The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PST"( http://dblp.L3S.de/Venues/PST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/pst

Publication years (Num. hits)
2004 (27) 2005 (32) 2006 (80) 2008 (26) 2010 (32) 2011 (39) 2012 (44) 2013 (52) 2014 (56) 2015 (28) 2016 (106) 2017 (47) 2018 (54)
Publication types (Num. hits)
inproceedings(610) proceedings(13)
Venues (Conferences, Journals, ...)
PST(623)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 156 occurrences of 123 keywords

Results
Found 623 publication records. Showing 623 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Navoda Senavirathne, Vicenç Torra Approximating Robust Linear Regression With An Integral Privacy Guarantee. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk Mining Sequential Patterns from Outsourced Data via Encryption Switching. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ghada El Haddad, Amin Shahab, Esma Aïmeur Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online Shopping. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yiming Zhang, Baljeet Malhotra, Cheng Chen Industry-Wide Analysis of Open Source Security. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Voke Augoye, Allan Tomlinson Mutual Authentication in Electronic Voting Schemes. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iman Sharafaldin, Ali A. Ghorbani EagleEye: A Novel Visual Anomaly Detection Method. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michihiro Yamada, Riko Shigeno, Hiroaki Kikuchi, Maki Sakamoto Evaluation and Development of Onomatopoeia CAPTCHAs. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel Privacy-Preserving Subgraph Checking. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sourya Joyee De, Abdessamad Imine Enabling Users to Balance Social Benefit and Privacy in Online Social Networks. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Brittany Davis, Christopher Whitfield, Mohd Anwar Extended Abstract: Ethical and Privacy Considerations in Cybersecurity. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Robin Ankele, Andrew Simpson Analysis and Evaluation of Syntactic Privacy Notions and Games. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim Andro-Simnet: Android Malware Family Classification using Social Network Analysis. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Milica Stojmenovic, Robert Biddle Hide-and-Seek with Website Identity Information. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Toufique Morshed, Dima Alhadidi, Noman Mohammed Parallel Linear Regression on Encrypted Data. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hazel Murray, David Malone Exploring the Impact of Password Dataset Distribution on Guessing. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eunbi Seo, Hyun Min Song, Huy Kang Kim GIDS: GAN based Intrusion Detection System for In-Vehicle Network. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lucky Onwuzurike, Mário Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giulia Traverso, Denis Butin, Johannes Buchmann 0001, Alex Palesandro Coalition-Resistant Peer Rating for Long-Term Confidentiality. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sophie Le Page, Gregor von Bochmann, Qian Cui, Jason Flood, Guy-Vincent Jourdan, Iosif-Viorel Onut Using AP-TED to Detect Phishing Attack Variations. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh 0001, Jason R. C. Nurse (eds.) 16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018 Search on Bibsonomy PST The full citation details ... 2018 DBLP  BibTeX  RDF
1Kai Bavendiek, Robin Adams 0001, Sibylle Schupp Privacy-Preserving Architectures with Probabilistic Guaranties. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kai Mindermann, Stefan Wagner 0001 Usability and Security Effects of Code Examples on Crypto APIs. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hesham Mahrous, Baljeet Malhotra Managing Publicly Known Security Vulnerabilities in Software Systems. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Domhnall Carlin, Philip O'Kane, Sakir Sezer, Jonah Burgess Detecting Cryptomining Using Dynamic Analysis. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zohaib Riaz, Frank Dürr, Kurt Rothermel Location Privacy and Utility in Geo-social Networks: Survey and Research Challenges. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kasper Bonne Rasmussen, Paolo Gasti Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Soheil Varastehpour, Hamid R. Sharifzadeh, Iman Tabatabaei Ardekani, Abdolhossein Sarrafzadeh Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ge Chu, Alexei Lisitsa Poster: Agent-based (BDI) modeling for automation of penetration testing. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wanpeng Li, Chris J. Mitchell, Thomas Chen Mitigating CSRF attacks on OAuth 2.0 Systems. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ratinder Kaur, Ye Ning, Hugo Gonzalez, Natalia Stakhanova Unmasking Android Obfuscation Tools Using Spatial Analysis. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1James Clay, Alexander Hargrave, Ramalingam Sridhar A Power Analysis of Cryptocurrency Mining: A Mobile Device Perspective. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jeman Park 0001, DaeHun Nyang, Aziz Mohaisen Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Melek Önen, Refik Molva CHARIOT: Cloud-Assisted Access Control for the Internet of Things. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gaurav Sharma 0006, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot A Twofold Group Key Agreement Protocol for NoC based MPSoCs. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jukka Ruohonen, Joonas Salovaara, Ville Leppänen Crossing Cross-Domain Paths in the Current Web. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lanlan Pan, Xin Zhang, Anlei Hu, Xuebiao Yuchi, Jian Wang Mitigating Client Subnet Leakage in DNS Queries. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1William Aiken, Hyoungshick Kim, Jungwoo Ryoo, Mary Beth Rosson An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1João S. Resende, Rolando Martins, Luis Antunes 0002 Enforcing Privacy and Security in Public Cloud Storage. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray On Sybil Classification in Online Social Networks Using Only Structural Features. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrew Sutton, Reza Samavi, Thomas E. Doyle, David Koff Digitized Trust in Human-in-the-Loop Health Research. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gongxian Zeng, Meiqi He, Linru Zhang, Jun Zhang, Yuechen Chen, Siu-Ming Yiu Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ibrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matthew Hagan, BooJoong Kang, Kieran McLaughlin, Sakir Sezer Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lukasz Opiola, Lukasz Dutka, Renata G. Slota, Jacek Kitowski Trust-driven, Decentralized Data Access Control for Open Network of Autonomous Data Providers. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mahsa Keshavarz, Mohd Anwar Towards Improving Privacy Control for Smart Homes: A Privacy Decision Framework. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Guruprasad Eswaraiah, Roopa Vishwanathan, Douglas Nedza Automated Proofs of Signatures using Bilinear Pairings. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nicolas E. Diaz Ferreyra, Rene Meis, Maritta Heisel At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ana C. Carvalho, Rolando Martins, Luis Antunes 0002 How-to Express Explicit and Auditable Consent. Search on Bibsonomy PST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Karthik Sheshadri, Nirav Ajmeri, Jessica Staddon No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Khaoula Es-Salhi, David Espes, Nora Cuppens A New Segmentation Method for Integrated ICS (Short Paper). Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anastasia Skovoroda, Dennis Gamayunov Automated Static Analysis and Classification of Android Malware using Permission and API Calls Models. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin System-Assigned Passwords You Can't Write Down, But Don't Need To. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mario Parreño Centeno, Aad van Moorsel, Stefano Castruccio Smartphone Continuous Authentication Using Deep Learning Autoencoders. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper). Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stefan Wüller, Ulrike Meyer, Susanne Wetzel Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ju-Sung Kang, Hojoong Park, Yongjin Yeom On the Additional Chi-Square Tests for the IID Assumption of NIST SP 800-90B. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrew Cortese, Amirreza Masoumzadeh Modeling Exposure in Online Social Networks. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abhinav Jangda, Mohit Mishra RandHeap: Heap Randomization for Mitigating Heap Spray Attacks in Virtual Machines. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gongxian Zeng, Siu-Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au A Nonoutsourceable Puzzle Under GHOST Rule. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Akshaya Venkateswara Raja, Jehyun Lee, Debin Gao On Return Oriented Programming Threats in Android Runtime. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong Lelantos: A Blockchain-Based Anonymous Physical Delivery System. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrew Bedford Information-Flow Control with Fading Labels. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anna Cinzia Squicciarini, Andrea Novelli, Dan Lin 0001, Cornelia Caragea, Haoti Zhong From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David W. Kravitz Transaction Immutability and Reputation Traceability: Blockchain as a Platform for Access Controlled IoT and Human Interactivity. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Petr Dzurenda, Sara Ricci, Jan Hajny, Lukas Malina Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann 0001 Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper). Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Hugo Gonzalez, Kenneth Fon Mbah, Ali A. Ghorbani Towards a Network-Based Framework for Android Malware Detection and Characterization. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas P. Keenan Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Doudalis Stylianos, Sharad Mehrotra SORTaki: A Framework to Integrate Sorting with Differential Private Histogramming Algorithms. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Masoumeh Shafieinejad, Reihaneh Safavi-Naini A Post-Quantum One Time Signature Using Bloom Filter. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jeremy Martin, Dane Brown, Kris Merrion, Lamont Brown, Travis Mayberry How Much Privacy Does $3, 165 Buy You? Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Christopher Bellman, Ramiro Liscano, Amit Maraj What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nurul Momen, Tobias Pulls, Lothar Fritsch, Stefan Lindskog How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper). Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bahman Sistany, Amy P. Felty A Certified Core Policy Language. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Meredydd Williams, Jason R. C. Nurse, Sadie Creese Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Augot, Hervé Chabanne, Olivier Clémot, William George Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rebecca Cooper, Hala Assal, Sonia Chiasson Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper). Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yasushi Shinjo, Sota Naito, Xiao Kunyao, Akira Sato ABnews: A Fast Private Social Messaging System Using Untrusted Storage and Attribute-Based Encryption. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hyunsung Lee, Seong Hoon Jeong, Huy Kang Kim OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lydia Garms, Keith M. Martin, Siaw-Lynn Ng Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper). Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Subhojeet Mukherjee, Jacob Walker, Indrakshi Ray, Jeremy Daily A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey Running Compression Algorithms in the Encrypted Domain: A Case-Study on the Homomorphic Execution of RLE. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ali ElShakankiry, Thomas R. Dean Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuan Liu 0002, Zheng Zhao, Guibing Guo, Xingwei Wang, Zhenhua Tan, Shuang Wang An Identity Management System Based on Blockchain. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 15th Annual Conference on Privacy, Security and Trust, PST 2017, Calgary, AB, Canada, August 28-30, 2017 Search on Bibsonomy PST The full citation details ... 2017 DBLP  BibTeX  RDF
1Scott A. Thompson, Bharath K. Samanthula Optimized Secure Data Aggregation in Wireless Sensor Networks. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper). Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Apostolis Zarras, Federico Maggi Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Meiqi He, Jun Zhang, Gongxian Zeng, Siu-Ming Yiu A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Baptiste Olivier, Tony Quertier Differentially Private Instance-Based Noise Mechanisms in Practice. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marc-André Laverdière, Ettore Merlo Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper). Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 623 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license