


default search action
PST 2010: Ottawa, Ontario, Canada
- Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada. IEEE 2010, ISBN 978-1-4244-7551-3
Posters
- Michael Hay, Basil Saeed, Chung-Horng Lung, Anand Srinivasan:
Co-located Physical-Layer Network Coding to mitigate passive eavesdropping. 1-2 - Stefan Nürnberger, Thomas Feller, Sorin A. Huss:
Ray - a secure micro kernel architecture. 3-6
Network Forensics Analysis
- Sherif Saad, Issa Traoré:
Method ontology for intelligent network forensics analysis. 7-14 - Linda Briesemeister, Steven Cheung, Ulf Lindqvist
, Alfonso Valdes:
Detection, correlation, and visualization of attacks against critical infrastructure systems. 15-22 - Ray Hunt, Jill Slay
:
Achieving critical infrastructure protection through the interaction of computer security and network forensics. 23-30 - Hamad Binsalleeh
, Thomas C. Ormerod
, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi
, Lingyu Wang:
On the analysis of the Zeus botnet crimeware toolkit. 31-38
Security Protocols and Architectures
- James P. Delgrande, Aaron Hunter, Torsten Grote:
On the representation and verification of cryptographic protocols in a theory of action. 39-45 - Mahendra Kumar, Richard E. Newman:
J3: High payload histogram neutral JPEG steganography. 46-53 - Perumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan:
Design of distributed security architecture for multihop WiMAX networks. 54-61 - Nabil Seddigh, Biswajit Nandy, Rupinder Makkar, Jean-Francois Beaumont:
Security advances and challenges in 4G wireless networks. 62-71
Trust
- Amirali Salehi-Abari, Tony White:
The relationship of trust, demand, and utility: Be more trustworthy, then i will buy more. 72-79 - Sanat Kumar Bista, Keshav P. Dahal
, Peter I. Cowling
, Aziz Bouras:
Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks. 80-87 - Haïdar Safa, Farah Abu Shahla:
Trust-aware monitoring scheme for WiMAX networks. 88-95 - Tracy Ann Kosa:
Vampire bats: Trust in Privacy. 96-102
Privacy
- Palanivel Andiappan Kodeswaran, Evelyne Viegas:
Towards a privacy preserving policy based infrastructure for social data access to enable scientific research. 103-109 - Yunli Wang
, Yan Cui, Liqiang Geng, Hongyu Liu:
A new perspective of privacy protection: Unique distinct l-SR diversity. 110-117 - David Tancock, Siani Pearson
, Andrew Charlesworth
:
Analysis of Privacy Impact Assessments within Major jurisdictions. 118-125 - Omar Hasan, Elisa Bertino, Lionel Brunie:
Efficient privacy preserving reputation protocols inspired by secure sum. 126-133 - James B. Williams
, Jens H. Weber-Jahnke:
Social networks for health care: Addressing regulatory gaps with privacy-by-design. 134-143
Identity and Access Management
- Paul Rabinovich:
Transaction signing in applications using identity federation. 144-149 - Brent Carrara, Carlisle Adams:
On achieving a digital identity management system with support for non-transferability. 150-159 - Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo:
Risk analysis in access control systems. 160-166 - Nauman Abdullah Shah, Muhammad Arif Wahla:
Secure architecture for RFID enabled supply chain hierarchy. 167-172
Software Security
- Pulei Xiong, Liam Peyton:
A model-driven penetration test framework for Web applications. 173-180 - Carlisle Adams, Guy-Vincent Jourdan, Jean-Pierre Levac, François Prevost:
Lightweight protection against brute force login attacks on Web applications. 181-188 - Azzam Mourad
, Sara Ayoubi, Hamdi Yahyaoui
, Hadi Otrok
:
New approach for the dynamic enforcement of Web services security. 189-196 - Daniel Leblanc, Alain Forget, Robert Biddle:
Guessing click-based graphical passwords by eye tracking. 197-204
Biometrics Technologies
- Heather Crawford
:
Keystroke dynamics: Characteristics and opportunities. 205-212 - Brent Carrara, Carlisle Adams:
You are the key: Generating cryptographic keys from voice biometrics. 213-222 - Bon K. Sy, Adam Ramirez, Arun Prakash Kumara Krishnan:
Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications. 223-230 - Alex Stoianov:
Security of Error Correcting Code for biometric Encryption. 231-235

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.