Search dblp for Publications

export results for "toc:db/conf/pst/pst2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/pst/0002ZGWTW17,
  author       = {Yuan Liu and
                  Zheng Zhao and
                  Guibing Guo and
                  Xingwei Wang and
                  Zhenhua Tan and
                  Shuang Wang},
  title        = {An Identity Management System Based on Blockchain},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {44--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00016},
  doi          = {10.1109/PST.2017.00016},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/0002ZGWTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AlOmariMMBLM17,
  author       = {Ruba AlOmari and
                  Miguel Vargas Martin and
                  Shane MacDonald and
                  Christopher Bellman and
                  Ramiro Liscano and
                  Amit Maraj},
  title        = {What Your Brain Says About Your Password: Using Brain-Computer Interfaces
                  to Predict Password Memorability},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {127--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00024},
  doi          = {10.1109/PST.2017.00024},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AlOmariMMBLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AlTawyEYG17,
  author       = {Riham AlTawy and
                  Muhammad ElSheikh and
                  Amr M. Youssef and
                  Guang Gong},
  title        = {Lelantos: {A} Blockchain-Based Anonymous Physical Delivery System},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {15--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00013},
  doi          = {10.1109/PST.2017.00013},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AlTawyEYG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AttrapadungHKMS17,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Shinsaku Kiyomoto and
                  Tomoaki Mimoto and
                  Jacob C. N. Schuldt},
  title        = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient
                  Constructions},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00033},
  doi          = {10.1109/PST.2017.00033},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AttrapadungHKMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AugotCCG17,
  author       = {Daniel Augot and
                  Herv{\'{e}} Chabanne and
                  Olivier Cl{\'{e}}mot and
                  William George},
  title        = {Transforming Face-to-Face Identity Proofing into Anonymous Digital
                  Identity Using the Bitcoin Blockchain},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {25--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00014},
  doi          = {10.1109/PST.2017.00014},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AugotCCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/Bedford17,
  author       = {Andrew Bedford},
  title        = {Information-Flow Control with Fading Labels},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {388--390},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00053},
  doi          = {10.1109/PST.2017.00053},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/Bedford17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BkakriaGCCL17,
  author       = {Anis Bkakria and
                  Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet},
  title        = {Real-Time Detection and Reaction to Activity Hijacking Attacks in
                  Android Smartphones (Short Paper)},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {253--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00037},
  doi          = {10.1109/PST.2017.00037},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/BkakriaGCCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/CanardCKS17,
  author       = {S{\'{e}}bastien Canard and
                  Sergiu Carpov and
                  Donald Nokam Kuate and
                  Renaud Sirdey},
  title        = {Running Compression Algorithms in the Encrypted Domain: {A} Case-Study
                  on the Homomorphic Execution of {RLE}},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {283--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00041},
  doi          = {10.1109/PST.2017.00041},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/CanardCKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/CanardOQ17,
  author       = {S{\'{e}}bastien Canard and
                  Baptiste Olivier and
                  Tony Quertier},
  title        = {Differentially Private Instance-Based Noise Mechanisms in Practice},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {105--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00022},
  doi          = {10.1109/PST.2017.00022},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/CanardOQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/CentenoMC17,
  author       = {Mario Parre{\~{n}}o Centeno and
                  Aad van Moorsel and
                  Stefano Castruccio},
  title        = {Smartphone Continuous Authentication Using Deep Learning Autoencoders},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {147--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00026},
  doi          = {10.1109/PST.2017.00026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/CentenoMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/CooperAC17,
  author       = {Rebecca Cooper and
                  Hala Assal and
                  Sonia Chiasson},
  title        = {Cross-National Privacy Concerns on Data Collection by Government Agencies
                  (Short Paper)},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {191--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00030},
  doi          = {10.1109/PST.2017.00030},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/CooperAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/CorteseM17,
  author       = {Andrew Cortese and
                  Amirreza Masoumzadeh},
  title        = {Modeling Exposure in Online Social Networks},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {327--336},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00046},
  doi          = {10.1109/PST.2017.00046},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/CorteseM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/DzurendaRHM17,
  author       = {Petr Dzurenda and
                  Sara Ricci and
                  Jan Hajny and
                  Lukas Malina},
  title        = {Performance Analysis and Comparison of Different Elliptic Curves on
                  Smart Cards},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {365--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00050},
  doi          = {10.1109/PST.2017.00050},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/DzurendaRHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ElShakankiryD17,
  author       = {Ali ElShakankiry and
                  Thomas R. Dean},
  title        = {Context Sensitive and Secure Parser Generation for Deep Packet Inspection
                  of Binary Protocols},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {77--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00019},
  doi          = {10.1109/PST.2017.00019},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ElShakankiryD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/Es-SalhiEC17,
  author       = {Khaoula Es{-}Salhi and
                  David Espes and
                  Nora Cuppens},
  title        = {A New Segmentation Method for Integrated {ICS} (Short Paper)},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {87--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00020},
  doi          = {10.1109/PST.2017.00020},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/Es-SalhiEC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/GarmsMN17,
  author       = {Lydia Garms and
                  Keith M. Martin and
                  Siaw{-}Lynn Ng},
  title        = {Reputation Schemes for Pervasive Social Networks with Anonymity (Short
                  Paper)},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {311--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00044},
  doi          = {10.1109/PST.2017.00044},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/GarmsMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/GhaffaripourYPM17,
  author       = {Shadan Ghaffaripour and
                  Fadi Younis and
                  Hoi Ting Poon and
                  Ali Miri},
  title        = {An Analysis of the Security of Compressed Sensing Using an Artificial
                  Neural Network},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {385--387},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00052},
  doi          = {10.1109/PST.2017.00052},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/GhaffaripourYPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HeZZY17,
  author       = {Meiqi He and
                  Jun Zhang and
                  Gongxian Zeng and
                  Siu{-}Ming Yiu},
  title        = {A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings
                  in Cloud Database},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {293--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00042},
  doi          = {10.1109/PST.2017.00042},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/HeZZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HidanoMKKH17,
  author       = {Seira Hidano and
                  Takao Murakami and
                  Shuichi Katsumata and
                  Shinsaku Kiyomoto and
                  Goichiro Hanaoka},
  title        = {Model Inversion Attacks for Prediction Systems: Without Knowledge
                  of Non-Sensitive Attributes},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {115--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00023},
  doi          = {10.1109/PST.2017.00023},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/HidanoMKKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/JangdaM17,
  author       = {Abhinav Jangda and
                  Mohit Mishra},
  title        = {RandHeap: Heap Randomization for Mitigating Heap Spray Attacks in
                  Virtual Machines},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {169--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00028},
  doi          = {10.1109/PST.2017.00028},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/JangdaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/JoudakiTM17,
  author       = {Zeinab Joudaki and
                  Julie Thorpe and
                  Miguel Vargas Martin},
  title        = {System-Assigned Passwords You Can't Write Down, But Don't Need To},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {137--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00025},
  doi          = {10.1109/PST.2017.00025},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/JoudakiTM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/KamalI17,
  author       = {Ahmad Akmal Aminuddin Mohd Kamal and
                  Keiichi Iwamura},
  title        = {Conditionally Secure Multiparty Computation using Secret Sharing Scheme
                  for n {\textless} 2k-1 (Short Paper)},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {225--232},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00034},
  doi          = {10.1109/PST.2017.00034},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/KamalI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/KangPY17,
  author       = {Ju{-}Sung Kang and
                  Hojoong Park and
                  Yongjin Yeom},
  title        = {On the Additional Chi-Square Tests for the {IID} Assumption of {NIST}
                  {SP} 800-90B},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {375--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00051},
  doi          = {10.1109/PST.2017.00051},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/KangPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/Keenan17,
  author       = {Thomas P. Keenan},
  title        = {Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS
                  Blockchain Systems},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {400--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00057},
  doi          = {10.1109/PST.2017.00057},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/Keenan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/Kravitz17,
  author       = {David W. Kravitz},
  title        = {Transaction Immutability and Reputation Traceability: Blockchain as
                  a Platform for Access Controlled IoT and Human Interactivity},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {3--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00012},
  doi          = {10.1109/PST.2017.00012},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/Kravitz17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LashkariKGMG17,
  author       = {Arash Habibi Lashkari and
                  Andi Fitriah Abdul Kadir and
                  Hugo Gonzalez and
                  Kenneth Fon Mbah and
                  Ali A. Ghorbani},
  title        = {Towards a Network-Based Framework for Android Malware Detection and
                  Characterization},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {233--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00035},
  doi          = {10.1109/PST.2017.00035},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/LashkariKGMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LaverdiereM17,
  author       = {Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Ettore Merlo},
  title        = {Classification and Distribution of {RBAC} Privilege Protection Changes
                  in Wordpress Evolution (Short Paper)},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {349--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00048},
  doi          = {10.1109/PST.2017.00048},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/LaverdiereM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LeeJK17,
  author       = {Hyunsung Lee and
                  Seong Hoon Jeong and
                  Huy Kang Kim},
  title        = {{OTIDS:} {A} Novel Intrusion Detection System for In-vehicle Network
                  by Using Remote Frame},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {57--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00017},
  doi          = {10.1109/PST.2017.00017},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/LeeJK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LigierCFS17,
  author       = {Damien Ligier and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Renaud Sirdey},
  title        = {Information Leakage Analysis of Inner-Product Functional Encryption
                  Based Data Classification},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {303--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00043},
  doi          = {10.1109/PST.2017.00043},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/LigierCFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MartinBMBM17,
  author       = {Jeremy Martin and
                  Dane Brown and
                  Kris Merrion and
                  Lamont Brown and
                  Travis Mayberry},
  title        = {How Much Privacy Does {\textdollar}3, 165 Buy You?},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {197--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00031},
  doi          = {10.1109/PST.2017.00031},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MartinBMBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MomenPFL17,
  author       = {Nurul Momen and
                  Tobias Pulls and
                  Lothar Fritsch and
                  Stefan Lindskog},
  title        = {How Much Privilege Does an App Need? Investigating Resource Usage
                  of Android Apps (Short Paper)},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {268--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00039},
  doi          = {10.1109/PST.2017.00039},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/MomenPFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MukherjeeWRD17,
  author       = {Subhojeet Mukherjee and
                  Jacob Walker and
                  Indrakshi Ray and
                  Jeremy Daily},
  title        = {A Precedence Graph-Based Approach to Detect Message Injection Attacks
                  in {J1939} Based Networks},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {67--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00018},
  doi          = {10.1109/PST.2017.00018},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MukherjeeWRD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/RajaLG17,
  author       = {Akshaya Venkateswara Raja and
                  Jehyun Lee and
                  Debin Gao},
  title        = {On Return Oriented Programming Threats in Android Runtime},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {259--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00038},
  doi          = {10.1109/PST.2017.00038},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/RajaLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ShafieinejadS17,
  author       = {Masoumeh Shafieinejad and
                  Reihaneh Safavi{-}Naini},
  title        = {A Post-Quantum One Time Signature Using Bloom Filter},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {397--399},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00056},
  doi          = {10.1109/PST.2017.00056},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ShafieinejadS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SheshadriAS17,
  author       = {Karthik Sheshadri and
                  Nirav Ajmeri and
                  Jessica Staddon},
  title        = {No (Privacy) News is Good News: An Analysis of New York Times and
                  Guardian Privacy News from 2010-2016},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {159--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00027},
  doi          = {10.1109/PST.2017.00027},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/SheshadriAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ShinjoNKS17,
  author       = {Yasushi Shinjo and
                  Sota Naito and
                  Xiao Kunyao and
                  Akira Sato},
  title        = {ABnews: {A} Fast Private Social Messaging System Using Untrusted Storage
                  and Attribute-Based Encryption},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {317--326},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00045},
  doi          = {10.1109/PST.2017.00045},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ShinjoNKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SistanyF17,
  author       = {Bahman Sistany and
                  Amy P. Felty},
  title        = {A Certified Core Policy Language},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {391--393},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00054},
  doi          = {10.1109/PST.2017.00054},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/SistanyF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SkovorodaG17,
  author       = {Anastasia Skovoroda and
                  Dennis Gamayunov},
  title        = {Automated Static Analysis and Classification of Android Malware using
                  Permission and {API} Calls Models},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {243--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00036},
  doi          = {10.1109/PST.2017.00036},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/SkovorodaG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SquicciariniN0C17,
  author       = {Anna Cinzia Squicciarini and
                  Andrea Novelli and
                  Dan Lin and
                  Cornelia Caragea and
                  Haoti Zhong},
  title        = {From Tag to Protect: {A} Tag-Driven Policy Recommender System for
                  Image Sharing},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {337--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00047},
  doi          = {10.1109/PST.2017.00047},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/SquicciariniN0C17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/StylianosM17,
  author       = {Doudalis Stylianos and
                  Sharad Mehrotra},
  title        = {SORTaki: {A} Framework to Integrate Sorting with Differential Private
                  Histogramming Algorithms},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {95--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00021},
  doi          = {10.1109/PST.2017.00021},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/StylianosM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ThompsonS17,
  author       = {Scott A. Thompson and
                  Bharath K. Samanthula},
  title        = {Optimized Secure Data Aggregation in Wireless Sensor Networks},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {394--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00055},
  doi          = {10.1109/PST.2017.00055},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ThompsonS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/TraversoCNADH017,
  author       = {Giulia Traverso and
                  Carlos Garcia Cordero and
                  Mehrdad Nojoumian and
                  Reza Azarderakhsh and
                  Denise Demirel and
                  Sheikh Mahbub Habib and
                  Johannes Buchmann},
  title        = {Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed
                  Storage Systems (Short Paper)},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {277--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00040},
  doi          = {10.1109/PST.2017.00040},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/TraversoCNADH017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/WilliamsNC17,
  author       = {Meredydd Williams and
                  Jason R. C. Nurse and
                  Sadie Creese},
  title        = {Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {181--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00029},
  doi          = {10.1109/PST.2017.00029},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/WilliamsNC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/WullerMW17,
  author       = {Stefan W{\"{u}}ller and
                  Ulrike Meyer and
                  Susanne Wetzel},
  title        = {Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {205--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00032},
  doi          = {10.1109/PST.2017.00032},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/WullerMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ZarrasM17,
  author       = {Apostolis Zarras and
                  Federico Maggi},
  title        = {Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect
                  Web Attacks},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {355--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00049},
  doi          = {10.1109/PST.2017.00049},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ZarrasM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ZengYZKA17,
  author       = {Gongxian Zeng and
                  Siu{-}Ming Yiu and
                  Jun Zhang and
                  Hiroki Kuzuno and
                  Man Ho Au},
  title        = {A Nonoutsourceable Puzzle Under {GHOST} Rule},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {35--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00015},
  doi          = {10.1109/PST.2017.00015},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ZengYZKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pst/2017,
  title        = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8476191/proceeding},
  isbn         = {978-1-5386-2487-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics