default search action
16th PST 2018: Belfast, Northern Ireland, UK
- Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 - Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot:
A Twofold Group Key Agreement Protocol for NoC based MPSoCs. 1-2 - Michihiro Yamada, Riko Shigeno, Hiroaki Kikuchi, Maki Sakamoto:
Evaluation and Development of Onomatopoeia CAPTCHAs. 1-2 - Soheil Varastehpour, Hamid R. Sharifzadeh, Iman Ardekani, Abdolhossein Sarrafzadeh:
Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition. 1-2 - Eunbi Seo, Hyun Min Song, Huy Kang Kim:
GIDS: GAN based Intrusion Detection System for In-Vehicle Network. 1-6 - Toufique Morshed, Dima Alhadidi, Noman Mohammed:
Parallel Linear Regression on Encrypted Data. 1-5 - Gongxian Zeng, Meiqi He, Linru Zhang, Jun Zhang, Yuechen Chen, Siu-Ming Yiu:
Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform. 1-10 - Kai Bavendiek, Robin Adams, Sibylle Schupp:
Privacy-Preserving Architectures with Probabilistic Guaranties. 1-10 - Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
On Sybil Classification in Online Social Networks Using Only Structural Features. 1-10 - Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
Crossing Cross-Domain Paths in the Current Web. 1-5 - Lanlan Pan, Xin Zhang, Anlei Hu, Xuebiao Yuchi, Jian Wang:
Mitigating Client Subnet Leakage in DNS Queries. 1-2 - Matthew Hagan, BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. 1-5 - Milica Stojmenovic, Robert Biddle:
Hide-and-Seek with Website Identity Information. 1-6 - Domhnall Carlin, Philip O'Kane, Sakir Sezer, Jonah Burgess:
Detecting Cryptomining Using Dynamic Analysis. 1-6 - Andrew Sutton, Reza Samavi, Thomas E. Doyle, David Koff:
Digitized Trust in Human-in-the-Loop Health Research. 1-10 - Shin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban:
Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis. 1-2 - Iman Sharafaldin, Ali A. Ghorbani:
EagleEye: A Novel Visual Anomaly Detection Method. 1-6 - Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
Mitigating CSRF attacks on OAuth 2.0 Systems. 1-5 - Kasper Bonne Rasmussen, Paolo Gasti:
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications. 1-10 - Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Subgraph Checking. 1-6 - Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel:
Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns. 1-10 - Yiming Zhang, Baljeet Malhotra, Cheng Chen:
Industry-Wide Analysis of Open Source Security. 1-10 - Nicolás E. Díaz Ferreyra, Rene Meis, Maritta Heisel:
At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure. 1-10 - Hesham Mahrous, Baljeet Malhotra:
Managing Publicly Known Security Vulnerabilities in Software Systems. 1-10 - Brittany Davis, Christopher Whitfield, Mohd Anwar:
Extended Abstract: Ethical and Privacy Considerations in Cybersecurity. 1-2 - Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji:
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data. 1-7 - Ghada El Haddad, Amin Shahab, Esma Aïmeur:
Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online Shopping. 1-10 - Lucky Onwuzurike, Mário Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro:
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis. 1-10 - Ibrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya:
Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party. 1-10 - Zohaib Riaz, Frank Dürr, Kurt Rothermel:
Location Privacy and Utility in Geo-social Networks: Survey and Research Challenges. 1-10 - Hazel Murray, David Malone:
Exploring the Impact of Password Dataset Distribution on Guessing. 1-8 - João S. Resende, Rolando Martins, Luis Antunes:
Enforcing Privacy and Security in Public Cloud Storage. 1-5 - Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici:
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs. 1-12 - Rafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer:
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. 1-10 - Mahsa Keshavarz, Mohd Anwar:
Towards Improving Privacy Control for Smart Homes: A Privacy Decision Framework. 1-3 - James Clay, Alexander Hargrave, Ramalingam Sridhar:
A Power Analysis of Cryptocurrency Mining: A Mobile Device Perspective. 1-5 - Guruprasad Eswaraiah, Roopa Vishwanathan, Douglas Nedza:
Automated Proofs of Signatures using Bilinear Pairings. 1-10 - Sourya Joyee De, Abdessamad Imine:
Enabling Users to Balance Social Benefit and Privacy in Online Social Networks. 1-10 - Kai Mindermann, Stefan Wagner:
Usability and Security Effects of Code Examples on Crypto APIs. 1-2 - Ana C. Carvalho, Rolando Martins, Luis Antunes:
How-to Express Explicit and Auditable Consent. 1-5 - Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk:
Mining Sequential Patterns from Outsourced Data via Encryption Switching. 1-10 - Ratinder Kaur, Ye Ning, Hugo Gonzalez, Natalia Stakhanova:
Unmasking Android Obfuscation Tools Using Spatial Analysis. 1-10 - Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto:
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. 1-11 - Lukasz Opiola, Lukasz Dutka, Renata G. Slota, Jacek Kitowski:
Trust-driven, Decentralized Data Access Control for Open Network of Autonomous Data Providers. 1-10 - Jeman Park, DaeHun Nyang, Aziz Mohaisen:
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks. 1-10 - Ge Chu, Alexei Lisitsa:
Poster: Agent-based (BDI) modeling for automation of penetration testing. 1-2 - Voke Augoye, Allan Tomlinson:
Mutual Authentication in Electronic Voting Schemes. 1-2 - Sophie Le Page, Gregor von Bochmann, Qian Cui, Jason Flood, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Using AP-TED to Detect Phishing Attack Variations. 1-6 - Robin Ankele, Andrew Simpson:
Analysis and Evaluation of Syntactic Privacy Notions and Games. 1-2 - William Aiken, Hyoungshick Kim, Jungwoo Ryoo, Mary Beth Rosson:
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks. 1-6 - Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim:
Andro-Simnet: Android Malware Family Classification using Social Network Analysis. 1-8 - Clémentine Gritti, Melek Önen, Refik Molva:
CHARIOT: Cloud-Assisted Access Control for the Internet of Things. 1-6 - Giulia Traverso, Denis Butin, Johannes Buchmann, Alex Palesandro:
Coalition-Resistant Peer Rating for Long-Term Confidentiality. 1-10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.