default search action
14th PST 2016: Auckland, New Zealand
- 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016. IEEE 2016, ISBN 978-1-5090-4379-8
- Sujit Kumar Basak, Desmond Wesley Govender, Irene Govender:
Examining the impact of privacy, Security, and trust on the TAM and TTF models for e-commerce consumers: A pilot study. 19-26 - Aaron Hunter:
A logical approach to promoting trust over knowledge to trust over action. 27-34 - Mahendra Pratap Singh:
AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control. 35-41 - Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier:
Edge-calibrated noise for differentially private mechanisms on graphs. 42-49 - Mike Moody, Aaron Hunter:
Exploiting known vulnerabilities of a smart thermostat. 50-53 - Huan Feng, Kang G. Shin:
Masquerade of mobile applications: Introducing unlinkability in a practical way. 54-61 - Mohammad Khaliqur Rahman, Muhammad Abdullah Adnan:
Dynamic Weight on Static Trust for trustworthy social media networks. 62-69 - Andrii Shalaginov, Katrin Franke:
Automated intelligent multinomial classification of malware species using dynamic behavioural analysis. 70-77 - Giuseppe Settanni, Yegor Shovgenya, Florian Skopik, Roman Graf, Markus Wurzenberger, Roman Fiedler:
Correlating cyber incident information to establish situational awareness in Critical Infrastructures. 78-81 - Toshiki Endo, Kazunari Nawa, Naonori Kato, Yosuke Murakami:
Study on privacy setting acceptance of drivers for data utilization on connected cars. 82-87 - Guillaume Collard, Eric Disson, Guilaine Talens, Stephane Ducroquet:
Proposition of a method to aid Security Classification in Cybersecurity context. 88-95 - Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey:
An Internet-wide view of ICS devices. 96-103 - Max Smith-Creasey, Muttukrishnan Rajarajan:
A continuous user authentication scheme for mobile devices. 104-113 - Hossein Hadian Jazi, Ali A. Ghorbani:
Dynamic graph-based malware classifier. 112-120 - Sebastian Friebe, Martin Florian, Ingmar Baumgart:
Decentralized and sybil-resistant pseudonym registration using social graphs. 121-128 - Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Corrado Aaron Visaggio:
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware. 129-136 - Md. Sadek Ferdous, Ron Poet:
Formalising Identity Management protocols. 137-146 - Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace:
Attacking Android smartphone systems without permissions. 147-156 - Rishabh Kaushal, Srishty Saha, Payal Bajaj, Ponnurangam Kumaraguru:
KidsTube: Detection, characterization and analysis of child unsafe content & promoters on YouTube. 157-164 - Pei-Shan Chang, Hoon Sin Cheong, Hon Loon Wong, Seyedvahid Dianat, Cheong Seak Sea:
Secure intra-device communication protocol between applications on a smart device. 165-169 - Robert Koch, Teo Kuhn, Marcel Odenwald, Gabi Dreo Rodosek:
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID). 170-177 - Nada Essaouini, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens:
Toward an off-line analysis of obligation with deadline policies. 178-186 - Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:
Measuring code reuse in Android apps. 187-195 - David Lacey, Jim Zaiss, K. Suzanne Barber:
Understanding victim-enabled identity theft. 196-202 - John Bjornson, Aaron Hunter:
Mobile forensics for cloud data: Practical and legal considerations. 203-206 - Shagufta Mehnaz, Elisa Bertino:
Building robust temporal user profiles for anomaly detection in file system accesses. 207-210 - Byung Il Kwak, Jiyoung Woo, Huy Kang Kim:
Know your master: Driver profiling-based anti-theft method. 211-218 - Janice Canedo, Anthony Skjellum:
Using machine learning to secure IoT systems. 219-222 - Sreenivas Sremath Tirumala, Abdolhossein Sarrafzadeh, Paul Pang:
A survey on internet usage and cybersecurity awareness in students. 223-228 - Stefan Wüller, Wadim Pessin, Ulrike Meyer, Susanne Wetzel:
Privacy-preserving two-party bartering secure against active adversaries. 229-238 - Clemens Zeidler, Muhammad Rizwan Asghar:
CloudEFS: Efficient and secure file system for cloud storage. 239-246 - Kyusuk Han, Kang G. Shin:
Prevention of information mis-translation by a malicious gateway in connected vehicles. 247-254 - Michael Mireku Kwakye, Ken Barker:
Privacy-preservation in the integration and querying of multidimensional data models. 255-263 - Mordechai Guri, Matan Monitz, Yuval Elovici:
USBee: Air-gap covert-channel via electromagnetic emission from USB. 264-268 - Mehrdad Nojoumian:
Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques. 269-274 - Iznan Husainy Hasbullah, Mohammad M. Kadhum, Yung-Wey Chong, Kamal Alieyan, Azlan Osman, Supriyanto:
Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol. 275-281 - Mohammed Anbar, Rosni Abdullah, Iznan Husainy Hasbullah, Yung-Wey Chong, Omar E. Elejla:
Comparative performance analysis of classification algorithms for intrusion detection system. 282-288 - Naonori Kato, Yosuke Murakami, Toshiki Endo, Kazunari Nawa:
Study on privacy setting acceptance of the drivers for the data utilization on the car. 287-293 - Rakan Alkhulaiwi, Abdulhakim Sabur, Khalid Aldughayem, Osama Almanna:
Survey of secure anonymous peer to peer Instant Messaging protocols. 294-300 - Galoh Rashidah Haron, Dharmadharshni Maniam, Latifah Mat Nen, Nor Izyani Daud:
User behaviour and interactions for multimodal authentication. 309-316 - Carlos Garcia Cordero, Sascha Hauke, Max Mühlhäuser, Mathias Fischer:
Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks. 317-324 - Alwyn Goh, Hoon Sin Cheong, Geong Sen Poh, Seyedvahid Dianat:
Remote website authentication using dynamic multi-scale code visualization. 325-328 - Anirban Basu, Rui Xu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
User-in-a-context: A blueprint for context-aware identification. 329-334 - Kouya Tochikubo:
Improvement of information rates for specified participants in general secret sharing schemes. 333-340 - Yasushi Shinjo, Naoki Kainuma, Daiyuu Nobori, Akira Sato:
Magic mantle using social VPNs against centralized social networking services. 341-348 - Moesfa Soeheila Mohamad, Ji-Jian Chin, Geong Sen Poh:
On the security advantages of block-based multiserver searchable symmetric encryption. 349-352 - Bede Ravindra Amarasekara, Anuradha Mathrani:
Controlling risks and fraud in affiliate marketing: A simulation and testing environment. 353-360 - Anindya Shankar Bhandari, Dipanwita Roy Chowdhury:
SCARAB: A continuous authentication scheme for biomedical application. 361-367 - Min Wang, Hussein A. Abbass, Jiankun Hu:
Continuous authentication using EEG and face images for trusted autonomous systems. 368-375 - Nico Schlitter, Markus Ullrich, Jörg Lässig:
Scalability and performance of the Privacy-Aware Classification method GenPAC. 376-383 - Oluwakemi Hambolu, Lu Yu, Jon Oakley, Richard R. Brooks, Ujan Mukhopadhyay, Anthony Skjellum:
Provenance threat modeling. 384-387 - Yu-Ju Lee, Eric Wustrow:
OverTorrent: Anticensorship without centralized servers. 388-391 - Mehmood Baryalai, Julian Jang-Jaccard, Dongxi Liu:
Towards privacy-preserving classification in neural networks. 392-399 - Etienne Cartolano, Antonio Mauro Saraiva, Robert D. Stevenson:
PlayGround 2.0: Simulating behavior decisions with trust and control computations. 400-406 - Fatih Turkmen, Muhammad Rizwan Asghar, Yuri Demchenko:
iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs. 407-410 - Takeshi Takahashi, Daisuke Inoue:
Generating software identifier dictionaries from Vulnerability Database. 417-420 - Bahman A. Sassani, Charly Abarro, Ivan Pitton, Craig Young, Farhad Mehdipour:
Analysis of NTP DRDoS attacks' performance effects and mitigation techniques. 421-427 - Ahlem Kalaï, Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous:
LoTrust: A social Trust Level model based on time-aware social interactions and interests similarity. 428-436 - Abdulaziz Almehmadi, Khalil El-Khatib:
Intention-based Trust Re-evaluation. 437-444 - Kheng Kok Mar, ZhengQing Hu, Chee Yong Law, Meifen Wang:
Securing cloud data using information dispersal. 445-448 - Matthias Geihs, Denise Demirel, Johannes Buchmann:
A security analysis of techniques for long-term integrity protection. 449-456 - Wencheng Yang, Jiankun Hu, Clinton Fernandes, Vijay Sivaraman, Qianhong Wu:
Vulnerability analysis of iPhone 6. 457-463 - Matthieu Faou, Antoine Lemay, David Décary-Hétu, Joan Calvet, Francois Labreche, Militza Jean, Benoit Dupont, José M. Fernandez:
Follow the traffic: Stopping click fraud by disrupting the value chain. 464-476 - Federico Griscioli, Maurizio Pizzonia:
Securing promiscuous use of untrusted USB thumb drives in Industrial Control Systems. 477-484 - Dianxiang Xu, Shuai Peng:
Towards automatic repair of access control policies. 485-492 - Federico Griscioli, Maurizio Pizzonia, Marco Sacchetti:
USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction. 493-496 - Rong Zhu, Yun Mao, Ying Guo:
A vessel segmentation method for low contrast CT angiography image. 497-501 - Chin-Ling Chen, Yong-Yuan Deng, Yun-Ciao Wang:
Cryptanalysis of Lee and Lin's innovative electronic group-buying system. 502-505 - Tobias Wüchner, Martín Ochoa, Enrico Lovat, Alexander Pretschner:
Generating behavior-based malware detection models with genetic programming. 506-511 - Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Francesco Mercaldo:
A constraint-driven approach for dynamic malware detection. 512-519 - Michael T. Krieger, Josef Küng:
I've been - Web analytics from a user's point of view. 520-527 - Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann:
AS3: Adaptive social secret sharing for distributed storage systems. 528-535 - Yuta Kurihara, Masakazu Soshi:
A novel hash chain construction for simple and efficient authentication. 539-542 - Jacqueline Brendel, Denise Demirel:
Efficient proactive secret sharing. 543-550 - Ilya Kabanov:
Effective frameworks for delivering compliance with personal data privacy regulatory requirements. 551-554 - Hoang Giang Do, Wee Keong Ng:
Multidimensional range query on outsourced database with strong privacy guarantee. 555-560 - Sarah Asiri, Ali Miri:
An IoT trust and reputation model based on recommender systems. 561-568 - Fatema Rashid, Ali Miri:
Secure image data deduplication through compressive sensing. 569-572 - Takeharu Shirai, Masahiro Fujita, Daisuke Arai, Tomohiko Ogishi, Masakatsu Nishigaki:
Study on relationship between user awareness and QoE in communication delay on smartphones. 573-580 - Zhenhua Tan, Yicong Niu, Yuan Liu, Guangming Yang:
A novel trust model based on SLA and behavior evaluation for clouds. 581-587 - Ayane Sano, Masahiro Fujita, Masakatsu Nishigaki:
Directcha: A proposal of spatiometric mental rotation CAPTCHA. 585-592 - Dominik Herrmann, Matthias Kirchler, Jens Lindemann, Marius Kloft:
Behavior-based tracking of Internet users with semi-supervised learning. 596-599 - Hsiao-Ying Huang, Masooda N. Bashir:
Users' perspective on designing inclusive privacy-enhancing indicators. 600-607 - Thiago S. Rocha, Eduardo Souto, Brandell Cassio, Diego Azulay, Alex Monteiro, Felipe Boeira, Pedro Minatel, Breno Silva:
Data leakage detection in Tizen Web applications. 608-614 - Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia:
Towards a new generation of industrial firewalls: Operational-process aware filtering. 615-622 - Md Siam Hasan, Ali ElShakankiry, Thomas R. Dean, Mohammad Zulkernine:
Intrusion detection in a private network by satisfying constraints. 623-628 - Hanif-Mohaddes Deylami, Ravie Chandren Muniyandi, Iman Tabatabaei Ardekani, Abdolhossein Sarrafzadeh:
Taxonomy of malware detection techniques: A systematic literature review. 629-636 - Ping Ren, Wu Liu, Donghong Sun, Jian-Ping Wu, Ke Liu:
Analysis and forensics for Behavior Characteristics of Malware in Internet. 637-641 - Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici:
An optical covert-channel to leak data through an air-gap. 642-649 - Matthew Comb, Paul A. Watters:
Peeking behind the great firewall: Privacy on Chinese file sharing networks. 650-656 - Clark D. Thomborson:
Privacy patterns. 656-663 - Hamid Ebadi, Thibaud Antignac, David Sands:
Sampling and partitioning for differential privacy. 664-673 - Maryam Davari, Mohammad Zulkernine:
Analysing vulnerability reproducibility for Firefox browser. 674-681 - Natasha Dwyer, Stephen Marsh:
How students regard trust in an elearning context. 682-685 - Sazzad Hossain, Alwyn Goh, Hoon Sin Cheong, Kay Win Lee:
Generation of one-time keys for single line authentication. 686-689 - Chin-Shyurng Fahn, Chu-Ping Lee, Heng-I Chen:
A text independent handwriting forgery detection system based on branchlet features and Gaussian mixture models. 690-697 - Munalih Ahmad Syarif, Latifah Mat Nen, Alwyn Goh, Kay Win Lee, Kang Siong Ng, Leslie Ching Ow Tiong:
Challenge response interaction for biometric liveness establishment and template protection. 698-701 - Maheswara Rao Valluri:
Digital signature scheme based on truncated polynomial over finite fields. 702-705 - Noria Foukia, David Billard, Eduardo Solana:
PISCES: A framework for privacy by design in IoT. 706-713 - Benjamin VanderSloot, Stuart Wheaton, J. Alex Halderman:
A security analysis of police computer systems. 714-721 - Matthew Bernhard, Gabe Stocco, J. Alex Halderman:
Implementing Attestable kiosks. 722-729 - Limei Guo, Yun Mao, Ying Guo:
Non-invertible fingerprint template protection with polar transformations. 730-735 - Clemens Martin, Rania Nasr, Mark Hoersken, Tobias Fuechtler:
Automating Information Security assessments using intelligent software agents. 736-744 - Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, Richard R. Brooks:
A brief survey of Cryptocurrency systems. 745-752
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.