Cohen Improving the use of advisor networks for multi-agent trust modelling. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bernard Stepien, Stan Matwin, Amy P. Felty Advantages of a non-technical XACML notation in role-based models. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis A probabilistic-based approach towards trust evaluation using Poisson Hidden Markov Models and Bonus Malus Systems. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paolo Gasti, Alessio Merlo On Re-use of randomness in broadcast encryption. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nabil Seddigh, Biswajit Nandy, Rupinder Makkar, Jean-Francois Beaumont Security advances and challenges in 4G wireless networks. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Brent Carrara, Carlisle Adams On achieving a digital identity management system with support for non-transferability. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Omar Hasan, Elisa Bertino, Lionel Brunie Efficient privacy preserving reputation protocols inspired by secure sum. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefan Nürnberger, Thomas Feller 0002, Sorin A. Huss Ray - a secure micro kernel architecture. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Brent Carrara, Carlisle Adams You are the key: Generating cryptographic keys from voice biometrics. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hamad Binsalleeh, Thomas C. Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang 0001 On the analysis of the Zeus botnet crimeware toolkit. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bon K. Sy, Adam Ramirez, Arun Prakash Kumara Krishnan Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yunli Wang, Yan Cui, Liqiang Geng, Hongyu Liu A new perspective of privacy protection: Unique distinct l-SR diversity. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Amirali Salehi-Abari, Tony White The relationship of trust, demand, and utility: Be more trustworthy, then i will buy more. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel Leblanc, Alain Forget, Robert Biddle Guessing click-based graphical passwords by eye tracking. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok New approach for the dynamic enforcement of Web services security. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Perumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan Design of distributed security architecture for multihop WiMAX networks. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1David Tancock, Siani Pearson, Andrew Charlesworth Analysis of Privacy Impact Assessments within Major jurisdictions. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nauman Abdullah Shah, Muhammad Arif Wahla Secure architecture for RFID enabled supply chain hierarchy. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sherif Saad, Issa Traoré Method ontology for intelligent network forensics analysis. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1James P. Delgrande, Aaron Hunter 0001, Torsten Grote On the representation and verification of cryptographic protocols in a theory of action. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Linda Briesemeister, Steven Cheung, Ulf Lindqvist, Alfonso Valdes Detection, correlation, and visualization of attacks against critical infrastructure systems. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo Risk analysis in access control systems. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Palanivel Andiappan Kodeswaran, Evelyne Viegas Towards a privacy preserving policy based infrastructure for social data access to enable scientific research. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ray Hunt, Jill Slay Achieving critical infrastructure protection through the interaction of computer security and network forensics. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Paul Rabinovich Transaction signing in applications using identity federation. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1James B. Williams 0001, Jens H. Weber-Jahnke Social networks for health care: Addressing regulatory gaps with privacy-by-design. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pulei Xiong, Liam Peyton A model-driven penetration test framework for Web applications. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Carlisle Adams, Guy-Vincent Jourdan, Jean-Pierre Levac, François Prevost Lightweight protection against brute force login attacks on Web applications. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Aziz Bouras Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alex Stoianov Security of Error Correcting Code for biometric Encryption. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Heather Crawford Keystroke dynamics: Characteristics and opportunities. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tracy Ann Kosa Vampire bats: Trust in Privacy. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mahendra Kumar, Richard E. Newman J3: High payload histogram neutral JPEG steganography. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Haïdar Safa, Farah Abu Shahla Trust-aware monitoring scheme for WiMAX networks. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Hay, Basil Saeed, Chung-Horng Lung, Anand Srinivasan Co-located Physical-Layer Network Coding to mitigate passive eavesdropping. Search on Bibsonomy PST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1 Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada Search on Bibsonomy PST The full citation details ... 2010 DBLP  BibTeX  RDF
1Heidar Pirzadeh, Danny Dubé Encoding the Program Correctness Proofs as Programs in PCC Technology. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michel Deriaz The Uncertainty of the Truth. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Azzam Mourad, Dima Alhadidi, Mourad Debbabi Cross-Language Weaving Approach Targeting Software Security Hardening. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Farag Azzedin, Ahmad Ridha The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Riyad Alshammari, Nur Zincir-Heywood Investigating Two Different Approaches for Encrypted Traffic Classification. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Princely Ifinedo IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter? Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles A Multiple-Control Fuzzy Vault. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Baishakhi Ray, Shivakant Mishra A Protocol for Building Secure and Reliable Covert Channel. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Viktor Krammer An Effective Defense against Intrusive Web Advertising. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hilmi Günes Kayacik, Nur Zincir-Heywood Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sheikh Iqbal Ahamed, Mehrab Monjur, Mohammad Saiful Islam CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel 0001 Unlinkable Communication. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Larry Korba, Stephen Marsh 0001, Reihaneh Safavi-Naini (eds.) Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada Search on Bibsonomy PST The full citation details ... 2008 DBLP  BibTeX  RDF
1Piotr Cofta Confidence-Compensating Privacy Protection. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nathan Lewis, Noria Foukia An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao 0019 Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Apurva Mohan, Douglas M. Blough AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wilfred Villegas, Bader Ali, Muthucumaru Maheswaran An Access Control Scheme for Protecting Personal Data. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Adetokunbo Makanju, Stephen Brooks, Nur Zincir-Heywood, Evangelos E. Milios LogView: Visualizing Event Log Clusters. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1David Benjamin, Mikhail J. Atallah Private and Cheating-Free Outsourcing of Algebraic Computations. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ed Brown, Tracy Ann Kosa Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jie Zhang 0002, Murat Sensoy, Robin Cohen A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jani Suomalainen, Seamus Moloney, Juha Koivisto, Kari Keinänen OpenHouse: A Secure Platform for Distributed Home Services. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Vikram Goyal, Shyam K. Gupta 0001, Shobhit Saxena Query rewriting for detection of privacy violation through inferencing. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1EunJoung Byun, SeokIn Kim, HongSoo Kim, SungJin Choi, JangWon Choi, Chong-Sun Hwang MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sylvia L. Osborn Role-based access control: past, present and future. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Viktor Krammer Phishing defense against IDN address spoofing attacks. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF usability, web browsers, phishing, internet security, unicode, internationalized domain names
1Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl Embedding verifiable information flow analysis. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF embedded systems, static analysis, information flow, confidentiality, language-based security, smart objects
1Candido Rodriguez, Ajay Daryanani, Diego R. López, Jose M. Macias AA-RR: working with authentication and authorization infrastructures. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, software testing, identification, computer network security
1Wenyin Zhang, Ningde Jin Chinese text watermarking based on occlusive components. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Chinese text watermarking, digital watermarking
1A. K. M. Harun-Ar-Rashid The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stephanie Chow Ontario healthcare privacy act: compliant ad hoc healthcare applications. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gregory B. Newby Paths to creativity in security careers. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mathew Graves, Mohammad Zulkernine Bridging the gap: software specification meets intrusion detector. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack languages, intrusion detection, software security, software specification
1Muhammad Alam, Michael Hafner, Ruth Breu Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF administrative role based access control, permission-level delegation, service oriented architectures, model-driven architecture
1Reto Kohlas, Jacek Jonczy, Rolf Haenni Towards a precise semantics for authenticity and trust. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michel Deriaz, Jean-Marc Seigneur Trust and security in spatial messaging: FoxyTag, the speed camera case study. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jinshan Liu, Valérie Issarny An incentive compatible reputation mechanism for ubiquitous computing environments. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ubiquitous computing, mobile ad hoc networks, incentive compatibility, reputation mechanism
1Thomas W. Lauer, Xiaodong Deng Building online trust through privacy policies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 823 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license