![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
13th PST 2015: Izmir, Turkey
- Ali A. Ghorbani, Vicenç Torra, Hüseyin Hisil, Ali Miri, Ahmet Koltuksuz, Jie Zhang, Murat Sensoy, Joaquín García-Alfaro, Ibrahim Zincir:
13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7828-4
Privacy
- Per A. Hallgren, Martín Ochoa
, Andrei Sabelfeld:
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol. 1-6 - Rino Falcone, Alessandro Sapienza, Cristiano Castelfranchi:
Recommendation of categories in an agents world: The role of (not) local communicative environments. 7-13 - Hiroaki Kikuchi, Katsumi Takahashi:
Zipf distribution model for quantifying risk of re-identification from trajectory data. 14-21 - Jonas Breuer, Heritiana Ranaivoson
, Uschi Buchinger, Pieter Ballon:
Who manages the manager? Identity management and user ownership in the age of data. 22-27 - Josep Domingo-Ferrer
, Sara Ricci
, Jordi Soria-Comas:
Disclosure risk assessment via record linkage by a maximum-knowledge attacker. 28-35 - Dilian Gurov
, Peeter Laud
, Roberto Guanciale
:
Privacy preserving business process matching. 36-43 - Stefan Wüller, Ulrike Meyer, Fabian Förg, Susanne Wetzel:
Privacy-preserving conditional random selection. 44-53 - Balamurugan Anandan, Chris Clifton:
Laplace noise generation for two-party computational differential privacy. 54-61 - Yasser Jafer, Stan Matwin
, Marina Sokolova:
A framework for a privacy-aware feature selection evaluation measure. 62-69 - Balkis Abidi, Sadok Ben Yahia
:
An adaptive algorithm for multivariate data-oriented microaggregation. 70-76 - Hsiao-Ying Huang, Masooda N. Bashir
:
Is privacy a human right? An empirical examination in a global context. 77-84
Security
- Prateek Dewan, Ponnurangam Kumaraguru:
Towards automatic real time identification of malicious posts on Facebook. 85-92 - Anupama Aggarwal, Ponnurangam Kumaraguru:
What they do in shadows: Twitter underground follower market. 93-100 - Apostolis Zarras
, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz
:
Revealing the relationship network behind link spam. 101-108 - Mitu Kumar Debnath, Saeed Samet
, Krishnamurthy Vidyasankar:
A secure revocable personal health record system with policy-based fine-grained access control. 109-116 - Mehmet Sabir Kiraz
, Isa Sertkaya
, Osmanbey Uzunkol:
An efficient ID-based message recoverable privacy-preserving auditing scheme. 117-124 - Liang Chen, Peter Edwards
, John D. Nelson
, Timothy J. Norman
:
An access control model for protecting provenance graphs. 125-132 - Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira:
ECA rules for controlling authorisation plan to satisfy dynamic constraints. 133-138 - Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi
, Hyoungshick Kim:
Devil in a box: Installing backdoors in electronic door locks. 139-144 - Dorottya Papp
, Zhendong Ma, Levente Buttyán:
Embedded systems security: Threats, vulnerabilities, and attack taxonomy. 145-152 - Tiago V. de Arruda, Yeda Regina Venturini, Tiemi C. Sakata:
Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices. 153-156 - Abdullah J. Alzahrani, Ali A. Ghorbani:
Real-time signature-based detection approach for SMS botnet. 157-164 - Fabio Martinelli, Francesco Santini
, Artsiom Yautsiukhin
:
Network security supported by arguments. 165-172 - Junsung Cho
, Geumhwan Cho
, Hyoungshick Kim:
Keyboard or keylogger?: A security analysis of third-party keyboards on Android. 173-176
Trust
- Brian A. Soeder, K. Suzanne Barber:
A model for calculating user-identity trustworthiness in online transactions. 177-185 - Masahiro Fujita, Christian Damsgaard Jensen
, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki:
Physical trust-based persistent authentication. 186-190 - Jaap Boender, Giuseppe Primiero
, Franco Raimondi:
Minimizing transitive trust threats in software management systems. 191-198
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.