


default search action
PST 2014: Toronto, ON, Canada
- Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro:

2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3502-4
Privacy
- Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay:

Can apps play by the COPPA Rules? 1-9 - Ali Miri:

Welcome message from the general chair. 1 - Gianpiero Costantino, Fabio Martinelli, Paolo Santi:

Privacy-preserving mobility-casting in opportunistic networks. 10-18 - Filipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen:

Undetectable communication: The Online Social Networks case. 19-26 - Brian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentland:

Building privacy-preserving location-based apps. 27-30 - Dragana Martinovic, Victor Ralevich, Joshua McDougall, Michael Perklin:

"You are what you play": Breaching privacy and identifying users in online gaming. 31-39 - Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:

Inferring social relationships from technology-level device connections. 40-47 - Yuuki Takano, Satoshi Ohta, Takeshi Takahashi

, Ruo Ando, Tomoya Inoue:
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. 48-56 - Fabian Förg, Daniel A. Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer:

A secure two-party bartering protocol using privacy-preserving interval operations. 57-66 - Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang:

Direct Anonymous Attestation in practice: Implementation and efficient revocation. 67-74 - David Bissessar, Carlisle Adams, Dong Liu:

Using biometric key commitments to prevent unauthorized lending of cryptographic credentials. 75-83 - Nisha Aggarwal, Swati Agarwal, Ashish Sureka:

Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos. 84-93 - Jeremiah Bohr, Masooda N. Bashir

:
Who Uses Bitcoin? An exploration of the Bitcoin community. 94-101 - Anthony Morton, Martina Angela Sasse:

Desperately seeking assurances: Segmenting users by their information-seeking preferences. 102-111 - Roberto Guanciale

, Dilian Gurov
, Peeter Laud
:
Private intersection of regular languages. 112-120 - Oshani Seneviratne

, Lalana Kagal:
Enabling privacy through transparency. 121-128 - Ali Dehghantanha, Katrin Franke:

Privacy-respecting digital investigation. 129-138
Security
- Claudio Criscione, Fabio Bosatelli, Stefano Zanero

, Federico Maggi
:
ZARATHUSTRA: Extracting Webinject signatures from banking trojans. 139-148 - Clemens Martin, Amina Kadry, Ghada Abu-Shady:

Quantifying the financial impact of it security breaches on business processes. 149-155 - Florian Skopik

, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg
:
Semi-synthetic data set generation for security software evaluation. 156-163 - Azzam Mourad

, Hussein Jebbaoui:
Towards efficient evaluation of XACML policies. 164-171 - Halima Al Shehhi, Dua'a Abu Hamdi, IzzEddin Asad, Farkhund Iqbal

:
A forensic analysis framework for recovering encryption keys and BB10 backup decryption. 172-178 - Marcelo Luiz Brocardo, Issa Traoré:

Continuous authentication using micro-messages. 179-188 - Glen Nielsen, Michael Vedel, Christian Damsgaard Jensen:

Improving usability of passphrase authentication. 189-198 - Mohammad Saiful Islam Mamun, Atsuko Miyaji

:
Secure VANET applications with a refined group signature. 199-206 - Soumyadeb Chowdhury

, Ron Poet, Lewis Mackenzie:
A study of mnemonic image passwords. 207-214 - Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser:

Data-centric phishing detection based on transparent virtualization technologies. 215-223 - Yusuke Takamatsu, Kenji Kono:

Clickjuggler: Checking for incomplete defenses against clickjacking. 224-231 - Ala'a El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang:

Identifying users with application-specific command streams. 232-238 - Omar Abahmane, Luigi Logrippo:

Granularity based flow control. 239-248 - Apostolis Zarras

, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz
:
Automated generation of models for fast and precise detection of HTTP-based malware. 249-256 - Neha Gupta, Smita Naval

, Vijay Laxmi
, Manoj Singh Gaur, Muttukrishnan Rajarajan:
P-SPADE: GPU accelerated malware packer detection. 257-263 - Bassam Sayed, Issa Traoré, Amany Abdelhalim:

Detection and mitigation of malicious JavaScript using information flow control. 264-273 - Giampaolo Bella

, Rosario Giustolisi
, Gabriele Lenzini:
Secure exams despite malicious management. 274-281 - Mohamed Fazeen, Ram Dantu:

Another free app: Does it have the right intentions? 282-289 - Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam

:
Specifying and enforcing constraints in dynamic access control policies. 290-297 - Anca D. Jurcut

, Tom Coffey, Reiner Dojen:
Design requirements to counter parallel session attacks in security protocols. 298-305 - Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi:

Automata-based approach to design and analyze security policies. 306-313 - Keji Hu, Wensheng Zhang:

Efficient verification of data encryption on cloud servers. 314-321 - Dan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:

Assessing cryptographic signature schemes from a legal perspective. 322-329 - Christoph Bösch

, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang
, Huaxiong Wang, Pieter H. Hartel
, Willem Jonker:
Distributed Searchable Symmetric Encryption. 330-337 - Mehrdad Nojoumian:

Generalization of socio-rational secret sharing with a new utility function. 338-341 - Ricardo Rodriguez Garcia, Julie Thorpe

, Miguel Vargas Martin:
Crypto-assistant: Towards facilitating developer's encryption of sensitive data. 342-346
Trust
- Khalid Zaman Bijon, Md Munirul Haque, Ragib Hasan

:
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. 347-354 - Noel Sardana, Robin Cohen:

Validating trust models against realworld data sets. 355-362 - Noel Sardana, Robin Cohen:

Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation. 363-370 - Chris Burnett, Liang Chen, Peter Edwards

, Timothy J. Norman
:
TRAAC: Trust and risk aware access control. 371-378 - Giuseppe Primiero

, Franco Raimondi
:
A typed natural deduction calculus to reason about secure trust. 379-382 - Stefano Bistarelli

, Francesco Santini
:
Two trust networks in one: Using bipolar structures to fuse trust and distrust. 383-390 - Florian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser

:
Communicating and visualising multicriterial trustworthiness under uncertainty. 391-397 - Natasha Dwyer

, Stephen Marsh:
What can the hashtag #trust tell us about how users conceptualise trust? 398-402 - Dipen Contractor

, Dhiren R. Patel:
Analyzing trustworthiness of virtual machines in data-intensive cloud computing. 403-406 - Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki

, Akira Shiba:
i/k-Contact: A context-aware user authentication using physical social trust. 407-413 - Arnaldo Spalvieri

, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi
:
Weighting peer reviewers. 414-419 - Donovan Isherwood, Marijke Coetzee

:
TrustCV: Reputation-based trust for collectivist digital business ecosystems. 420-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














