Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/pst/pst2017.bht:"
@inproceedings{DBLP:conf/pst/0002ZGWTW17, author = {Yuan Liu and Zheng Zhao and Guibing Guo and Xingwei Wang and Zhenhua Tan and Shuang Wang}, title = {An Identity Management System Based on Blockchain}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {44--56}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00016}, doi = {10.1109/PST.2017.00016}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/0002ZGWTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AlOmariMMBLM17, author = {Ruba AlOmari and Miguel Vargas Martin and Shane MacDonald and Christopher Bellman and Ramiro Liscano and Amit Maraj}, title = {What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {127--136}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00024}, doi = {10.1109/PST.2017.00024}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AlOmariMMBLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AlTawyEYG17, author = {Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong}, title = {Lelantos: {A} Blockchain-Based Anonymous Physical Delivery System}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {15--24}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00013}, doi = {10.1109/PST.2017.00013}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AlTawyEYG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AttrapadungHKMS17, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Shinsaku Kiyomoto and Tomoaki Mimoto and Jacob C. N. Schuldt}, title = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00033}, doi = {10.1109/PST.2017.00033}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AttrapadungHKMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AugotCCG17, author = {Daniel Augot and Herv{\'{e}} Chabanne and Olivier Cl{\'{e}}mot and William George}, title = {Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {25--34}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00014}, doi = {10.1109/PST.2017.00014}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AugotCCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Bedford17, author = {Andrew Bedford}, title = {Information-Flow Control with Fading Labels}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {388--390}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00053}, doi = {10.1109/PST.2017.00053}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/Bedford17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BkakriaGCCL17, author = {Anis Bkakria and Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, title = {Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {253--258}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00037}, doi = {10.1109/PST.2017.00037}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/BkakriaGCCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/CanardCKS17, author = {S{\'{e}}bastien Canard and Sergiu Carpov and Donald Nokam Kuate and Renaud Sirdey}, title = {Running Compression Algorithms in the Encrypted Domain: {A} Case-Study on the Homomorphic Execution of {RLE}}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {283--292}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00041}, doi = {10.1109/PST.2017.00041}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/CanardCKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/CanardOQ17, author = {S{\'{e}}bastien Canard and Baptiste Olivier and Tony Quertier}, title = {Differentially Private Instance-Based Noise Mechanisms in Practice}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {105--114}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00022}, doi = {10.1109/PST.2017.00022}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/CanardOQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/CentenoMC17, author = {Mario Parre{\~{n}}o Centeno and Aad van Moorsel and Stefano Castruccio}, title = {Smartphone Continuous Authentication Using Deep Learning Autoencoders}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {147--158}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00026}, doi = {10.1109/PST.2017.00026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/CentenoMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/CooperAC17, author = {Rebecca Cooper and Hala Assal and Sonia Chiasson}, title = {Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {191--196}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00030}, doi = {10.1109/PST.2017.00030}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/CooperAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/CorteseM17, author = {Andrew Cortese and Amirreza Masoumzadeh}, title = {Modeling Exposure in Online Social Networks}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {327--336}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00046}, doi = {10.1109/PST.2017.00046}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/CorteseM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/DzurendaRHM17, author = {Petr Dzurenda and Sara Ricci and Jan Hajny and Lukas Malina}, title = {Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {365--374}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00050}, doi = {10.1109/PST.2017.00050}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/DzurendaRHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ElShakankiryD17, author = {Ali ElShakankiry and Thomas R. Dean}, title = {Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {77--86}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00019}, doi = {10.1109/PST.2017.00019}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ElShakankiryD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Es-SalhiEC17, author = {Khaoula Es{-}Salhi and David Espes and Nora Cuppens}, title = {A New Segmentation Method for Integrated {ICS} (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {87--94}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00020}, doi = {10.1109/PST.2017.00020}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/Es-SalhiEC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/GarmsMN17, author = {Lydia Garms and Keith M. Martin and Siaw{-}Lynn Ng}, title = {Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {311--316}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00044}, doi = {10.1109/PST.2017.00044}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/GarmsMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/GhaffaripourYPM17, author = {Shadan Ghaffaripour and Fadi Younis and Hoi Ting Poon and Ali Miri}, title = {An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {385--387}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00052}, doi = {10.1109/PST.2017.00052}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/GhaffaripourYPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HeZZY17, author = {Meiqi He and Jun Zhang and Gongxian Zeng and Siu{-}Ming Yiu}, title = {A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {293--302}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00042}, doi = {10.1109/PST.2017.00042}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/HeZZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HidanoMKKH17, author = {Seira Hidano and Takao Murakami and Shuichi Katsumata and Shinsaku Kiyomoto and Goichiro Hanaoka}, title = {Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {115--126}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00023}, doi = {10.1109/PST.2017.00023}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/HidanoMKKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/JangdaM17, author = {Abhinav Jangda and Mohit Mishra}, title = {RandHeap: Heap Randomization for Mitigating Heap Spray Attacks in Virtual Machines}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {169--180}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00028}, doi = {10.1109/PST.2017.00028}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/JangdaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/JoudakiTM17, author = {Zeinab Joudaki and Julie Thorpe and Miguel Vargas Martin}, title = {System-Assigned Passwords You Can't Write Down, But Don't Need To}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {137--146}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00025}, doi = {10.1109/PST.2017.00025}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/JoudakiTM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/KamalI17, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, title = {Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n {\textless} 2k-1 (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {225--232}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00034}, doi = {10.1109/PST.2017.00034}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/KamalI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/KangPY17, author = {Ju{-}Sung Kang and Hojoong Park and Yongjin Yeom}, title = {On the Additional Chi-Square Tests for the {IID} Assumption of {NIST} {SP} 800-90B}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {375--384}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00051}, doi = {10.1109/PST.2017.00051}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/KangPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Keenan17, author = {Thomas P. Keenan}, title = {Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {400--402}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00057}, doi = {10.1109/PST.2017.00057}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/Keenan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Kravitz17, author = {David W. Kravitz}, title = {Transaction Immutability and Reputation Traceability: Blockchain as a Platform for Access Controlled IoT and Human Interactivity}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {3--14}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00012}, doi = {10.1109/PST.2017.00012}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/Kravitz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LashkariKGMG17, author = {Arash Habibi Lashkari and Andi Fitriah Abdul Kadir and Hugo Gonzalez and Kenneth Fon Mbah and Ali A. Ghorbani}, title = {Towards a Network-Based Framework for Android Malware Detection and Characterization}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {233--234}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00035}, doi = {10.1109/PST.2017.00035}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/LashkariKGMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LaverdiereM17, author = {Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Ettore Merlo}, title = {Classification and Distribution of {RBAC} Privilege Protection Changes in Wordpress Evolution (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {349--354}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00048}, doi = {10.1109/PST.2017.00048}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/LaverdiereM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LeeJK17, author = {Hyunsung Lee and Seong Hoon Jeong and Huy Kang Kim}, title = {{OTIDS:} {A} Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {57--66}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00017}, doi = {10.1109/PST.2017.00017}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/LeeJK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LigierCFS17, author = {Damien Ligier and Sergiu Carpov and Caroline Fontaine and Renaud Sirdey}, title = {Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {303--310}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00043}, doi = {10.1109/PST.2017.00043}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/LigierCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MartinBMBM17, author = {Jeremy Martin and Dane Brown and Kris Merrion and Lamont Brown and Travis Mayberry}, title = {How Much Privacy Does {\textdollar}3, 165 Buy You?}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {197--204}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00031}, doi = {10.1109/PST.2017.00031}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MartinBMBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MomenPFL17, author = {Nurul Momen and Tobias Pulls and Lothar Fritsch and Stefan Lindskog}, title = {How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {268--276}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00039}, doi = {10.1109/PST.2017.00039}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/MomenPFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MukherjeeWRD17, author = {Subhojeet Mukherjee and Jacob Walker and Indrakshi Ray and Jeremy Daily}, title = {A Precedence Graph-Based Approach to Detect Message Injection Attacks in {J1939} Based Networks}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {67--76}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00018}, doi = {10.1109/PST.2017.00018}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MukherjeeWRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/RajaLG17, author = {Akshaya Venkateswara Raja and Jehyun Lee and Debin Gao}, title = {On Return Oriented Programming Threats in Android Runtime}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {259--267}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00038}, doi = {10.1109/PST.2017.00038}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/RajaLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ShafieinejadS17, author = {Masoumeh Shafieinejad and Reihaneh Safavi{-}Naini}, title = {A Post-Quantum One Time Signature Using Bloom Filter}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {397--399}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00056}, doi = {10.1109/PST.2017.00056}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ShafieinejadS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SheshadriAS17, author = {Karthik Sheshadri and Nirav Ajmeri and Jessica Staddon}, title = {No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {159--168}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00027}, doi = {10.1109/PST.2017.00027}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/SheshadriAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ShinjoNKS17, author = {Yasushi Shinjo and Sota Naito and Xiao Kunyao and Akira Sato}, title = {ABnews: {A} Fast Private Social Messaging System Using Untrusted Storage and Attribute-Based Encryption}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {317--326}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00045}, doi = {10.1109/PST.2017.00045}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ShinjoNKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SistanyF17, author = {Bahman Sistany and Amy P. Felty}, title = {A Certified Core Policy Language}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {391--393}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00054}, doi = {10.1109/PST.2017.00054}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/SistanyF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SkovorodaG17, author = {Anastasia Skovoroda and Dennis Gamayunov}, title = {Automated Static Analysis and Classification of Android Malware using Permission and {API} Calls Models}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {243--252}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00036}, doi = {10.1109/PST.2017.00036}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/SkovorodaG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SquicciariniN0C17, author = {Anna Cinzia Squicciarini and Andrea Novelli and Dan Lin and Cornelia Caragea and Haoti Zhong}, title = {From Tag to Protect: {A} Tag-Driven Policy Recommender System for Image Sharing}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {337--348}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00047}, doi = {10.1109/PST.2017.00047}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/SquicciariniN0C17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/StylianosM17, author = {Doudalis Stylianos and Sharad Mehrotra}, title = {SORTaki: {A} Framework to Integrate Sorting with Differential Private Histogramming Algorithms}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {95--104}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00021}, doi = {10.1109/PST.2017.00021}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/StylianosM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ThompsonS17, author = {Scott A. Thompson and Bharath K. Samanthula}, title = {Optimized Secure Data Aggregation in Wireless Sensor Networks}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {394--396}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00055}, doi = {10.1109/PST.2017.00055}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ThompsonS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/TraversoCNADH017, author = {Giulia Traverso and Carlos Garcia Cordero and Mehrdad Nojoumian and Reza Azarderakhsh and Denise Demirel and Sheikh Mahbub Habib and Johannes Buchmann}, title = {Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {277--282}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00040}, doi = {10.1109/PST.2017.00040}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/TraversoCNADH017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/WilliamsNC17, author = {Meredydd Williams and Jason R. C. Nurse and Sadie Creese}, title = {Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {181--190}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00029}, doi = {10.1109/PST.2017.00029}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/WilliamsNC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/WullerMW17, author = {Stefan W{\"{u}}ller and Ulrike Meyer and Susanne Wetzel}, title = {Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {205--214}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00032}, doi = {10.1109/PST.2017.00032}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/WullerMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ZarrasM17, author = {Apostolis Zarras and Federico Maggi}, title = {Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {355--364}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00049}, doi = {10.1109/PST.2017.00049}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ZarrasM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ZengYZKA17, author = {Gongxian Zeng and Siu{-}Ming Yiu and Jun Zhang and Hiroki Kuzuno and Man Ho Au}, title = {A Nonoutsourceable Puzzle Under {GHOST} Rule}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {35--43}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00015}, doi = {10.1109/PST.2017.00015}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ZengYZKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pst/2017, title = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8476191/proceeding}, isbn = {978-1-5386-2487-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.