PST C

106 papers

YearTitle / Authors
201614th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016
2016A brief survey of Cryptocurrency systems.
Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, Richard R. Brooks
2016A constraint-driven approach for dynamic malware detection.
Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Francesco Mercaldo
2016A continuous user authentication scheme for mobile devices.
Max Smith-Creasey, Muttukrishnan Rajarajan
2016A logical approach to promoting trust over knowledge to trust over action.
Aaron Hunter
2016A novel hash chain construction for simple and efficient authentication.
Yuta Kurihara, Masakazu Soshi
2016A novel trust model based on SLA and behavior evaluation for clouds.
Zhenhua Tan, Yicong Niu, Yuan Liu, Guangming Yang
2016A security analysis of police computer systems.
Benjamin VanderSloot, Stuart Wheaton, J. Alex Halderman
2016A security analysis of techniques for long-term integrity protection.
Matthias Geihs, Denise Demirel, Johannes Buchmann
2016A survey on internet usage and cybersecurity awareness in students.
Sreenivas Sremath Tirumala, Abdolhossein Sarrafzadeh, Paul Pang
2016A text independent handwriting forgery detection system based on branchlet features and Gaussian mixture models.
Chin-Shyurng Fahn, Chu-Ping Lee, Heng-I Chen
2016A vessel segmentation method for low contrast CT angiography image.
Rong Zhu, Yun Mao, Ying Guo
2016AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control.
Mahendra Pratap Singh
2016AS
Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2016An Internet-wide view of ICS devices.
Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey
2016An IoT trust and reputation model based on recommender systems.
Sarah Asiri, Ali Miri
2016An optical covert-channel to leak data through an air-gap.
Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici
2016Analysing vulnerability reproducibility for Firefox browser.
Maryam Davari, Mohammad Zulkernine
2016Analysis and forensics for Behavior Characteristics of Malware in Internet.
Ping Ren, Wu Liu, Donghong Sun, Jian-Ping Wu, Ke Liu
2016Analysis of NTP DRDoS attacks' performance effects and mitigation techniques.
Bahman A. Sassani, Charly Abarro, Ivan Pitton, Craig Young, Farhad Mehdipour
2016Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks.
Carlos Garcia Cordero, Sascha Hauke, Max Mühlhäuser, Mathias Fischer
2016Attacking Android smartphone systems without permissions.
Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace
2016Automated intelligent multinomial classification of malware species using dynamic behavioural analysis.
Andrii Shalaginov, Katrin Franke
2016Automating Information Security assessments using intelligent software agents.
Clemens Martin, Rania Nasr, Mark Hoersken, Tobias Fuechtler
2016Behavior-based tracking of Internet users with semi-supervised learning.
Dominik Herrmann, Matthias Kirchler, Jens Lindemann, Marius Kloft
2016Building robust temporal user profiles for anomaly detection in file system accesses.
Shagufta Mehnaz, Elisa Bertino
2016Challenge response interaction for biometric liveness establishment and template protection.
Munalih Ahmad Syarif, Latifah Mat Nen, Alwyn Goh, Kay Win Lee, Kang Siong Ng, Leslie Ching Ow Tiong
2016CloudEFS: Efficient and secure file system for cloud storage.
Clemens Zeidler, Muhammad Rizwan Asghar
2016Comparative performance analysis of classification algorithms for intrusion detection system.
Mohammed Anbar, Rosni Abdullah, Iznan Husainy Hasbullah, Yung-Wey Chong, Omar E. Elejla
2016Continuous authentication using EEG and face images for trusted autonomous systems.
Min Wang, Hussein A. Abbass, Jiankun Hu
2016Controlling risks and fraud in affiliate marketing: A simulation and testing environment.
Bede Ravindra Amarasekara, Anuradha Mathrani
2016Correlating cyber incident information to establish situational awareness in Critical Infrastructures.
Giuseppe Settanni, Yegor Shovgenya, Florian Skopik, Roman Graf, Markus Wurzenberger, Roman Fiedler
2016Cryptanalysis of Lee and Lin's innovative electronic group-buying system.
Chin-Ling Chen, Yong-Yuan Deng, Yun-Ciao Wang
2016Data leakage detection in Tizen Web applications.
Thiago S. Rocha, Eduardo Souto, Brandell Cassio, Diego Azulay, Alex Monteiro, Felipe Boeira, Pedro Minatel, Breno Silva
2016Decentralized and sybil-resistant pseudonym registration using social graphs.
Sebastian Friebe, Martin Florian, Ingmar Baumgart
2016Digital signature scheme based on truncated polynomial over finite fields.
Maheswara Rao Valluri
2016Directcha: A proposal of spatiometric mental rotation CAPTCHA.
Ayane Sano, Masahiro Fujita, Masakatsu Nishigaki
2016Dr. WATTson: Lightweight current-based Intrusion Detection (CBID).
Robert Koch, Teo Kuhn, Marcel Odenwald, Gabi Dreo Rodosek
2016Dynamic Weight on Static Trust for trustworthy social media networks.
Mohammad Khaliqur Rahman, Muhammad Abdullah Adnan
2016Dynamic graph-based malware classifier.
Hossein Hadian Jazi, Ali A. Ghorbani
2016Edge-calibrated noise for differentially private mechanisms on graphs.
Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier
2016Effective frameworks for delivering compliance with personal data privacy regulatory requirements.
Ilya Kabanov
2016Efficient proactive secret sharing.
Jacqueline Brendel, Denise Demirel
2016Examining the impact of privacy, Security, and trust on the TAM and TTF models for e-commerce consumers: A pilot study.
Sujit Kumar Basak, Desmond Wesley Govender, Irene Govender
2016Exploiting known vulnerabilities of a smart thermostat.
Mike Moody, Aaron Hunter
2016Follow the traffic: Stopping click fraud by disrupting the value chain.
Matthieu Faou, Antoine Lemay, David Décary-Hétu, Joan Calvet, Francois Labreche, Militza Jean, Benoit Dupont, José M. Fernandez
2016Formalising Identity Management protocols.
Md Sadek Ferdous, Ron Poet
2016Generating behavior-based malware detection models with genetic programming.
Tobias Wüchner, Martín Ochoa, Enrico Lovat, Alexander Pretschner
2016Generating software identifier dictionaries from Vulnerability Database.
Takeshi Takahashi, Daisuke Inoue
2016Generation of one-time keys for single line authentication.
Sazzad Hossain, Alwyn Goh, Hoon Sin Cheong, Kay Win Lee
2016How students regard trust in an elearning context.
Natasha Dwyer, Stephen Marsh
2016I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Corrado Aaron Visaggio
2016I've been - Web analytics from a user's point of view.
Michael T. Krieger, Josef Küng
2016Implementing Attestable kiosks.
Matthew Bernhard, Gabe Stocco, J. Alex Halderman
2016Improvement of information rates for specified participants in general secret sharing schemes.
Kouya Tochikubo
2016Intention-based Trust Re-evaluation.
Abdulaziz Almehmadi, Khalil El-Khatib
2016Intrusion detection in a private network by satisfying constraints.
Md Siam Hasan, Ali ElShakankiry, Thomas R. Dean, Mohammad Zulkernine
2016KidsTube: Detection, characterization and analysis of child unsafe content & promoters on YouTube.
Rishabh Kaushal, Srishty Saha, Payal Bajaj, Ponnurangam Kumaraguru
2016Know your master: Driver profiling-based anti-theft method.
Byung Il Kwak, Jiyoung Woo, Huy Kang Kim
2016LoTrust: A social Trust Level model based on time-aware social interactions and interests similarity.
Ahlem Kalaï, Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous
2016Magic mantle using social VPNs against centralized social networking services.
Yasushi Shinjo, Naoki Kainuma, Daiyuu Nobori, Akira Sato
2016Masquerade of mobile applications: Introducing unlinkability in a practical way.
Huan Feng, Kang G. Shin
2016Measuring code reuse in Android apps.
Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani
2016Mobile forensics for cloud data: Practical and legal considerations.
John Bjornson, Aaron Hunter
2016Multidimensional range query on outsourced database with strong privacy guarantee.
Hoang Giang Do, Wee Keong Ng
2016Non-invertible fingerprint template protection with polar transformations.
Limei Guo, Yun Mao, Ying Guo
2016On the security advantages of block-based multiserver searchable symmetric encryption.
Moesfa Soeheila Mohamad, Ji-Jian Chin, Geong Sen Poh
2016OverTorrent: Anticensorship without centralized servers.
Yu-Ju Lee, Eric Wustrow
2016PISCES: A framework for privacy by design in IoT.
Noria Foukia, David Billard, Eduardo Solana
2016Peeking behind the great firewall: Privacy on Chinese file sharing networks.
Matthew Comb, Paul A. Watters
2016PlayGround 2.0: Simulating behavior decisions with trust and control computations.
Etienne Cartolano, Antonio Mauro Saraiva, Robert D. Stevenson
2016Prevention of information mis-translation by a malicious gateway in connected vehicles.
Kyusuk Han, Kang G. Shin
2016Privacy patterns.
Clark D. Thomborson
2016Privacy-preservation in the integration and querying of multidimensional data models.
Michael Mireku Kwakye, Ken Barker
2016Privacy-preserving two-party bartering secure against active adversaries.
Stefan Wüller, Wadim Pessin, Ulrike Meyer, Susanne Wetzel
2016Proposition of a method to aid Security Classification in Cybersecurity context.
Guillaume Collard, Eric Disson, Guilaine Talens, Stephane Ducroquet
2016Provenance threat modeling.
Oluwakemi Hambolu, Lu Yu, Jon Oakley, Richard R. Brooks, Ujan Mukhopadhyay, Anthony Skjellum
2016Remote website authentication using dynamic multi-scale code visualization.
Alwyn Goh, Hoon Sin Cheong, Geong Sen Poh, Seyedvahid Dianat
2016SCARAB: A continuous authentication scheme for biomedical application.
Anindya Shankar Bhandari, Dipanwita Roy Chowdhury
2016Sampling and partitioning for differential privacy.
Hamid Ebadi, Thibaud Antignac, David Sands
2016Scalability and performance of the Privacy-Aware Classification method GenPAC.
Nico Schlitter, Markus Ullrich, Jörg Lässig
2016Secure image data deduplication through compressive sensing.
Fatema Rashid, Ali Miri
2016Secure intra-device communication protocol between applications on a smart device.
Pei-Shan Chang, Hoon Sin Cheong, Hon Loon Wong, Seyedvahid Dianat, Cheong Seak Sea
2016Securing cloud data using information dispersal.
Kheng Kok Mar, Zhengqing Hu, Chee Yong Law, Meifen Wang
2016Securing promiscuous use of untrusted USB thumb drives in Industrial Control Systems.
Federico Griscioli, Maurizio Pizzonia
2016Study on privacy setting acceptance of drivers for data utilization on connected cars.
Toshiki Endo, Kazunari Nawa, Naonori Kato, Yosuke Murakami
2016Study on privacy setting acceptance of the drivers for the data utilization on the car.
Naonori Kato, Yosuke Murakami, Toshiki Endo, Kazunari Nawa
2016Study on relationship between user awareness and QoE in communication delay on smartphones.
Takeharu Shirai, Masahiro Fujita, Daisuke Arai, Tomohiko Ogishi, Masakatsu Nishigaki
2016Survey of secure anonymous peer to peer Instant Messaging protocols.
Rakan Alkhulaiwi, Abdulhakim Sabur, Khalid Aldughayem, Osama Almanna
2016Taxonomy of malware detection techniques: A systematic literature review.
Hanif-Mohaddes Deylami, Ravie Chandren Muniyandi, Iman Tabatabaei Ardekani, Abdolhossein Sarrafzadeh
2016Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol.
Iznan Husainy Hasbullah, Mohammad M. Kadhum, Yung-Wey Chong, Kamal Alieyan, Azlan Osman, Supriyanto
2016Toward an off-line analysis of obligation with deadline policies.
Nada Essaouini, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens
2016Towards a new generation of industrial firewalls: Operational-process aware filtering.
Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia
2016Towards automatic repair of access control policies.
Dianxiang Xu, Shuai Peng
2016Towards privacy-preserving classification in neural networks.
Mehmood Baryalai, Julian Jang-Jaccard, Dongxi Liu
2016USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction.
Federico Griscioli, Maurizio Pizzonia, Marco Sacchetti
2016USBee: Air-gap covert-channel via electromagnetic emission from USB.
Mordechai Guri, Matan Monitz, Yuval Elovici
2016Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques.
Mehrdad Nojoumian
2016Understanding victim-enabled identity theft.
David Lacey, Jim Zaiss, K. Suzanne Barber
2016User behaviour and interactions for multimodal authentication.
Galoh Rashidah Haron, Dharmadharshni Maniam, Latifah Mat Nen, Nor Izyani Daud
2016User-in-a-context: A blueprint for context-aware identification.
Anirban Basu, Rui Xu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto
2016Users' perspective on designing inclusive privacy-enhancing indicators.
Hsiao-Ying Huang, Masooda N. Bashir
2016Using machine learning to secure IoT systems.
Janice Canedo, Anthony Skjellum
2016Vulnerability analysis of iPhone 6.
Wencheng Yang, Jiankun Hu, Clinton Fernandes, Vijay Sivaraman, Qianhong Wu
2016iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs.
Fatih Turkmen, Muhammad Rizwan Asghar, Yuri Demchenko
2016libmask: Protecting browser JIT engines from the devil in the constants.
Abhinav, Mohit Mishra, Benoit Baudry