PST C

56 papers

YearTitle / Authors
2014"You are what you play": Breaching privacy and identifying users in online gaming.
Dragana Martinovic, Victor Ralevich, Joshua McDougall, Michael Perklin
20142014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014
Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro
2014A forensic analysis framework for recovering encryption keys and BB10 backup decryption.
Halima Al Shehhi, Dua'a Abu Hamdi, IzzEddin Asad, Farkhund Iqbal
2014A secure two-party bartering protocol using privacy-preserving interval operations.
Fabian Förg, Daniel A. Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer
2014A study of mnemonic image passwords.
Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
2014A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty.
Khalid Zaman Bijon, Md Munirul Haque, Ragib Hasan
2014A typed natural deduction calculus to reason about secure trust.
Giuseppe Primiero, Franco Raimondi
2014Analyzing trustworthiness of virtual machines in data-intensive cloud computing.
Dipen Contractor, Dhiren R. Patel
2014Another free app: Does it have the right intentions?
Mohamed Fazeen, Ram Dantu
2014Assessing cryptographic signature schemes from a legal perspective.
Dan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu
2014Automata-based approach to design and analyze security policies.
Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi
2014Automated generation of models for fast and precise detection of HTTP-based malware.
Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz
2014Building privacy-preserving location-based apps.
Brian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentland
2014Can apps play by the COPPA Rules?
Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay
2014Clickjuggler: Checking for incomplete defenses against clickjacking.
Yusuke Takamatsu, Kenji Kono
2014Communicating and visualising multicriterial trustworthiness under uncertainty.
Florian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser
2014Continuous authentication using micro-messages.
Marcelo Luiz Brocardo, Issa Traoré
2014Crypto-assistant: Towards facilitating developer's encryption of sensitive data.
Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin
2014Data-centric phishing detection based on transparent virtualization technologies.
Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser
2014Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation.
Noel Sardana, Robin Cohen
2014Design requirements to counter parallel session attacks in security protocols.
Anca D. Jurcut, Tom Coffey, Reiner Dojen
2014Desperately seeking assurances: Segmenting users by their information-seeking preferences.
Anthony Morton, Martina Angela Sasse
2014Detection and mitigation of malicious JavaScript using information flow control.
Bassam Sayed, Issa Traoré, Amany Abdelhalim
2014Direct Anonymous Attestation in practice: Implementation and efficient revocation.
Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang
2014Distributed Searchable Symmetric Encryption.
Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, Willem Jonker
2014Efficient verification of data encryption on cloud servers.
Keji Hu, Wensheng Zhang
2014Enabling privacy through transparency.
Oshani Seneviratne, Lalana Kagal
2014Generalization of socio-rational secret sharing with a new utility function.
Mehrdad Nojoumian
2014Granularity based flow control.
Omar Abahmane, Luigi Logrippo
2014Identifying users with application-specific command streams.
Ala'a El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang
2014Improving usability of passphrase authentication.
Glen Nielsen, Michael Vedel, Christian Damsgaard Jensen
2014Inferring social relationships from technology-level device connections.
Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese
2014MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking.
Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue
2014Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos.
Nisha Aggarwal, Swati Agarwal, Ashish Sureka
2014P-SPADE: GPU accelerated malware packer detection.
Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Muttukrishnan Rajarajan
2014Privacy-preserving mobility-casting in opportunistic networks.
Gianpiero Costantino, Fabio Martinelli, Paolo Santi
2014Privacy-respecting digital investigation.
Ali Dehghantanha, Katrin Franke
2014Private intersection of regular languages.
Roberto Guanciale, Dilian Gurov, Peeter Laud
2014Quantifying the financial impact of it security breaches on business processes.
Clemens Martin, Amina Kadry, Ghada Abu-Shady
2014Secure VANET applications with a refined group signature.
Mohammad Saiful Islam Mamun, Atsuko Miyaji
2014Secure exams despite malicious management.
Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini
2014Semi-synthetic data set generation for security software evaluation.
Florian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg
2014Specifying and enforcing constraints in dynamic access control policies.
Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam
2014TRAAC: Trust and risk aware access control.
Chris Burnett, Liang Chen, Peter Edwards, Timothy J. Norman
2014Towards efficient evaluation of XACML policies.
Azzam Mourad, Hussein Jebbaoui
2014TrustCV: Reputation-based trust for collectivist digital business ecosystems.
Donovan Isherwood, Marijke Coetzee
2014Two trust networks in one: Using bipolar structures to fuse trust and distrust.
Stefano Bistarelli, Francesco Santini
2014Undetectable communication: The Online Social Networks case.
Filipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen
2014Using biometric key commitments to prevent unauthorized lending of cryptographic credentials.
David Bissessar, Carlisle Adams, Dong Liu
2014Validating trust models against realworld data sets.
Noel Sardana, Robin Cohen
2014Weighting peer reviewers.
Arnaldo Spalvieri, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi
2014Welcome message from the general chair.
Ali Miri
2014What can the hashtag #trust tell us about how users conceptualise trust?
Natasha Dwyer, Stephen Marsh
2014Who Uses Bitcoin? An exploration of the Bitcoin community.
Jeremiah Bohr, Masooda N. Bashir
2014ZARATHUSTRA: Extracting Webinject signatures from banking trojans.
Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi
2014i/k-Contact: A context-aware user authentication using physical social trust.
Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba