PST C

47 papers

YearTitle / Authors
201715th Annual Conference on Privacy, Security and Trust, PST 2017, Calgary, AB, Canada, August 28-30, 2017
2017A Certified Core Policy Language.
Bahman Sistany, Amy P. Felty
2017A New Segmentation Method for Integrated ICS (Short Paper).
Khaoula Es-Salhi, David Espes, Nora Cuppens
2017A Nonoutsourceable Puzzle Under GHOST Rule.
Gongxian Zeng, Siu-Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au
2017A Post-Quantum One Time Signature Using Bloom Filter.
Masoumeh Shafieinejad, Reihaneh Safavi-Naini
2017A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks.
Subhojeet Mukherjee, Jacob Walker, Indrakshi Ray, Jeremy Daily
2017A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database.
Meiqi He, Jun Zhang, Gongxian Zeng, Siu-Ming Yiu
2017A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions.
Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt
2017ABnews: A Fast Private Social Messaging System Using Untrusted Storage and Attribute-Based Encryption.
Yasushi Shinjo, Sota Naito, Xiao Kunyao, Akira Sato
2017Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems.
Thomas P. Keenan
2017An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network.
Shadan Ghaffaripour, Fadi Younis, Hoi Ting Poon, Ali Miri
2017An Identity Management System Based on Blockchain.
Yuan Liu, Zheng Zhao, Guibing Guo, Xingwei Wang, Zhenhua Tan, Shuang Wang
2017Automated Static Analysis and Classification of Android Malware using Permission and API Calls Models.
Anastasia Skovoroda, Dennis Gamayunov
2017Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper).
Marc-André Laverdière, Ettore Merlo
2017Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper).
Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2017Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols.
Ali ElShakankiry, Thomas R. Dean
2017Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper).
Rebecca Cooper, Hala Assal, Sonia Chiasson
2017Differentially Private Instance-Based Noise Mechanisms in Practice.
Sébastien Canard, Baptiste Olivier, Tony Quertier
2017Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper).
Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2017From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing.
Anna Cinzia Squicciarini, Andrea Novelli, Dan Lin, Cornelia Caragea, Haoti Zhong
2017Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks.
Apostolis Zarras, Federico Maggi
2017How Much Privacy Does $3, 165 Buy You?
Jeremy Martin, Dane Brown, Kris Merrion, Lamont Brown, Travis Mayberry
2017How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper).
Nurul Momen, Tobias Pulls, Lothar Fritsch, Stefan Lindskog
2017Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification.
Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey
2017Information-Flow Control with Fading Labels.
Andrew Bedford
2017Lelantos: A Blockchain-Based Anonymous Physical Delivery System.
Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong
2017Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka
2017Modeling Exposure in Online Social Networks.
Andrew Cortese, Amirreza Masoumzadeh
2017No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016.
Karthik Sheshadri, Nirav Ajmeri, Jessica Staddon
2017OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame.
Hyunsung Lee, Seong Hoon Jeong, Huy Kang Kim
2017On Return Oriented Programming Threats in Android Runtime.
Akshaya Venkateswara Raja, Jehyun Lee, Debin Gao
2017On the Additional Chi-Square Tests for the IID Assumption of NIST SP 800-90B.
Ju-Sung Kang, Hojoong Park, Yongjin Yeom
2017Optimized Secure Data Aggregation in Wireless Sensor Networks.
Scott A. Thompson, Bharath K. Samanthula
2017Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards.
Petr Dzurenda, Sara Ricci, Jan Hajny, Lukas Malina
2017Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things.
Meredydd Williams, Jason R. C. Nurse, Sadie Creese
2017Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries.
Stefan Wüller, Ulrike Meyer, Susanne Wetzel
2017RandHeap: Heap Randomization for Mitigating Heap Spray Attacks in Virtual Machines.
Abhinav Jangda, Mohit Mishra
2017Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet
2017Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper).
Lydia Garms, Keith M. Martin, Siaw-Lynn Ng
2017Running Compression Algorithms in the Encrypted Domain: A Case-Study on the Homomorphic Execution of RLE.
Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey
2017SORTaki: A Framework to Integrate Sorting with Differential Private Histogramming Algorithms.
Doudalis Stylianos, Sharad Mehrotra
2017Smartphone Continuous Authentication Using Deep Learning Autoencoders.
Mario Parreño Centeno, Aad van Moorsel, Stefano Castruccio
2017System-Assigned Passwords You Can't Write Down, But Don't Need To.
Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin
2017Towards a Network-Based Framework for Android Malware Detection and Characterization.
Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Hugo Gonzalez, Kenneth Fon Mbah, Ali A. Ghorbani
2017Transaction Immutability and Reputation Traceability: Blockchain as a Platform for Access Controlled IoT and Human Interactivity.
David W. Kravitz
2017Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain.
Daniel Augot, Hervé Chabanne, Olivier Clémot, William George
2017What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability.
Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Christopher Bellman, Ramiro Liscano, Amit Maraj