2018 16th Annual Conference on Privacy, Security and Trust (PST) : August 28-30, 2018, Belfast, Northern Ireland, United Kingdom (English)
- New search for: Annual Conference on Privacy, Security and Trust
- New search for: Institute of Electrical and Electronics Engineers
- Further information on Institute of Electrical and Electronics Engineers:
- http://d-nb.info/gnd/1692-5
- New search for: McLaughlin, Kieran
- New search for: Ghorbani, Ali
- New search for: Sezer, Sakir
- New search for: Lu, Rongxing
- New search for: Chen, Liqun
- New search for: Annual Conference on Privacy, Security and Trust
- New search for: Institute of Electrical and Electronics Engineers
- Further information on Institute of Electrical and Electronics Engineers:
- http://d-nb.info/gnd/1692-5
2018
-
ISBN:
- Conference Proceedings / Electronic Resource
-
Title:2018 16th Annual Conference on Privacy, Security and Trust (PST) : August 28-30, 2018, Belfast, Northern Ireland, United Kingdom
-
Additional title:PST 2018
-
Contributors:McLaughlin, Kieran ( editor ) / Ghorbani, Ali ( editor ) / Sezer, Sakir ( editor ) / Lu, Rongxing ( editor ) / Chen, Liqun ( editor ) / Annual Conference on Privacy, Security and Trust ( author ) / Institute of Electrical and Electronics Engineers ( issuing body )
-
Conference:Annual Conference on Privacy, Security and Trust ; 16 ; 2018 ; Belfast
International Conference on Privacy, Security and Trust ; 16 ; 2018 ; Belfast
PST ; 16 ; 2018 ; Belfast -
Publisher:
- New search for: IEEE
-
Place of publication:[Piscataway, NJ]
-
Publication date:2018
-
Size:1 Online-Ressource
-
Remarks:Illustrationen
Literaturangaben -
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern RecognitionVarastehpour, Soheil / Sharifzadeh, Hamid / Ardekani, Iman / Sarrafzadeh, Abdolhossein et al. | 2018
- 1
-
Parallel Linear Regression on Encrypted DataMorshed, Toufique / Alhadidi, Dima / Mohammed, Noman et al. | 2018
- 1
-
Mitigating CSRF attacks on OAuth 2.0 SystemsLi, Wanpeng / Mitchell, Chris J / Chen, Thomas et al. | 2018
- 1
-
Privacy-Preserving Subgraph CheckingWuller, Stefan / Assadsolimani, Benjamin / Meyer, Ulrike / Wetzel, Susanne et al. | 2018
- 1
-
Industry-Wide Analysis of Open Source SecurityZhang, Yiming / Malhotra, Baljeet / Chen, Cheng et al. | 2018
- 1
-
Managing Publicly Known Security Vulnerabilities in Software SystemsMahrous, Hesham / Malhotra, Baljeet et al. | 2018
- 1
-
Exploring the Impact of Password Dataset Distribution on GuessingMurray, Hazel / Malone, David et al. | 2018
- 1
-
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart GridKhan, Rafiullah / McLaughlin, Kieran / Laverty, John Hastings David / David, Hastings / Sezer, Sakir et al. | 2018
- 1
-
Automated Proofs of Signatures using Bilinear PairingsEswaraiah, Guruprasad / Vishwanathan, Roopa / Nedza, Douglas et al. | 2018
- 1
-
Privacy-Preserving Architectures with Probabilistic GuarantiesBavendiek, Kai / Adams, Robin / Schupp, Sibylle et al. | 2018
- 1
-
Evaluation and Development of Onomatopoeia CAPTCHAsYamada, Michihiro / Shigeno, Riko / Kikuchi, Hiroaki / Sakamoto, Maki et al. | 2018
- 1
-
Approximating Robust Linear Regression With An Integral Privacy GuaranteeSenavirathne, Navoda / Torra, Vicenc et al. | 2018
- 1
-
Crossing Cross-Domain Paths in the Current WebRuohonen, Jukka / Salovaara, Joonas / Leppanen, Ville et al. | 2018
- 1
-
EagleEye: A Novel Visual Anomaly Detection MethodSharafaldin, Iman / Ghorbani, Ali A. et al. | 2018
- 1
-
Weak and Strong Deniable Authenticated Encryption: On their Relationship and ApplicationsRasmussen, Kasper / Gasti, Paolo et al. | 2018
- 1
-
Location Privacy and Utility in Geo-social Networks: Survey and Research ChallengesRiaz, Zohaib / Durr, Frank / Rothermel, Kurt et al. | 2018
- 1
-
Privacy Preserving Probabilistic Record Linkage Without Trusted Third PartyLazrig, Ibrahim / Ong, Toan C. / Ray, Indrajit / Ray, Indrakshi / Jiang, Xiaoqian / Vaidya, Jaideep et al. | 2018
- 1
-
A Power Analysis of Cryptocurrency Mining: A Mobile Device PerspectiveClay, James / Hargrave, Alexander / Sridhar, Ramalingam et al. | 2018
- 1
-
Trust-driven, Decentralized Data Access Control for Open Network of Autonomous Data ProvidersOpiola, Lukasz / Dutka, Lukasz / Slota, Renata G. / Kitowski, Jacek et al. | 2018
- 1
-
Andro-Simnet: Android Malware Family Classification using Social Network AnalysisKim, Hye Min / Song, Hyun Min / Seo, Jae Woo / Kim, Huy Kang et al. | 2018
- 1
-
Mitigating Client Subnet Leakage in DNS QueriesPan, Lanlan / Zhang, Xin / Hu, Anlei / Yuchi, Xuebiao / Wang, Jian et al. | 2018
- 1
-
Extended Abstract: Ethical and Privacy Considerations in CybersecurityDavis, Brittany / Whitfield, Christopher / Anwar, Mohd et al. | 2018
- 1
-
Usability and Security Effects of Code Examples on Crypto APIsMindermann, Kai / Wagner, Stefan et al. | 2018
- 1
-
Detecting Cryptomining Using Dynamic AnalysisCarlin, Domhnall / OrKane, Philip / Sezer, Sakir / Burgess, Jonah et al. | 2018
- 1
-
How-to Express Explicit and Auditable ConsentCarvalho, Ana C. / Martins, Rolando / Antunes, Luis et al. | 2018
- 1
-
Unmasking Android Obfuscation Tools Using Spatial AnalysisKaur, Ratinder / Ning, Ye / Gonzalez, Hugo / Stakhanova, Natalia et al. | 2018
- 1
-
A Twofold Group Key Agreement Protocol for NoC based MPSoCsSharma, Gaurav / Kuchta, Veronika / Sahu, Rajeev Anand / Ellinidou, Soultana / Markowitch, Olivier / Dricot, Jean-Michel et al. | 2018
- 1
-
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence DataMimoto, Tomoaki / Kiyomoto, Shinsaku / Hidano, Seira / Basu, Anirban / Miyaji, Atsuko et al. | 2018
- 1
-
Enforcing Privacy and Security in Public Cloud StorageResende, Joao S. / Martins, Rolando / Antunes, Lu's et al. | 2018
- 1
-
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern LocksAiken, William / Kim, Hyoungshick / Ryoo, Jungwoo / Rosson, Mary Beth et al. | 2018
- 1
-
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS AttacksPark, Jeman / Nyang, DaeHun / Mohaisen, Aziz et al. | 2018
- 1
-
GIDS: GAN based Intrusion Detection System for In-Vehicle NetworkSeo, Eunbi / Song, Hyun Min / Kim, Huy Kang et al. | 2018
- 1
-
Hide-and-Seek with Website Identity InformationStojmenovia, Milica / Biddle, Robert et al. | 2018
- 1
-
Mining Sequential Patterns from Outsourced Data via Encryption SwitchingTillem, Gamze / Erkin, Zekeriya / Lagendijk, Reginald L. et al. | 2018
- 1
-
Poster: Agent-based (BDI) modeling for automation of penetration testingChu, Ge / Lisitsa, Alexei et al. | 2018
- 1
-
Secure Compression and Pattern Matching Based on Burrows-Wheeler TransformZeng, Gongxian / He, Meiqi / Zhang, Linru / Zhang, Jun / Chen, Yuechen / Yiu, Siu Ming et al. | 2018
- 1
-
On Sybil Classification in Online Social Networks Using Only Structural FeaturesMulamba, Dieudonne / Ray, Indrajit / Ray, Indrakshi et al. | 2018
- 1
-
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic AnalysisOnwuzurike, Lucky / Almeida, Mario / Mariconti, Enrico / Blackburn, Jeremy / Stringhini, Gianluca / De Cristofaro, Emiliano et al. | 2018
- 1
-
Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage AnalysisHuang, Shin-Ying / Chuang, Tzu-Hsien / Huang, Shi-Meng / Ban, Tao et al. | 2018
- 1
-
At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosureDiaz Ferreyra, Nicolas E. / Meisy, Rene / Heiselz, Maritta et al. | 2018
- 1
-
Towards Improving Privacy Control for Smart Homes: A Privacy Decision FrameworkKeshavarz, Mahsa / Anwar, Mohd et al. | 2018
- 1
-
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from JapanSombatruang, Nissy / Kadobayashi, Youki / Sasse, M. Angela / Baddeley, Michelle / Miyamoto, Daisuke et al. | 2018
- 1
-
Problem-based Derivation of Trustworthiness Requirements from Users’ Trust ConcernsMohammadi, Nazila Gol / Ulfat-Bunyadi, Nelufar / Heisel, Maritta et al. | 2018
- 1
-
Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online ShoppingHaddad, Ghada El / Shahab, Amin / Aimeur, Esma et al. | 2018
- 1
-
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDsGur, Mordechai / Zadov, Boris / Daidakulov, Andrey / Elovici, Yuval et al. | 2018
- 1
-
Enabling Users to Balance Social Benefit and Privacy in Online Social NetworksDe, Sourya Joyee / Imine, Abdessamad et al. | 2018
- 1
-
Digitized Trust in Human-in-the-Loop Health ResearchSutton, Andrew / Samavi, Reza / Doyle, Thomas E. / Koff, David et al. | 2018
- 1
-
CHARIOT: Cloud-Assisted Access Control for the Internet of ThingsGritti, Clementine / Onen, Melek / Molva, Refik et al. | 2018
- 1
-
Coalition-Resistant Peer Rating for Long-Term ConfidentialityTraverso, Giulia / Butin, Denis / Buchmann, Johannes / Palesandro, Alex et al. | 2018
- 1
-
Analysis and Evaluation of Syntactic Privacy Notions and GamesAnkele, Robin / Simpson, Andrew et al. | 2018
- 1
-
Using AP-TED to Detect Phishing Attack VariationsLe Page, Sophie / Bochmann, Gregor v. / Cui, Qian / Flood, Jason / Jourdan, Guy-Vincent / Onut, Iosif-Viorel et al. | 2018
- 1
-
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware DetectionHagan, Matthew / Kang, BooJoong / McLaughlin, Kieran / Sezer, Sakir et al. | 2018
- 1
-
Mutual Authentication in Electronic Voting SchemesAugoye, Voke / Tomlinson, Allan et al. | 2018
- c1
-
PST 2018 16th Annual Conference on Privacy, Security and Trust (PST)| 2018
- i
-
PST 2018 Copyright Page| 2018
- i
-
PST 2018 Keynote Speakers| 2018
- i
-
PST 2018 TOC| 2018
- i
-
PST 2018 Organizers| 2018
- i
-
PST 2018 Welcome Message| 2018