default search action
13th PST 2015: Izmir, Turkey
- Ali A. Ghorbani, Vicenç Torra, Hüseyin Hisil, Ali Miri, Ahmet Koltuksuz, Jie Zhang, Murat Sensoy, Joaquín García-Alfaro, Ibrahim Zincir:
13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7828-4
Privacy
- Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld:
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol. 1-6 - Rino Falcone, Alessandro Sapienza, Cristiano Castelfranchi:
Recommendation of categories in an agents world: The role of (not) local communicative environments. 7-13 - Hiroaki Kikuchi, Katsumi Takahashi:
Zipf distribution model for quantifying risk of re-identification from trajectory data. 14-21 - Jonas Breuer, Heritiana Ranaivoson, Uschi Buchinger, Pieter Ballon:
Who manages the manager? Identity management and user ownership in the age of data. 22-27 - Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas:
Disclosure risk assessment via record linkage by a maximum-knowledge attacker. 28-35 - Dilian Gurov, Peeter Laud, Roberto Guanciale:
Privacy preserving business process matching. 36-43 - Stefan Wüller, Ulrike Meyer, Fabian Förg, Susanne Wetzel:
Privacy-preserving conditional random selection. 44-53 - Balamurugan Anandan, Chris Clifton:
Laplace noise generation for two-party computational differential privacy. 54-61 - Yasser Jafer, Stan Matwin, Marina Sokolova:
A framework for a privacy-aware feature selection evaluation measure. 62-69 - Balkis Abidi, Sadok Ben Yahia:
An adaptive algorithm for multivariate data-oriented microaggregation. 70-76 - Hsiao-Ying Huang, Masooda N. Bashir:
Is privacy a human right? An empirical examination in a global context. 77-84
Security
- Prateek Dewan, Ponnurangam Kumaraguru:
Towards automatic real time identification of malicious posts on Facebook. 85-92 - Anupama Aggarwal, Ponnurangam Kumaraguru:
What they do in shadows: Twitter underground follower market. 93-100 - Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz:
Revealing the relationship network behind link spam. 101-108 - Mitu Kumar Debnath, Saeed Samet, Krishnamurthy Vidyasankar:
A secure revocable personal health record system with policy-based fine-grained access control. 109-116 - Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol:
An efficient ID-based message recoverable privacy-preserving auditing scheme. 117-124 - Liang Chen, Peter Edwards, John D. Nelson, Timothy J. Norman:
An access control model for protecting provenance graphs. 125-132 - Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
ECA rules for controlling authorisation plan to satisfy dynamic constraints. 133-138 - Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi, Hyoungshick Kim:
Devil in a box: Installing backdoors in electronic door locks. 139-144 - Dorottya Papp, Zhendong Ma, Levente Buttyán:
Embedded systems security: Threats, vulnerabilities, and attack taxonomy. 145-152 - Tiago V. de Arruda, Yeda Regina Venturini, Tiemi C. Sakata:
Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices. 153-156 - Abdullah J. Alzahrani, Ali A. Ghorbani:
Real-time signature-based detection approach for SMS botnet. 157-164 - Fabio Martinelli, Francesco Santini, Artsiom Yautsiukhin:
Network security supported by arguments. 165-172 - Junsung Cho, Geumhwan Cho, Hyoungshick Kim:
Keyboard or keylogger?: A security analysis of third-party keyboards on Android. 173-176
Trust
- Brian A. Soeder, K. Suzanne Barber:
A model for calculating user-identity trustworthiness in online transactions. 177-185 - Masahiro Fujita, Christian Damsgaard Jensen, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki:
Physical trust-based persistent authentication. 186-190 - Jaap Boender, Giuseppe Primiero, Franco Raimondi:
Minimizing transitive trust threats in software management systems. 191-198
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.