default search action
PST 2011: Montreal, Québec, Canada
- Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada. IEEE 2011, ISBN 978-1-4577-0582-3
- Naveed Ahmad, Haitham S. Cruickshank, Zhili Sun, Muhammad Asif:
Pseudonymised communication in delay tolerant networks. 1-6 - Zainab M. Aljazzaf, Miriam A. M. Capretz, Mark Perry:
Trust bootstrapping services and service providers. 7-15 - Tristan Allard, Benjamin Nguyen, Philippe Pucheral:
Safe realization of the Generalization privacy mechanism. 16-23 - Esma Aïmeur, David Schönfeld:
The ultimate invasion of privacy: Identity theft. 24-31 - Martín Barrère, Gustavo Betarte, Marcelo Rodríguez:
Towards machine-assisted formal procedures for the collection of digital evidence. 32-35 - Paolo Gasti, Alessio Merlo:
On Re-use of randomness in broadcast encryption. 36-43 - François Gauthier, Dominic Letarte, Thierry Lavoie, Ettore Merlo:
Extraction and comprehension of moodle's access control model: A case study. 44-51 - Lilia Georgieva:
Modelling of security properties in Alloy. 52-54 - Mahmoud Ghorbel, Armen Aghasaryan, Stéphane Betgé-Brezetz, Marie-Pascale Dupont, Guy-Bertrand Kamga, Sophie Piekarec:
Privacy Data Envelope: Concept and implementation. 55-62 - Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
A trust-based approach against IP-spoofing attacks. 63-70 - Joshua Gorner, Jie Zhang, Robin Cohen:
Improving the use of advisor networks for multi-agent trust modelling. 71-78 - Nagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat:
I-RBAC: Isolation enabled role-based access control. 79-86 - Abbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Shervin Shirmohammadi, Carlisle M. Adams, Abdulmotaleb El-Saddik:
Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition. 87-92 - Yoshihiro Kaneko, Yuji Kinpara, Yuta Shiomi:
A hamming distance-like filtering in keystroke dynamics. 93-95 - Dakshita Khurana, Aditya Gaurav:
Ensuring tight computational security against higher-order DPA attacks. 96-101 - Nick Mailloux, Ali Miri, Monica Nevins:
Forward secure identity-based key agreement for dynamic groups. 102-111 - Mark Manulis, Marion Steiner:
UPBA: User-Authenticated Property-Based Attestation. 112-119 - Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY. 120-123 - Md. Moniruzzaman, Ken Barker:
Delegation of access rights in a privacy preserving access control model. 124-133 - Ali Nur Mohammad Noman, Sk. Md. Mizanur Rahman, Carlisle Adams:
Improving security and usability of low cost RFID tags. 134-141 - Samir Ouchani, Yosr Jarraya, Otmane Aït Mohamed:
Model-based systems security quantification. 142-149 - Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis:
A probabilistic-based approach towards trust evaluation using Poisson Hidden Markov Models and Bonus Malus Systems. 150-155 - Mohammad Parham, John William Atwood:
Validation of security for participant control exchanges in multicast content distribution. 156-163 - Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto:
Cryptographic security models for eHealth P2P database management systems network. 164-173 - Sherif Saad, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian:
Detecting P2P botnets through network behavior analysis and machine learning. 174-180 - Dina Said, Lisa Stirling, Peter Federolf, Ken Barker:
Data preprocessing for distance-based unsupervised Intrusion Detection. 181-188 - Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk-based decision method for access control systems. 189-192 - Bernard Stepien, Stan Matwin, Amy P. Felty:
Advantages of a non-technical XACML notation in role-based models. 193-200 - Hagen Stübing, Murat Ceven, Sorin A. Huss:
A Diffie-Hellman based privacy protocol for Car-to-X communication. 201-204 - Johannes Viehmann:
Secure communication with secret sharing in static computer networks with partition in mistrust parties. 205-212 - Alberto Vila Tena, Yrjö Raivio:
Privacy challenges of open APIs: Case location based services. 213-220 - Steve R. Tate, Roopa Vishwanathan:
General Secure Function Evaluation using standard trusted computing hardware. 221-228 - Jens H. Weber-Jahnke, James B. Williams:
Beyond privacy policies - assessing inherent privacy risks of consumer health services. 229-237 - Jiangong Weng, Amy P. Felty:
An implementation of a verification condition generator for foundational proof-carrying code. 238-245 - Shirantha Wijesekera, Xu Huang, Dharmendra Sharma:
Performance analysis of QKD based key distribution for IEEE 802.11 networks. 246-251 - Qi Xie, Urs Hengartner:
Privacy-preserving matchmaking For mobile social networking secure against malicious users. 252-259 - Abdulsalam Yassine, Ali A. Nazari Shirehjini, Shervin Shirmohammadi, Thomas T. Tran:
Online information privacy: Agent-mediated payoff. 260-263 - Qian Yu, Chang N. Zhang:
RC4 state and its applications. 264-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.