| 2017 | 15th Annual Conference on Privacy, Security and Trust, PST 2017, Calgary, AB, Canada, August 28-30, 2017 |
| 2017 | A Certified Core Policy Language. Bahman Sistany, Amy P. Felty |
| 2017 | A New Segmentation Method for Integrated ICS (Short Paper). Khaoula Es-Salhi, David Espes, Nora Cuppens |
| 2017 | A Nonoutsourceable Puzzle Under GHOST Rule. Gongxian Zeng, Siu-Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au |
| 2017 | A Post-Quantum One Time Signature Using Bloom Filter. Masoumeh Shafieinejad, Reihaneh Safavi-Naini |
| 2017 | A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks. Subhojeet Mukherjee, Jacob Walker, Indrakshi Ray, Jeremy Daily |
| 2017 | A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database. Meiqi He, Jun Zhang, Gongxian Zeng, Siu-Ming Yiu |
| 2017 | A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt |
| 2017 | ABnews: A Fast Private Social Messaging System Using Untrusted Storage and Attribute-Based Encryption. Yasushi Shinjo, Sota Naito, Xiao Kunyao, Akira Sato |
| 2017 | Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems. Thomas P. Keenan |
| 2017 | An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network. Shadan Ghaffaripour, Fadi Younis, Hoi Ting Poon, Ali Miri |
| 2017 | An Identity Management System Based on Blockchain. Yuan Liu, Zheng Zhao, Guibing Guo, Xingwei Wang, Zhenhua Tan, Shuang Wang |
| 2017 | Automated Static Analysis and Classification of Android Malware using Permission and API Calls Models. Anastasia Skovoroda, Dennis Gamayunov |
| 2017 | Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper). Marc-André Laverdière, Ettore Merlo |
| 2017 | Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper). Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura |
| 2017 | Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols. Ali ElShakankiry, Thomas R. Dean |
| 2017 | Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper). Rebecca Cooper, Hala Assal, Sonia Chiasson |
| 2017 | Differentially Private Instance-Based Noise Mechanisms in Practice. Sébastien Canard, Baptiste Olivier, Tony Quertier |
| 2017 | Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper). Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann |
| 2017 | From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing. Anna Cinzia Squicciarini, Andrea Novelli, Dan Lin, Cornelia Caragea, Haoti Zhong |
| 2017 | Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks. Apostolis Zarras, Federico Maggi |
| 2017 | How Much Privacy Does $3, 165 Buy You? Jeremy Martin, Dane Brown, Kris Merrion, Lamont Brown, Travis Mayberry |
| 2017 | How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper). Nurul Momen, Tobias Pulls, Lothar Fritsch, Stefan Lindskog |
| 2017 | Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification. Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey |
| 2017 | Information-Flow Control with Fading Labels. Andrew Bedford |
| 2017 | Lelantos: A Blockchain-Based Anonymous Physical Delivery System. Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong |
| 2017 | Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes. Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka |
| 2017 | Modeling Exposure in Online Social Networks. Andrew Cortese, Amirreza Masoumzadeh |
| 2017 | No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016. Karthik Sheshadri, Nirav Ajmeri, Jessica Staddon |
| 2017 | OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. Hyunsung Lee, Seong Hoon Jeong, Huy Kang Kim |
| 2017 | On Return Oriented Programming Threats in Android Runtime. Akshaya Venkateswara Raja, Jehyun Lee, Debin Gao |
| 2017 | On the Additional Chi-Square Tests for the IID Assumption of NIST SP 800-90B. Ju-Sung Kang, Hojoong Park, Yongjin Yeom |
| 2017 | Optimized Secure Data Aggregation in Wireless Sensor Networks. Scott A. Thompson, Bharath K. Samanthula |
| 2017 | Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards. Petr Dzurenda, Sara Ricci, Jan Hajny, Lukas Malina |
| 2017 | Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things. Meredydd Williams, Jason R. C. Nurse, Sadie Creese |
| 2017 | Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. Stefan Wüller, Ulrike Meyer, Susanne Wetzel |
| 2017 | RandHeap: Heap Randomization for Mitigating Heap Spray Attacks in Virtual Machines. Abhinav Jangda, Mohit Mishra |
| 2017 | Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper). Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet |
| 2017 | Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper). Lydia Garms, Keith M. Martin, Siaw-Lynn Ng |
| 2017 | Running Compression Algorithms in the Encrypted Domain: A Case-Study on the Homomorphic Execution of RLE. Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey |
| 2017 | SORTaki: A Framework to Integrate Sorting with Differential Private Histogramming Algorithms. Doudalis Stylianos, Sharad Mehrotra |
| 2017 | Smartphone Continuous Authentication Using Deep Learning Autoencoders. Mario Parreño Centeno, Aad van Moorsel, Stefano Castruccio |
| 2017 | System-Assigned Passwords You Can't Write Down, But Don't Need To. Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin |
| 2017 | Towards a Network-Based Framework for Android Malware Detection and Characterization. Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Hugo Gonzalez, Kenneth Fon Mbah, Ali A. Ghorbani |
| 2017 | Transaction Immutability and Reputation Traceability: Blockchain as a Platform for Access Controlled IoT and Human Interactivity. David W. Kravitz |
| 2017 | Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain. Daniel Augot, Hervé Chabanne, Olivier Clémot, William George |
| 2017 | What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability. Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Christopher Bellman, Ramiro Liscano, Amit Maraj |