| 2019 | "it's a generally exhausting field" A Large-Scale Study of Security Incident Management Workflows and Pain Points. Jessica Staddon, Noelle Easterday |
| 2019 | 17th International Conference on Privacy, Security and Trust, PST 2019, Fredericton, NB, Canada, August 26-28, 2019 |
| 2019 | A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain. Batnyam Enkhtaivan, Takao Takenouchi, Kazue Sako |
| 2019 | A Framework for Evaluating Image Obfuscation under Deep Learning-Assisted Privacy Attacks. Jimmy Tekli, Bechara al Bouna, Raphaël Couturier, Gilbert Tekli, Zeinab al Zein, Marc Kamradt |
| 2019 | A New Multisignature Scheme with Public Key Aggregation for Blockchain. Duc-Phong Le, Guomin Yang, Ali A. Ghorbani |
| 2019 | A Novel Permutational Sampling Technique for Cooperative Network Scanning. Jafar Haadi Jafarian, Kuntal Das |
| 2019 | A blockchain-based loan over-prevention mechanism. Xiaoya Hu, Licheng Wang, Lijing Zhou, Lixiang Li, Sijia Yang |
| 2019 | Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application to Genomic Data. Jason Chang, Rongxing Lu |
| 2019 | Analysis, Implications, and Challenges of an Evolving Consumer IoT Security Landscape. Christopher Bellman, Paul C. van Oorschot |
| 2019 | Ari: a P2P optimization for blockchain systems. Xin Yang, Lei Shi |
| 2019 | Automated Extraction of Security Concerns from Bug Reports. Sultan S. Al-Qahtani |
| 2019 | Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest. Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue |
| 2019 | Blockchain-based Marketplace for Software Testing. Yu Wang, Reza Samavi, Nitin Sood |
| 2019 | Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information. Ajaya Neupane, Kiavash Satvat, Mahshid Hosseini, Nitesh Saxena |
| 2019 | Competitive Selfish Mining. Hamid Azimy, Ali A. Ghorbani |
| 2019 | Compromising Speech Privacy under Continuous Masking in Personal Spaces. S. Abhishek Anand, Payton Walker, Nitesh Saxena |
| 2019 | Contemporary Sequential Network Attacks Prediction using Hidden Markov Model. Timothy A. Chadza, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan |
| 2019 | Detecting Exploit Websites Using Browser-based Predictive Analytics. May Almousa, Mohd Anwar |
| 2019 | EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging. Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim, JaeSeung Song |
| 2019 | End-Users and Service Providers: Trust and Distributed Responsibility for Account Security. Yomna Abdelaziz, Daniela Napoli, Sonia Chiasson |
| 2019 | Enhancing Security and Privacy of Next-Generation Edge Computing Technologies. Matthew Hagan, Fahad Siddiqui, Sakir Sezer |
| 2019 | Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach. David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber |
| 2019 | Exploring Automation in Proofs of Attribute-based Encryption in the Standard Model. Guruprasad Eswaraiah, Lalitha Muthu Subramanian, Roopa Vishwanathan |
| 2019 | Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices. Khalid T. Mursi, Yu Zhuang, Mohammed Saeed Alkatheiri, Ahmad O. Aseeri |
| 2019 | Forward Secure and Fine-grained Data Sharing for Mobile Crowdsensing. Liang Xue, Jianbing Ni, Cheng Huang, Xiaodong Lin, Xuemin Sherman Shen |
| 2019 | Geographic Hints for Passphrase Authentication. Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari |
| 2019 | Geographical Security Questions for Fallback Authentication. Alaadin Addas, Amirali Salehi-Abari, Julie Thorpe |
| 2019 | GlassMasq: Adversarial Examples Masquerading in Face Identification Systems with Feature Extractor. Kazuya Kakizaki, Kosuke Yoshida, Tsubasa Takahashi |
| 2019 | Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems. Munir Geden, Kasper Rasmussen |
| 2019 | Machine Learning Model for Smart Contracts Security Analysis. Pouyan Momeni, Yu Wang, Reza Samavi |
| 2019 | Mixed Pictures: Mental Models of Malware. Eric Spero, Milica Stojmenovic, Zahra Hassanzadeh, Sonia Chiasson, Robert Biddle |
| 2019 | Model Checking the IKEv2 Protocol Using Spin. Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra |
| 2019 | On Embedding Backdoor in Malware Detectors Using Machine Learning. Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto |
| 2019 | On the null relationship between personality types and passwords. Amit Maraj, Miguel Vargas Martin, Matthew Shane, Mohammad Mannan |
| 2019 | Onboarding and Software Update Architecture for IoT Devices. Hemant Gupta, Paul C. van Oorschot |
| 2019 | Preface. Ali Ghorbani |
| 2019 | Privacy - Preserving Multi-Party Conditional Random Selection. Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Fabian Förg, Susanne Wetzel |
| 2019 | Privacy in the Internet of Things: A Study to Protect User's Data in LPR Systems Using Blockchain. Iago Sestrem Ochôa, Leonardo Calbusch, Karize Viecelli, Juan F. De Paz, Valderi R. Q. Leithardt, Cesar A. Zeferino |
| 2019 | Privacy-preserving tax-case processing. Espen Kjellstadli Lund, Mariusz Nowostawski, Abylay Satybaldy, Nader Aeinehchi |
| 2019 | Prying into Private Spaces Using Mobile Device Motion Sensors. Zakery Fyke, Isaac Griswold-Steiner, Abdul Serwadda |
| 2019 | RZcash: A Privacy Protection Scheme for the Account-based Blockchain. Xue Bai, Licheng Wang, Lijing Zhou, Sijia Yang, Lixiang Li |
| 2019 | Rebalancing in Acyclic Payment Networks. Lalitha Muthu Subramanian, Guruprasad Eswaraiah, Roopa Vishwanathan |
| 2019 | Security and Privacy Functionalities in IoT. Elahe Fazeldehkordi, Olaf Owe, Josef Noll |
| 2019 | Semantic Modeling Approach for Software Vulnerabilities Data Sources. Sultan S. Al-Qahtani, Juergen Rilling |
| 2019 | SplitSecond: Flexible Privilege Separation of Android Apps. Jehyun Lee, Akshaya Venkateswara Raja, Debin Gao |
| 2019 | Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations. Maliheh Shirvanian, Nitesh Saxena |
| 2019 | Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network. Meriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria |
| 2019 | User Authentication Using Keystroke Dynamics via Crowdsourcing. Andrew Foresi, Reza Samavi |
| 2019 | Victim or Attacker? A Multi-dataset Domain Classification of Phishing Attacks. Sophie Le Page, Guy-Vincent Jourdan |
| 2019 | Website Identity Notification: Testing the Simplest Thing That Could Possibly Work. Milica Stojmenovic, Eric Spero, Temitayo Oyelowo, Robert Biddle |
| 2019 | ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics. Babins Shrestha, Manar Mohamed, Nitesh Saxena |