PST C

32 papers

YearTitle / Authors
2010A model-driven penetration test framework for Web applications.
Pulei Xiong, Liam Peyton
2010A new perspective of privacy protection: Unique distinct l-SR diversity.
Yunli Wang, Yan Cui, Liqiang Geng, Hongyu Liu
2010Achieving critical infrastructure protection through the interaction of computer security and network forensics.
Ray Hunt, Jill Slay
2010Analysis of Privacy Impact Assessments within Major jurisdictions.
David Tancock, Siani Pearson, Andrew Charlesworth
2010Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks.
Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Aziz Bouras
2010Co-located Physical-Layer Network Coding to mitigate passive eavesdropping.
Michael Hay, Basil Saeed, Chung-Horng Lung, Anand Srinivasan
2010Design of distributed security architecture for multihop WiMAX networks.
Perumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan
2010Detection, correlation, and visualization of attacks against critical infrastructure systems.
Linda Briesemeister, Steven Cheung, Ulf Lindqvist, Alfonso Valdes
2010Efficient privacy preserving reputation protocols inspired by secure sum.
Omar Hasan, Elisa Bertino, Lionel Brunie
2010Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada
2010Guessing click-based graphical passwords by eye tracking.
Daniel Leblanc, Alain Forget, Robert Biddle
2010J3: High payload histogram neutral JPEG steganography.
Mahendra Kumar, Richard E. Newman
2010Keystroke dynamics: Characteristics and opportunities.
Heather Crawford
2010Lightweight protection against brute force login attacks on Web applications.
Carlisle Adams, Guy-Vincent Jourdan, Jean-Pierre Levac, François Prevost
2010Method ontology for intelligent network forensics analysis.
Sherif Saad, Issa Traoré
2010New approach for the dynamic enforcement of Web services security.
Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok
2010On achieving a digital identity management system with support for non-transferability.
Brent Carrara, Carlisle Adams
2010On the analysis of the Zeus botnet crimeware toolkit.
Hamad Binsalleeh, Thomas C. Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang
2010On the representation and verification of cryptographic protocols in a theory of action.
James P. Delgrande, Aaron Hunter, Torsten Grote
2010Ray - a secure micro kernel architecture.
Stefan Nürnberger, Thomas Feller, Sorin A. Huss
2010Risk analysis in access control systems.
Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo
2010Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications.
Bon K. Sy, Adam Ramirez, Arun Prakash Kumara Krishnan
2010Secure architecture for RFID enabled supply chain hierarchy.
Nauman Abdullah Shah, Muhammad Arif Wahla
2010Security advances and challenges in 4G wireless networks.
Nabil Seddigh, Biswajit Nandy, Rupinder Makkar, Jean-Francois Beaumont
2010Security of Error Correcting Code for biometric Encryption.
Alex Stoianov
2010Social networks for health care: Addressing regulatory gaps with privacy-by-design.
James B. Williams, Jens H. Weber-Jahnke
2010The relationship of trust, demand, and utility: Be more trustworthy, then i will buy more.
Amirali Salehi-Abari, Tony White
2010Towards a privacy preserving policy based infrastructure for social data access to enable scientific research.
Palanivel Andiappan Kodeswaran, Evelyne Viegas
2010Transaction signing in applications using identity federation.
Paul Rabinovich
2010Trust-aware monitoring scheme for WiMAX networks.
Haïdar Safa, Farah Abu Shahla
2010Vampire bats: Trust in Privacy.
Tracy Ann Kosa
2010You are the key: Generating cryptographic keys from voice biometrics.
Brent Carrara, Carlisle Adams