| 2016 | 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016 |
| 2016 | A brief survey of Cryptocurrency systems. Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, Richard R. Brooks |
| 2016 | A constraint-driven approach for dynamic malware detection. Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Francesco Mercaldo |
| 2016 | A continuous user authentication scheme for mobile devices. Max Smith-Creasey, Muttukrishnan Rajarajan |
| 2016 | A logical approach to promoting trust over knowledge to trust over action. Aaron Hunter |
| 2016 | A novel hash chain construction for simple and efficient authentication. Yuta Kurihara, Masakazu Soshi |
| 2016 | A novel trust model based on SLA and behavior evaluation for clouds. Zhenhua Tan, Yicong Niu, Yuan Liu, Guangming Yang |
| 2016 | A security analysis of police computer systems. Benjamin VanderSloot, Stuart Wheaton, J. Alex Halderman |
| 2016 | A security analysis of techniques for long-term integrity protection. Matthias Geihs, Denise Demirel, Johannes Buchmann |
| 2016 | A survey on internet usage and cybersecurity awareness in students. Sreenivas Sremath Tirumala, Abdolhossein Sarrafzadeh, Paul Pang |
| 2016 | A text independent handwriting forgery detection system based on branchlet features and Gaussian mixture models. Chin-Shyurng Fahn, Chu-Ping Lee, Heng-I Chen |
| 2016 | A vessel segmentation method for low contrast CT angiography image. Rong Zhu, Yun Mao, Ying Guo |
| 2016 | AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control. Mahendra Pratap Singh |
| 2016 | AS Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann |
| 2016 | An Internet-wide view of ICS devices. Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey |
| 2016 | An IoT trust and reputation model based on recommender systems. Sarah Asiri, Ali Miri |
| 2016 | An optical covert-channel to leak data through an air-gap. Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici |
| 2016 | Analysing vulnerability reproducibility for Firefox browser. Maryam Davari, Mohammad Zulkernine |
| 2016 | Analysis and forensics for Behavior Characteristics of Malware in Internet. Ping Ren, Wu Liu, Donghong Sun, Jian-Ping Wu, Ke Liu |
| 2016 | Analysis of NTP DRDoS attacks' performance effects and mitigation techniques. Bahman A. Sassani, Charly Abarro, Ivan Pitton, Craig Young, Farhad Mehdipour |
| 2016 | Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks. Carlos Garcia Cordero, Sascha Hauke, Max Mühlhäuser, Mathias Fischer |
| 2016 | Attacking Android smartphone systems without permissions. Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace |
| 2016 | Automated intelligent multinomial classification of malware species using dynamic behavioural analysis. Andrii Shalaginov, Katrin Franke |
| 2016 | Automating Information Security assessments using intelligent software agents. Clemens Martin, Rania Nasr, Mark Hoersken, Tobias Fuechtler |
| 2016 | Behavior-based tracking of Internet users with semi-supervised learning. Dominik Herrmann, Matthias Kirchler, Jens Lindemann, Marius Kloft |
| 2016 | Building robust temporal user profiles for anomaly detection in file system accesses. Shagufta Mehnaz, Elisa Bertino |
| 2016 | Challenge response interaction for biometric liveness establishment and template protection. Munalih Ahmad Syarif, Latifah Mat Nen, Alwyn Goh, Kay Win Lee, Kang Siong Ng, Leslie Ching Ow Tiong |
| 2016 | CloudEFS: Efficient and secure file system for cloud storage. Clemens Zeidler, Muhammad Rizwan Asghar |
| 2016 | Comparative performance analysis of classification algorithms for intrusion detection system. Mohammed Anbar, Rosni Abdullah, Iznan Husainy Hasbullah, Yung-Wey Chong, Omar E. Elejla |
| 2016 | Continuous authentication using EEG and face images for trusted autonomous systems. Min Wang, Hussein A. Abbass, Jiankun Hu |
| 2016 | Controlling risks and fraud in affiliate marketing: A simulation and testing environment. Bede Ravindra Amarasekara, Anuradha Mathrani |
| 2016 | Correlating cyber incident information to establish situational awareness in Critical Infrastructures. Giuseppe Settanni, Yegor Shovgenya, Florian Skopik, Roman Graf, Markus Wurzenberger, Roman Fiedler |
| 2016 | Cryptanalysis of Lee and Lin's innovative electronic group-buying system. Chin-Ling Chen, Yong-Yuan Deng, Yun-Ciao Wang |
| 2016 | Data leakage detection in Tizen Web applications. Thiago S. Rocha, Eduardo Souto, Brandell Cassio, Diego Azulay, Alex Monteiro, Felipe Boeira, Pedro Minatel, Breno Silva |
| 2016 | Decentralized and sybil-resistant pseudonym registration using social graphs. Sebastian Friebe, Martin Florian, Ingmar Baumgart |
| 2016 | Digital signature scheme based on truncated polynomial over finite fields. Maheswara Rao Valluri |
| 2016 | Directcha: A proposal of spatiometric mental rotation CAPTCHA. Ayane Sano, Masahiro Fujita, Masakatsu Nishigaki |
| 2016 | Dr. WATTson: Lightweight current-based Intrusion Detection (CBID). Robert Koch, Teo Kuhn, Marcel Odenwald, Gabi Dreo Rodosek |
| 2016 | Dynamic Weight on Static Trust for trustworthy social media networks. Mohammad Khaliqur Rahman, Muhammad Abdullah Adnan |
| 2016 | Dynamic graph-based malware classifier. Hossein Hadian Jazi, Ali A. Ghorbani |
| 2016 | Edge-calibrated noise for differentially private mechanisms on graphs. Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier |
| 2016 | Effective frameworks for delivering compliance with personal data privacy regulatory requirements. Ilya Kabanov |
| 2016 | Efficient proactive secret sharing. Jacqueline Brendel, Denise Demirel |
| 2016 | Examining the impact of privacy, Security, and trust on the TAM and TTF models for e-commerce consumers: A pilot study. Sujit Kumar Basak, Desmond Wesley Govender, Irene Govender |
| 2016 | Exploiting known vulnerabilities of a smart thermostat. Mike Moody, Aaron Hunter |
| 2016 | Follow the traffic: Stopping click fraud by disrupting the value chain. Matthieu Faou, Antoine Lemay, David Décary-Hétu, Joan Calvet, Francois Labreche, Militza Jean, Benoit Dupont, José M. Fernandez |
| 2016 | Formalising Identity Management protocols. Md Sadek Ferdous, Ron Poet |
| 2016 | Generating behavior-based malware detection models with genetic programming. Tobias Wüchner, Martín Ochoa, Enrico Lovat, Alexander Pretschner |
| 2016 | Generating software identifier dictionaries from Vulnerability Database. Takeshi Takahashi, Daisuke Inoue |
| 2016 | Generation of one-time keys for single line authentication. Sazzad Hossain, Alwyn Goh, Hoon Sin Cheong, Kay Win Lee |
| 2016 | How students regard trust in an elearning context. Natasha Dwyer, Stephen Marsh |
| 2016 | I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware. Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Corrado Aaron Visaggio |
| 2016 | I've been - Web analytics from a user's point of view. Michael T. Krieger, Josef Küng |
| 2016 | Implementing Attestable kiosks. Matthew Bernhard, Gabe Stocco, J. Alex Halderman |
| 2016 | Improvement of information rates for specified participants in general secret sharing schemes. Kouya Tochikubo |
| 2016 | Intention-based Trust Re-evaluation. Abdulaziz Almehmadi, Khalil El-Khatib |
| 2016 | Intrusion detection in a private network by satisfying constraints. Md Siam Hasan, Ali ElShakankiry, Thomas R. Dean, Mohammad Zulkernine |
| 2016 | KidsTube: Detection, characterization and analysis of child unsafe content & promoters on YouTube. Rishabh Kaushal, Srishty Saha, Payal Bajaj, Ponnurangam Kumaraguru |
| 2016 | Know your master: Driver profiling-based anti-theft method. Byung Il Kwak, Jiyoung Woo, Huy Kang Kim |
| 2016 | LoTrust: A social Trust Level model based on time-aware social interactions and interests similarity. Ahlem Kalaï, Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous |
| 2016 | Magic mantle using social VPNs against centralized social networking services. Yasushi Shinjo, Naoki Kainuma, Daiyuu Nobori, Akira Sato |
| 2016 | Masquerade of mobile applications: Introducing unlinkability in a practical way. Huan Feng, Kang G. Shin |
| 2016 | Measuring code reuse in Android apps. Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani |
| 2016 | Mobile forensics for cloud data: Practical and legal considerations. John Bjornson, Aaron Hunter |
| 2016 | Multidimensional range query on outsourced database with strong privacy guarantee. Hoang Giang Do, Wee Keong Ng |
| 2016 | Non-invertible fingerprint template protection with polar transformations. Limei Guo, Yun Mao, Ying Guo |
| 2016 | On the security advantages of block-based multiserver searchable symmetric encryption. Moesfa Soeheila Mohamad, Ji-Jian Chin, Geong Sen Poh |
| 2016 | OverTorrent: Anticensorship without centralized servers. Yu-Ju Lee, Eric Wustrow |
| 2016 | PISCES: A framework for privacy by design in IoT. Noria Foukia, David Billard, Eduardo Solana |
| 2016 | Peeking behind the great firewall: Privacy on Chinese file sharing networks. Matthew Comb, Paul A. Watters |
| 2016 | PlayGround 2.0: Simulating behavior decisions with trust and control computations. Etienne Cartolano, Antonio Mauro Saraiva, Robert D. Stevenson |
| 2016 | Prevention of information mis-translation by a malicious gateway in connected vehicles. Kyusuk Han, Kang G. Shin |
| 2016 | Privacy patterns. Clark D. Thomborson |
| 2016 | Privacy-preservation in the integration and querying of multidimensional data models. Michael Mireku Kwakye, Ken Barker |
| 2016 | Privacy-preserving two-party bartering secure against active adversaries. Stefan Wüller, Wadim Pessin, Ulrike Meyer, Susanne Wetzel |
| 2016 | Proposition of a method to aid Security Classification in Cybersecurity context. Guillaume Collard, Eric Disson, Guilaine Talens, Stephane Ducroquet |
| 2016 | Provenance threat modeling. Oluwakemi Hambolu, Lu Yu, Jon Oakley, Richard R. Brooks, Ujan Mukhopadhyay, Anthony Skjellum |
| 2016 | Remote website authentication using dynamic multi-scale code visualization. Alwyn Goh, Hoon Sin Cheong, Geong Sen Poh, Seyedvahid Dianat |
| 2016 | SCARAB: A continuous authentication scheme for biomedical application. Anindya Shankar Bhandari, Dipanwita Roy Chowdhury |
| 2016 | Sampling and partitioning for differential privacy. Hamid Ebadi, Thibaud Antignac, David Sands |
| 2016 | Scalability and performance of the Privacy-Aware Classification method GenPAC. Nico Schlitter, Markus Ullrich, Jörg Lässig |
| 2016 | Secure image data deduplication through compressive sensing. Fatema Rashid, Ali Miri |
| 2016 | Secure intra-device communication protocol between applications on a smart device. Pei-Shan Chang, Hoon Sin Cheong, Hon Loon Wong, Seyedvahid Dianat, Cheong Seak Sea |
| 2016 | Securing cloud data using information dispersal. Kheng Kok Mar, Zhengqing Hu, Chee Yong Law, Meifen Wang |
| 2016 | Securing promiscuous use of untrusted USB thumb drives in Industrial Control Systems. Federico Griscioli, Maurizio Pizzonia |
| 2016 | Study on privacy setting acceptance of drivers for data utilization on connected cars. Toshiki Endo, Kazunari Nawa, Naonori Kato, Yosuke Murakami |
| 2016 | Study on privacy setting acceptance of the drivers for the data utilization on the car. Naonori Kato, Yosuke Murakami, Toshiki Endo, Kazunari Nawa |
| 2016 | Study on relationship between user awareness and QoE in communication delay on smartphones. Takeharu Shirai, Masahiro Fujita, Daisuke Arai, Tomohiko Ogishi, Masakatsu Nishigaki |
| 2016 | Survey of secure anonymous peer to peer Instant Messaging protocols. Rakan Alkhulaiwi, Abdulhakim Sabur, Khalid Aldughayem, Osama Almanna |
| 2016 | Taxonomy of malware detection techniques: A systematic literature review. Hanif-Mohaddes Deylami, Ravie Chandren Muniyandi, Iman Tabatabaei Ardekani, Abdolhossein Sarrafzadeh |
| 2016 | Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol. Iznan Husainy Hasbullah, Mohammad M. Kadhum, Yung-Wey Chong, Kamal Alieyan, Azlan Osman, Supriyanto |
| 2016 | Toward an off-line analysis of obligation with deadline policies. Nada Essaouini, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2016 | Towards a new generation of industrial firewalls: Operational-process aware filtering. Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia |
| 2016 | Towards automatic repair of access control policies. Dianxiang Xu, Shuai Peng |
| 2016 | Towards privacy-preserving classification in neural networks. Mehmood Baryalai, Julian Jang-Jaccard, Dongxi Liu |
| 2016 | USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction. Federico Griscioli, Maurizio Pizzonia, Marco Sacchetti |
| 2016 | USBee: Air-gap covert-channel via electromagnetic emission from USB. Mordechai Guri, Matan Monitz, Yuval Elovici |
| 2016 | Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques. Mehrdad Nojoumian |
| 2016 | Understanding victim-enabled identity theft. David Lacey, Jim Zaiss, K. Suzanne Barber |
| 2016 | User behaviour and interactions for multimodal authentication. Galoh Rashidah Haron, Dharmadharshni Maniam, Latifah Mat Nen, Nor Izyani Daud |
| 2016 | User-in-a-context: A blueprint for context-aware identification. Anirban Basu, Rui Xu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto |
| 2016 | Users' perspective on designing inclusive privacy-enhancing indicators. Hsiao-Ying Huang, Masooda N. Bashir |
| 2016 | Using machine learning to secure IoT systems. Janice Canedo, Anthony Skjellum |
| 2016 | Vulnerability analysis of iPhone 6. Wencheng Yang, Jiankun Hu, Clinton Fernandes, Vijay Sivaraman, Qianhong Wu |
| 2016 | iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs. Fatih Turkmen, Muhammad Rizwan Asghar, Yuri Demchenko |
| 2016 | libmask: Protecting browser JIT engines from the devil in the constants. Abhinav, Mohit Mishra, Benoit Baudry |