PST C

51 papers

YearTitle / Authors
2019"it's a generally exhausting field" A Large-Scale Study of Security Incident Management Workflows and Pain Points.
Jessica Staddon, Noelle Easterday
201917th International Conference on Privacy, Security and Trust, PST 2019, Fredericton, NB, Canada, August 26-28, 2019
2019A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain.
Batnyam Enkhtaivan, Takao Takenouchi, Kazue Sako
2019A Framework for Evaluating Image Obfuscation under Deep Learning-Assisted Privacy Attacks.
Jimmy Tekli, Bechara al Bouna, Raphaël Couturier, Gilbert Tekli, Zeinab al Zein, Marc Kamradt
2019A New Multisignature Scheme with Public Key Aggregation for Blockchain.
Duc-Phong Le, Guomin Yang, Ali A. Ghorbani
2019A Novel Permutational Sampling Technique for Cooperative Network Scanning.
Jafar Haadi Jafarian, Kuntal Das
2019A blockchain-based loan over-prevention mechanism.
Xiaoya Hu, Licheng Wang, Lijing Zhou, Lixiang Li, Sijia Yang
2019Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application to Genomic Data.
Jason Chang, Rongxing Lu
2019Analysis, Implications, and Challenges of an Evolving Consumer IoT Security Landscape.
Christopher Bellman, Paul C. van Oorschot
2019Ari: a P2P optimization for blockchain systems.
Xin Yang, Lei Shi
2019Automated Extraction of Security Concerns from Bug Reports.
Sultan S. Al-Qahtani
2019Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue
2019Blockchain-based Marketplace for Software Testing.
Yu Wang, Reza Samavi, Nitin Sood
2019Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information.
Ajaya Neupane, Kiavash Satvat, Mahshid Hosseini, Nitesh Saxena
2019Competitive Selfish Mining.
Hamid Azimy, Ali A. Ghorbani
2019Compromising Speech Privacy under Continuous Masking in Personal Spaces.
S. Abhishek Anand, Payton Walker, Nitesh Saxena
2019Contemporary Sequential Network Attacks Prediction using Hidden Markov Model.
Timothy A. Chadza, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan
2019Detecting Exploit Websites Using Browser-based Predictive Analytics.
May Almousa, Mohd Anwar
2019EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging.
Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim, JaeSeung Song
2019End-Users and Service Providers: Trust and Distributed Responsibility for Account Security.
Yomna Abdelaziz, Daniela Napoli, Sonia Chiasson
2019Enhancing Security and Privacy of Next-Generation Edge Computing Technologies.
Matthew Hagan, Fahad Siddiqui, Sakir Sezer
2019Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach.
David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber
2019Exploring Automation in Proofs of Attribute-based Encryption in the Standard Model.
Guruprasad Eswaraiah, Lalitha Muthu Subramanian, Roopa Vishwanathan
2019Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices.
Khalid T. Mursi, Yu Zhuang, Mohammed Saeed Alkatheiri, Ahmad O. Aseeri
2019Forward Secure and Fine-grained Data Sharing for Mobile Crowdsensing.
Liang Xue, Jianbing Ni, Cheng Huang, Xiaodong Lin, Xuemin Sherman Shen
2019Geographic Hints for Passphrase Authentication.
Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari
2019Geographical Security Questions for Fallback Authentication.
Alaadin Addas, Amirali Salehi-Abari, Julie Thorpe
2019GlassMasq: Adversarial Examples Masquerading in Face Identification Systems with Feature Extractor.
Kazuya Kakizaki, Kosuke Yoshida, Tsubasa Takahashi
2019Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems.
Munir Geden, Kasper Rasmussen
2019Machine Learning Model for Smart Contracts Security Analysis.
Pouyan Momeni, Yu Wang, Reza Samavi
2019Mixed Pictures: Mental Models of Malware.
Eric Spero, Milica Stojmenovic, Zahra Hassanzadeh, Sonia Chiasson, Robert Biddle
2019Model Checking the IKEv2 Protocol Using Spin.
Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra
2019On Embedding Backdoor in Malware Detectors Using Machine Learning.
Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto
2019On the null relationship between personality types and passwords.
Amit Maraj, Miguel Vargas Martin, Matthew Shane, Mohammad Mannan
2019Onboarding and Software Update Architecture for IoT Devices.
Hemant Gupta, Paul C. van Oorschot
2019Preface.
Ali Ghorbani
2019Privacy - Preserving Multi-Party Conditional Random Selection.
Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Fabian Förg, Susanne Wetzel
2019Privacy in the Internet of Things: A Study to Protect User's Data in LPR Systems Using Blockchain.
Iago Sestrem Ochôa, Leonardo Calbusch, Karize Viecelli, Juan F. De Paz, Valderi R. Q. Leithardt, Cesar A. Zeferino
2019Privacy-preserving tax-case processing.
Espen Kjellstadli Lund, Mariusz Nowostawski, Abylay Satybaldy, Nader Aeinehchi
2019Prying into Private Spaces Using Mobile Device Motion Sensors.
Zakery Fyke, Isaac Griswold-Steiner, Abdul Serwadda
2019RZcash: A Privacy Protection Scheme for the Account-based Blockchain.
Xue Bai, Licheng Wang, Lijing Zhou, Sijia Yang, Lixiang Li
2019Rebalancing in Acyclic Payment Networks.
Lalitha Muthu Subramanian, Guruprasad Eswaraiah, Roopa Vishwanathan
2019Security and Privacy Functionalities in IoT.
Elahe Fazeldehkordi, Olaf Owe, Josef Noll
2019Semantic Modeling Approach for Software Vulnerabilities Data Sources.
Sultan S. Al-Qahtani, Juergen Rilling
2019SplitSecond: Flexible Privilege Separation of Android Apps.
Jehyun Lee, Akshaya Venkateswara Raja, Debin Gao
2019Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations.
Maliheh Shirvanian, Nitesh Saxena
2019Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network.
Meriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria
2019User Authentication Using Keystroke Dynamics via Crowdsourcing.
Andrew Foresi, Reza Samavi
2019Victim or Attacker? A Multi-dataset Domain Classification of Phishing Attacks.
Sophie Le Page, Guy-Vincent Jourdan
2019Website Identity Notification: Testing the Simplest Thing That Could Possibly Work.
Milica Stojmenovic, Eric Spero, Temitayo Oyelowo, Robert Biddle
2019ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics.
Babins Shrestha, Manar Mohamed, Nitesh Saxena