PST C

32 papers

YearTitle / Authors
202219th Annual International Conference on Privacy, Security & Trust, PST 2022, Fredericton, NB, Canada, August 22-24, 2022
2022A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces.
Shaveta Dandyan, Habib Louafi, Samira Sadaoui
2022A Secure and Privacy-Preserving Dynamic Aggregation Mechanism for V2G System.
Xiaodong Qu, Qinglei Kong, Feng Yin, Leixi Xu
2022A Semantic-based Approach to Reduce the Reading Time of Privacy Policies.
Jasmin Kaur, Rozita Dara, Ritu Chaturvedi
2022A Vulnerability in Video Anonymization - Privacy Disclosure from Face-obfuscated video.
Hiroaki Kikuchi, Shun Miyoshi, Takafumi Mori, Andres Hernandez-Matamoros
2022Achieving Efficient and Secure Query in Blockchain-based Traceability Systems.
Chengzhe Lai, Yinzhen Wang
2022An Analytical Study of Selfish Mining Attacks on Chainweb Blockchain.
Suyang Wang, Bo Yin, Shuai Zhang, Yu Cheng
2022An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data.
Wentao Wang, Yuxuan Jin, Bin Cao
2022An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward Privacy.
Khosro Salmani
2022Balancing privacy and accountability in digital payment methods using zk-SNARKs.
Tariq Bontekoe, Maarten H. Everts, Andreas Peter
2022Careful What You Wish For: on the Extraction of Adversarially Trained Models.
Kacem Khaled, Gabriela Nicolescu, Felipe Göhring de Magalhães
2022Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning.
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Ali A. Ghorbani
2022Content Analysis of Privacy Policies Before and After GDPR.
Nastaran Bateni, Jasmin Kaur, Rozita Dara, Fei Song
2022Designing In-Air Hand Gesture-based User Authentication System via Convex Hull.
Yiming Sun, Weizhi Meng, Wenjuan Li
2022Discovering Non-Metadata Contaminant Features in Intrusion Detection Datasets.
Laurens D'hooge, Miel Verkerken, Tim Wauters, Bruno Volckaert, Filip De Turck
2022Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An Improvement to Secure MPC Application.
Kun Peng
2022Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories.
Xichen Zhang, Songnian Zhang, Suprio Ray, Ali A. Ghorbani
2022Faceless: A Cross-Platform Private Payment scheme for Human-Readable Identifiers.
Huang Lin
2022Garage Door Openers: A Rolling Code Protocol Case Study.
Ahmed Ghanem, Riham AlTawy
2022Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility.
Cagri Arisoy, Anuradha Mandal, Nitesh Saxena
2022LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach.
Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy
2022Mobile Mental Health Apps: Alternative Intervention or Intrusion?
Shalini Saini, Dhiral Panjwani, Nitesh Saxena
2022Privacy Policy Analysis with Sentence Classification.
Andrick Adhikari, Sanchari Das, Rinku Dewri
2022Privacy-Preserving Detection of Poisoning Attacks in Federated Learning.
Trent Muhr, Wensheng Zhang
2022Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree.
Xueqin Gao, Tao Shang, Da Li, Jianwei Liu
2022SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables.
Mordechai Guri
2022Security Analysis in Satellite Communication based on Geostationary Orbit.
Jacob Krabbe Pedersen, Mikkel Bøchman, Weizhi Meng
2022Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming.
Malte Breuer, Pascal Hein, Leonardo Pompe, Ben Temme, Ulrike Meyer, Susanne Wetzel
2022Towards the Development of a Realistic Multidimensional IoT Profiling Dataset.
Sajjad Dadkhah, Hassan Mahdikhani, Priscilla Kyei Danso, Alireza Zohourian, Kevin Anh Truong, Ali A. Ghorbani
2022Usability of Paper Audit Trails in Electronic Voting Machines.
Saul Hughes, Sana Maqsood
2022User Behavior Simulation in ICS Cyber Ranges.
Chuhan Liu, Wei Yan, Fengkai Xu, Wenlong Yang, Beibei Li
2022Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs.
Weifeng Xu, Dianxiang Xu