PST C

39 papers

YearTitle / Authors
2011A Diffie-Hellman based privacy protocol for Car-to-X communication.
Hagen Stübing, Murat Ceven, Sorin A. Huss
2011A hamming distance-like filtering in keystroke dynamics.
Yoshihiro Kaneko, Yuji Kinpara, Yuta Shiomi
2011A probabilistic-based approach towards trust evaluation using Poisson Hidden Markov Models and Bonus Malus Systems.
Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis
2011A trust-based approach against IP-spoofing attacks.
Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi
2011Advantages of a non-technical XACML notation in role-based models.
Bernard Stepien, Stan Matwin, Amy P. Felty
2011An implementation of a verification condition generator for foundational proof-carrying code.
Jiangong Weng, Amy P. Felty
2011Beyond privacy policies - assessing inherent privacy risks of consumer health services.
Jens H. Weber-Jahnke, James B. Williams
2011Cryptographic security models for eHealth P2P database management systems network.
Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto
2011Data preprocessing for distance-based unsupervised Intrusion Detection.
Dina Said, Lisa Stirling, Peter Federolf, Ken Barker
2011Delegation of access rights in a privacy preserving access control model.
Md. Moniruzzaman, Ken Barker
2011Detecting P2P botnets through network behavior analysis and machine learning.
Sherif Saad, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian
2011Ensuring tight computational security against higher-order DPA attacks.
Dakshita Khurana, Aditya Gaurav
2011Extraction and comprehension of moodle's access control model: A case study.
François Gauthier, Dominic Letarte, Thierry Lavoie, Ettore Merlo
2011Forward secure identity-based key agreement for dynamic groups.
Nick Mailloux, Ali Miri, Monica Nevins
2011General Secure Function Evaluation using standard trusted computing hardware.
Steve R. Tate, Roopa Vishwanathan
2011I-RBAC: Isolation enabled role-based access control.
Nagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat
2011Improving security and usability of low cost RFID tags.
Ali Nur Mohammad Noman, Sk. Md. Mizanur Rahman, Carlisle Adams
2011Improving the use of advisor networks for multi-agent trust modelling.
Joshua Gorner, Jie Zhang, Robin Cohen
2011Model-based systems security quantification.
Samir Ouchani, Yosr Jarraya, Otmane Aït Mohamed
2011Modelling of security properties in Alloy.
Lilia Georgieva
2011Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada
2011On Re-use of randomness in broadcast encryption.
Paolo Gasti, Alessio Merlo
2011On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY.
Serguei A. Mokhov, Joey Paquet, Mourad Debbabi
2011Online information privacy: Agent-mediated payoff.
Abdulsalam Yassine, Ali A. Nazari Shirehjini, Shervin Shirmohammadi, Thomas T. Tran
2011Performance analysis of QKD based key distribution for IEEE 802.11 networks.
Shirantha Wijesekera, Xu Huang, Dharmendra Sharma
2011Privacy Data Envelope: Concept and implementation.
Mahmoud Ghorbel, Armen Aghasaryan, Stéphane Betgé-Brezetz, Marie-Pascale Dupont, Guy-Bertrand Kamga, Sophie Piekarec
2011Privacy challenges of open APIs: Case location based services.
Alberto Vila Tena, Yrjö Raivio
2011Privacy-preserving matchmaking For mobile social networking secure against malicious users.
Qi Xie, Urs Hengartner
2011Pseudonymised communication in delay tolerant networks.
Naveed Ahmad, Haitham S. Cruickshank, Zhili Sun, Muhammad Asif
2011RC4 state and its applications.
Qian Yu, Chang N. Zhang
2011Risk-based decision method for access control systems.
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski
2011Safe realization of the Generalization privacy mechanism.
Tristan Allard, Benjamin Nguyen, Philippe Pucheral
2011Secure communication with secret sharing in static computer networks with partition in mistrust parties.
Johannes Viehmann
2011The ultimate invasion of privacy: Identity theft.
Esma Aïmeur, David Schönfeld
2011Towards machine-assisted formal procedures for the collection of digital evidence.
Martín Barrère, Gustavo Betarte, Marcelo Rodríguez
2011Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition.
Abbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Shervin Shirmohammadi, Carlisle M. Adams, Abdulmotaleb El Saddik
2011Trust bootstrapping services and service providers.
Zainab M. Aljazzaf, Miriam A. M. Capretz, Mark Perry
2011UPBA: User-Authenticated Property-Based Attestation.
Mark Manulis, Marion Steiner
2011Validation of security for participant control exchanges in multicast content distribution.
Mohammad Parham, John William Atwood