default search action
19th PST 2022: Fredericton, NB, Canada
- 19th Annual International Conference on Privacy, Security & Trust, PST 2022, Fredericton, NB, Canada, August 22-24, 2022. IEEE 2022, ISBN 978-1-6654-7398-9
- Saul Hughes, Sana Maqsood:
Usability of Paper Audit Trails in Electronic Voting Machines. 1-10 - Jacob Krabbe Pedersen, Mikkel Bøchman, Weizhi Meng:
Security Analysis in Satellite Communication based on Geostationary Orbit. 1-10 - Shaveta Dandyan, Habib Louafi, Samira Sadaoui:
A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces. 1-11 - Khosro Salmani:
An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward Privacy. 1-10 - Xueqin Gao, Tao Shang, Da Li, Jianwei Liu:
Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree. 1-5 - Sajjad Dadkhah, Hassan Mahdikhani, Priscilla Kyei Danso, Alireza Zohourian, Kevin Anh Truong, Ali A. Ghorbani:
Towards the Development of a Realistic Multidimensional IoT Profiling Dataset. 1-11 - Kun Peng:
Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An Improvement to Secure MPC Application. 1-8 - Malte Breuer, Pascal Hein, Leonardo Pompe, Ben Temme, Ulrike Meyer, Susanne Wetzel:
Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming. 1-10 - Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy:
LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach. 1-10 - Jasmin Kaur, Rozita Dara, Ritu Chaturvedi:
A Semantic-based Approach to Reduce the Reading Time of Privacy Policies. 1-10 - Huang Lin:
Faceless: A Cross-Platform Private Payment scheme for Human-Readable Identifiers. 1-10 - Weifeng Xu, Dianxiang Xu:
Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs. 1-10 - Xichen Zhang, Songnian Zhang, Suprio Ray, Ali A. Ghorbani:
Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories. 1-8 - Laurens D'hooge, Miel Verkerken, Tim Wauters, Bruno Volckaert, Filip De Turck:
Discovering Non-Metadata Contaminant Features in Intrusion Detection Datasets. 1-11 - Shalini Saini, Dhiral Panjwani, Nitesh Saxena:
Mobile Mental Health Apps: Alternative Intervention or Intrusion? 1-11 - Hiroaki Kikuchi, Shun Miyoshi, Takafumi Mori, Andres Hernandez-Matamoros:
A Vulnerability in Video Anonymization - Privacy Disclosure from Face-obfuscated video. 1-10 - Andrick Adhikari, Sanchari Das, Rinku Dewri:
Privacy Policy Analysis with Sentence Classification. 1-10 - Mordechai Guri:
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables. 1-10 - Chuhan Liu, Wei Yan, Fengkai Xu, Wenlong Yang, Beibei Li:
User Behavior Simulation in ICS Cyber Ranges. 1-5 - Kacem Khaled, Gabriela Nicolescu, Felipe Göhring de Magalhães:
Careful What You Wish For: on the Extraction of Adversarially Trained Models. 1-10 - Yiming Sun, Weizhi Meng, Wenjuan Li:
Designing In-Air Hand Gesture-based User Authentication System via Convex Hull. 1-5 - Nastaran Bateni, Jasmin Kaur, Rozita Dara, Fei Song:
Content Analysis of Privacy Policies Before and After GDPR. 1-9 - Euclides Carlos Pinto Neto, Sajjad Dadkhah, Ali A. Ghorbani:
Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning. 1-10 - Suyang Wang, Bo Yin, Shuai Zhang, Yu Cheng:
An Analytical Study of Selfish Mining Attacks on Chainweb Blockchain. 1-10 - Chengzhe Lai, Yinzhen Wang:
Achieving Efficient and Secure Query in Blockchain-based Traceability Systems. 1-5 - Tariq Bontekoe, Maarten H. Everts, Andreas Peter:
Balancing privacy and accountability in digital payment methods using zk-SNARKs. 1-10 - Xiaodong Qu, Qinglei Kong, Feng Yin, Leixi Xu:
A Secure and Privacy-Preserving Dynamic Aggregation Mechanism for V2G System. 1-7 - Wentao Wang, Yuxuan Jin, Bin Cao:
An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data. 1-10 - Cagri Arisoy, Anuradha Mandal, Nitesh Saxena:
Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility. 1-12 - Ahmed Ghanem, Riham AlTawy:
Garage Door Openers: A Rolling Code Protocol Case Study. 1-6 - Trent Muhr, Wensheng Zhang:
Privacy-Preserving Detection of Poisoning Attacks in Federated Learning. 1-10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.