PST C

26 papers

YearTitle / Authors
2008A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems.
Jie Zhang, Murat Sensoy, Robin Cohen
2008A Multiple-Control Fuzzy Vault.
Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles
2008A Protocol for Building Secure and Reliable Covert Channel.
Baishakhi Ray, Shivakant Mishra
2008An Access Control Scheme for Protecting Personal Data.
Wilfred Villegas, Bader Ali, Muthucumaru Maheswaran
2008An Effective Defense against Intrusive Web Advertising.
Viktor Krammer
2008An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes.
Nathan Lewis, Noria Foukia
2008AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System.
Apurva Mohan, Douglas M. Blough
2008CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment.
Sheikh Iqbal Ahamed, Mehrab Monjur, Mohammad Saiful Islam
2008Confidence-Compensating Privacy Protection.
Piotr Cofta
2008Cross-Language Weaving Approach Targeting Software Security Hardening.
Azzam Mourad, Dima Alhadidi, Mourad Debbabi
2008Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks.
S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan
2008Encoding the Program Correctness Proofs as Programs in PCC Technology.
Heidar Pirzadeh, Danny Dubé
2008IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter?
Princely Ifinedo
2008Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks.
Ed Brown, Tracy Ann Kosa
2008Investigating Two Different Approaches for Encrypted Traffic Classification.
Riyad Alshammari, Nur Zincir-Heywood
2008LogView: Visualizing Event Log Clusters.
Adetokunbo Makanju, Stephen Brooks, Nur Zincir-Heywood, Evangelos E. Milios
2008Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Hilmi Günes Kayacik, Nur Zincir-Heywood
2008Model-Checking for Software Vulnerabilities Detection with Multi-Language Support.
Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi
2008OpenHouse: A Secure Platform for Distributed Home Services.
Jani Suomalainen, Seamus Moloney, Juha Koivisto, Kari Keinänen
2008Private and Cheating-Free Outsourcing of Algebraic Computations.
David Benjamin, Mikhail J. Atallah
2008Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada
Larry Korba, Stephen Marsh, Reihaneh Safavi-Naini
2008The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems.
Farag Azzedin, Ahmad Ridha
2008The Uncertainty of the Truth.
Michel Deriaz
2008Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy.
Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie
2008Unlinkable Communication.
Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel
2008Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data.
Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao