| 2014 | "You are what you play": Breaching privacy and identifying users in online gaming. Dragana Martinovic, Victor Ralevich, Joshua McDougall, Michael Perklin |
| 2014 | 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014 Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro |
| 2014 | A forensic analysis framework for recovering encryption keys and BB10 backup decryption. Halima Al Shehhi, Dua'a Abu Hamdi, IzzEddin Asad, Farkhund Iqbal |
| 2014 | A secure two-party bartering protocol using privacy-preserving interval operations. Fabian Förg, Daniel A. Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer |
| 2014 | A study of mnemonic image passwords. Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie |
| 2014 | A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. Khalid Zaman Bijon, Md Munirul Haque, Ragib Hasan |
| 2014 | A typed natural deduction calculus to reason about secure trust. Giuseppe Primiero, Franco Raimondi |
| 2014 | Analyzing trustworthiness of virtual machines in data-intensive cloud computing. Dipen Contractor, Dhiren R. Patel |
| 2014 | Another free app: Does it have the right intentions? Mohamed Fazeen, Ram Dantu |
| 2014 | Assessing cryptographic signature schemes from a legal perspective. Dan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu |
| 2014 | Automata-based approach to design and analyze security policies. Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi |
| 2014 | Automated generation of models for fast and precise detection of HTTP-based malware. Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz |
| 2014 | Building privacy-preserving location-based apps. Brian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentland |
| 2014 | Can apps play by the COPPA Rules? Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay |
| 2014 | Clickjuggler: Checking for incomplete defenses against clickjacking. Yusuke Takamatsu, Kenji Kono |
| 2014 | Communicating and visualising multicriterial trustworthiness under uncertainty. Florian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser |
| 2014 | Continuous authentication using micro-messages. Marcelo Luiz Brocardo, Issa Traoré |
| 2014 | Crypto-assistant: Towards facilitating developer's encryption of sensitive data. Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin |
| 2014 | Data-centric phishing detection based on transparent virtualization technologies. Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser |
| 2014 | Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation. Noel Sardana, Robin Cohen |
| 2014 | Design requirements to counter parallel session attacks in security protocols. Anca D. Jurcut, Tom Coffey, Reiner Dojen |
| 2014 | Desperately seeking assurances: Segmenting users by their information-seeking preferences. Anthony Morton, Martina Angela Sasse |
| 2014 | Detection and mitigation of malicious JavaScript using information flow control. Bassam Sayed, Issa Traoré, Amany Abdelhalim |
| 2014 | Direct Anonymous Attestation in practice: Implementation and efficient revocation. Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang |
| 2014 | Distributed Searchable Symmetric Encryption. Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, Willem Jonker |
| 2014 | Efficient verification of data encryption on cloud servers. Keji Hu, Wensheng Zhang |
| 2014 | Enabling privacy through transparency. Oshani Seneviratne, Lalana Kagal |
| 2014 | Generalization of socio-rational secret sharing with a new utility function. Mehrdad Nojoumian |
| 2014 | Granularity based flow control. Omar Abahmane, Luigi Logrippo |
| 2014 | Identifying users with application-specific command streams. Ala'a El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang |
| 2014 | Improving usability of passphrase authentication. Glen Nielsen, Michael Vedel, Christian Damsgaard Jensen |
| 2014 | Inferring social relationships from technology-level device connections. Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese |
| 2014 | MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue |
| 2014 | Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos. Nisha Aggarwal, Swati Agarwal, Ashish Sureka |
| 2014 | P-SPADE: GPU accelerated malware packer detection. Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Muttukrishnan Rajarajan |
| 2014 | Privacy-preserving mobility-casting in opportunistic networks. Gianpiero Costantino, Fabio Martinelli, Paolo Santi |
| 2014 | Privacy-respecting digital investigation. Ali Dehghantanha, Katrin Franke |
| 2014 | Private intersection of regular languages. Roberto Guanciale, Dilian Gurov, Peeter Laud |
| 2014 | Quantifying the financial impact of it security breaches on business processes. Clemens Martin, Amina Kadry, Ghada Abu-Shady |
| 2014 | Secure VANET applications with a refined group signature. Mohammad Saiful Islam Mamun, Atsuko Miyaji |
| 2014 | Secure exams despite malicious management. Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini |
| 2014 | Semi-synthetic data set generation for security software evaluation. Florian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg |
| 2014 | Specifying and enforcing constraints in dynamic access control policies. Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam |
| 2014 | TRAAC: Trust and risk aware access control. Chris Burnett, Liang Chen, Peter Edwards, Timothy J. Norman |
| 2014 | Towards efficient evaluation of XACML policies. Azzam Mourad, Hussein Jebbaoui |
| 2014 | TrustCV: Reputation-based trust for collectivist digital business ecosystems. Donovan Isherwood, Marijke Coetzee |
| 2014 | Two trust networks in one: Using bipolar structures to fuse trust and distrust. Stefano Bistarelli, Francesco Santini |
| 2014 | Undetectable communication: The Online Social Networks case. Filipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen |
| 2014 | Using biometric key commitments to prevent unauthorized lending of cryptographic credentials. David Bissessar, Carlisle Adams, Dong Liu |
| 2014 | Validating trust models against realworld data sets. Noel Sardana, Robin Cohen |
| 2014 | Weighting peer reviewers. Arnaldo Spalvieri, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi |
| 2014 | Welcome message from the general chair. Ali Miri |
| 2014 | What can the hashtag #trust tell us about how users conceptualise trust? Natasha Dwyer, Stephen Marsh |
| 2014 | Who Uses Bitcoin? An exploration of the Bitcoin community. Jeremiah Bohr, Masooda N. Bashir |
| 2014 | ZARATHUSTRA: Extracting Webinject signatures from banking trojans. Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi |
| 2014 | i/k-Contact: A context-aware user authentication using physical social trust. Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba |