default search action
PST 2014: Toronto, ON, Canada
- Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro:
2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3502-4
Privacy
- Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay:
Can apps play by the COPPA Rules? 1-9 - Ali Miri:
Welcome message from the general chair. 1 - Gianpiero Costantino, Fabio Martinelli, Paolo Santi:
Privacy-preserving mobility-casting in opportunistic networks. 10-18 - Filipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen:
Undetectable communication: The Online Social Networks case. 19-26 - Brian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentland:
Building privacy-preserving location-based apps. 27-30 - Dragana Martinovic, Victor Ralevich, Joshua McDougall, Michael Perklin:
"You are what you play": Breaching privacy and identifying users in online gaming. 31-39 - Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Inferring social relationships from technology-level device connections. 40-47 - Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue:
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. 48-56 - Fabian Förg, Daniel A. Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer:
A secure two-party bartering protocol using privacy-preserving interval operations. 57-66 - Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang:
Direct Anonymous Attestation in practice: Implementation and efficient revocation. 67-74 - David Bissessar, Carlisle Adams, Dong Liu:
Using biometric key commitments to prevent unauthorized lending of cryptographic credentials. 75-83 - Nisha Aggarwal, Swati Agarwal, Ashish Sureka:
Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos. 84-93 - Jeremiah Bohr, Masooda N. Bashir:
Who Uses Bitcoin? An exploration of the Bitcoin community. 94-101 - Anthony Morton, Martina Angela Sasse:
Desperately seeking assurances: Segmenting users by their information-seeking preferences. 102-111 - Roberto Guanciale, Dilian Gurov, Peeter Laud:
Private intersection of regular languages. 112-120 - Oshani Seneviratne, Lalana Kagal:
Enabling privacy through transparency. 121-128 - Ali Dehghantanha, Katrin Franke:
Privacy-respecting digital investigation. 129-138
Security
- Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi:
ZARATHUSTRA: Extracting Webinject signatures from banking trojans. 139-148 - Clemens Martin, Amina Kadry, Ghada Abu-Shady:
Quantifying the financial impact of it security breaches on business processes. 149-155 - Florian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg:
Semi-synthetic data set generation for security software evaluation. 156-163 - Azzam Mourad, Hussein Jebbaoui:
Towards efficient evaluation of XACML policies. 164-171 - Halima Al Shehhi, Dua'a Abu Hamdi, IzzEddin Asad, Farkhund Iqbal:
A forensic analysis framework for recovering encryption keys and BB10 backup decryption. 172-178 - Marcelo Luiz Brocardo, Issa Traoré:
Continuous authentication using micro-messages. 179-188 - Glen Nielsen, Michael Vedel, Christian Damsgaard Jensen:
Improving usability of passphrase authentication. 189-198 - Mohammad Saiful Islam Mamun, Atsuko Miyaji:
Secure VANET applications with a refined group signature. 199-206 - Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
A study of mnemonic image passwords. 207-214 - Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser:
Data-centric phishing detection based on transparent virtualization technologies. 215-223 - Yusuke Takamatsu, Kenji Kono:
Clickjuggler: Checking for incomplete defenses against clickjacking. 224-231 - Ala'a El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang:
Identifying users with application-specific command streams. 232-238 - Omar Abahmane, Luigi Logrippo:
Granularity based flow control. 239-248 - Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz:
Automated generation of models for fast and precise detection of HTTP-based malware. 249-256 - Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Muttukrishnan Rajarajan:
P-SPADE: GPU accelerated malware packer detection. 257-263 - Bassam Sayed, Issa Traoré, Amany Abdelhalim:
Detection and mitigation of malicious JavaScript using information flow control. 264-273 - Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
Secure exams despite malicious management. 274-281 - Mohamed Fazeen, Ram Dantu:
Another free app: Does it have the right intentions? 282-289 - Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Specifying and enforcing constraints in dynamic access control policies. 290-297 - Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Design requirements to counter parallel session attacks in security protocols. 298-305 - Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi:
Automata-based approach to design and analyze security policies. 306-313 - Keji Hu, Wensheng Zhang:
Efficient verification of data encryption on cloud servers. 314-321 - Dan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Assessing cryptographic signature schemes from a legal perspective. 322-329 - Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, Willem Jonker:
Distributed Searchable Symmetric Encryption. 330-337 - Mehrdad Nojoumian:
Generalization of socio-rational secret sharing with a new utility function. 338-341 - Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin:
Crypto-assistant: Towards facilitating developer's encryption of sensitive data. 342-346
Trust
- Khalid Zaman Bijon, Md Munirul Haque, Ragib Hasan:
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. 347-354 - Noel Sardana, Robin Cohen:
Validating trust models against realworld data sets. 355-362 - Noel Sardana, Robin Cohen:
Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation. 363-370 - Chris Burnett, Liang Chen, Peter Edwards, Timothy J. Norman:
TRAAC: Trust and risk aware access control. 371-378 - Giuseppe Primiero, Franco Raimondi:
A typed natural deduction calculus to reason about secure trust. 379-382 - Stefano Bistarelli, Francesco Santini:
Two trust networks in one: Using bipolar structures to fuse trust and distrust. 383-390 - Florian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser:
Communicating and visualising multicriterial trustworthiness under uncertainty. 391-397 - Natasha Dwyer, Stephen Marsh:
What can the hashtag #trust tell us about how users conceptualise trust? 398-402 - Dipen Contractor, Dhiren R. Patel:
Analyzing trustworthiness of virtual machines in data-intensive cloud computing. 403-406 - Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba:
i/k-Contact: A context-aware user authentication using physical social trust. 407-413 - Arnaldo Spalvieri, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi:
Weighting peer reviewers. 414-419 - Donovan Isherwood, Marijke Coetzee:
TrustCV: Reputation-based trust for collectivist digital business ecosystems. 420-424
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.