


default search action
13th PST 2015: Izmir, Turkey
- Ali A. Ghorbani, Vicenç Torra, Hüseyin Hisil, Ali Miri, Ahmet Koltuksuz, Jie Zhang, Murat Sensoy, Joaquín García-Alfaro, Ibrahim Zincir:

13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7828-4
Privacy
- Per A. Hallgren, Martín Ochoa

, Andrei Sabelfeld:
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol. 1-6 - Rino Falcone, Alessandro Sapienza, Cristiano Castelfranchi:

Recommendation of categories in an agents world: The role of (not) local communicative environments. 7-13 - Hiroaki Kikuchi, Katsumi Takahashi:

Zipf distribution model for quantifying risk of re-identification from trajectory data. 14-21 - Jonas Breuer, Heritiana Ranaivoson

, Uschi Buchinger, Pieter Ballon:
Who manages the manager? Identity management and user ownership in the age of data. 22-27 - Josep Domingo-Ferrer

, Sara Ricci
, Jordi Soria-Comas
:
Disclosure risk assessment via record linkage by a maximum-knowledge attacker. 28-35 - Dilian Gurov

, Peeter Laud
, Roberto Guanciale
:
Privacy preserving business process matching. 36-43 - Stefan Wüller, Ulrike Meyer, Fabian Förg, Susanne Wetzel:

Privacy-preserving conditional random selection. 44-53 - Balamurugan Anandan, Chris Clifton:

Laplace noise generation for two-party computational differential privacy. 54-61 - Yasser Jafer, Stan Matwin

, Marina Sokolova:
A framework for a privacy-aware feature selection evaluation measure. 62-69 - Balkis Abidi, Sadok Ben Yahia

:
An adaptive algorithm for multivariate data-oriented microaggregation. 70-76 - Hsiao-Ying Huang, Masooda N. Bashir

:
Is privacy a human right? An empirical examination in a global context. 77-84
Security
- Prateek Dewan, Ponnurangam Kumaraguru:

Towards automatic real time identification of malicious posts on Facebook. 85-92 - Anupama Aggarwal, Ponnurangam Kumaraguru:

What they do in shadows: Twitter underground follower market. 93-100 - Apostolis Zarras

, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz
:
Revealing the relationship network behind link spam. 101-108 - Mitu Kumar Debnath, Saeed Samet

, Krishnamurthy Vidyasankar:
A secure revocable personal health record system with policy-based fine-grained access control. 109-116 - Mehmet Sabir Kiraz

, Isa Sertkaya
, Osmanbey Uzunkol:
An efficient ID-based message recoverable privacy-preserving auditing scheme. 117-124 - Liang Chen, Peter Edwards

, John D. Nelson
, Timothy J. Norman
:
An access control model for protecting provenance graphs. 125-132 - Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:

ECA rules for controlling authorisation plan to satisfy dynamic constraints. 133-138 - Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi

, Hyoungshick Kim:
Devil in a box: Installing backdoors in electronic door locks. 139-144 - Dorottya Papp

, Zhendong Ma, Levente Buttyán:
Embedded systems security: Threats, vulnerabilities, and attack taxonomy. 145-152 - Tiago V. de Arruda, Yeda Regina Venturini, Tiemi C. Sakata:

Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices. 153-156 - Abdullah J. Alzahrani, Ali A. Ghorbani:

Real-time signature-based detection approach for SMS botnet. 157-164 - Fabio Martinelli, Francesco Santini

, Artsiom Yautsiukhin
:
Network security supported by arguments. 165-172 - Junsung Cho

, Geumhwan Cho
, Hyoungshick Kim:
Keyboard or keylogger?: A security analysis of third-party keyboards on Android. 173-176
Trust
- Brian A. Soeder, K. Suzanne Barber:

A model for calculating user-identity trustworthiness in online transactions. 177-185 - Masahiro Fujita, Christian Damsgaard Jensen

, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki
:
Physical trust-based persistent authentication. 186-190 - Jaap Boender, Giuseppe Primiero

, Franco Raimondi
:
Minimizing transitive trust threats in software management systems. 191-198

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














