| 2015 | 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015 Ali A. Ghorbani, Vicenç Torra, Hüseyin Hisil, Ali Miri, Ahmet Koltuksuz, Jie Zhang, Murat Sensoy, Joaquín García-Alfaro, Ibrahim Zincir |
| 2015 | A framework for a privacy-aware feature selection evaluation measure. Yasser Jafer, Stan Matwin, Marina Sokolova |
| 2015 | A model for calculating user-identity trustworthiness in online transactions. Brian A. Soeder, K. Suzanne Barber |
| 2015 | A secure revocable personal health record system with policy-based fine-grained access control. Mitu Kumar Debnath, Saeed Samet, Krishnamurthy Vidyasankar |
| 2015 | An access control model for protecting provenance graphs. Liang Chen, Peter Edwards, John D. Nelson, Timothy J. Norman |
| 2015 | An adaptive algorithm for multivariate data-oriented microaggregation. Balkis Abidi, Sadok Ben Yahia |
| 2015 | An efficient ID-based message recoverable privacy-preserving auditing scheme. Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol |
| 2015 | Devil in a box: Installing backdoors in electronic door locks. Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi, Hyoungshick Kim |
| 2015 | Disclosure risk assessment via record linkage by a maximum-knowledge attacker. Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas |
| 2015 | ECA rules for controlling authorisation plan to satisfy dynamic constraints. Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
| 2015 | Embedded systems security: Threats, vulnerabilities, and attack taxonomy. Dorottya Papp, Zhendong Ma, Levente Buttyán |
| 2015 | InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol. Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld |
| 2015 | Is privacy a human right? An empirical examination in a global context. Hsiao-Ying Huang, Masooda N. Bashir |
| 2015 | Keyboard or keylogger?: A security analysis of third-party keyboards on Android. Junsung Cho, Geumhwan Cho, Hyoungshick Kim |
| 2015 | Laplace noise generation for two-party computational differential privacy. Balamurugan Anandan, Chris Clifton |
| 2015 | Minimizing transitive trust threats in software management systems. Jaap Boender, Giuseppe Primiero, Franco Raimondi |
| 2015 | Network security supported by arguments. Fabio Martinelli, Francesco Santini, Artsiom Yautsiukhin |
| 2015 | Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices. Tiago V. de Arruda, Yeda Regina Venturini, Tiemi C. Sakata |
| 2015 | Physical trust-based persistent authentication. Masahiro Fujita, Christian Damsgaard Jensen, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki |
| 2015 | Privacy preserving business process matching. Dilian Gurov, Peeter Laud, Roberto Guanciale |
| 2015 | Privacy-preserving conditional random selection. Stefan Wüller, Ulrike Meyer, Fabian Förg, Susanne Wetzel |
| 2015 | Real-time signature-based detection approach for SMS botnet. Abdullah J. Alzahrani, Ali A. Ghorbani |
| 2015 | Recommendation of categories in an agents world: The role of (not) local communicative environments. Rino Falcone, Alessandro Sapienza, Cristiano Castelfranchi |
| 2015 | Revealing the relationship network behind link spam. Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz |
| 2015 | Towards automatic real time identification of malicious posts on Facebook. Prateek Dewan, Ponnurangam Kumaraguru |
| 2015 | What they do in shadows: Twitter underground follower market. Anupama Aggarwal, Ponnurangam Kumaraguru |
| 2015 | Who manages the manager? Identity management and user ownership in the age of data. Jonas Breuer, Heritiana Ranaivoson, Uschi Buchinger, Pieter Ballon |
| 2015 | Zipf distribution model for quantifying risk of re-identification from trajectory data. Hiroaki Kikuchi, Katsumi Takahashi |