:facetid:toc:\"db/journals/tissec/tissec19.bht\"OK:facetid:toc:db/journals/tissec/tissec19.bhtGeorge ArgyrosTheofilos PetsiosSuphannee SivakornAngelos D. KeromytisIasonas PolakisEvaluating the Privacy Guarantees of Location Proximity Services.ACM Trans. Priv. Secur.19412:1-12:312017Journal Articlesclosedjournals/tissec/ArgyrosPSKP1710.1145/3007209https://doi.org/10.1145/3007209https://dblp.org/rec/journals/tissec/ArgyrosPSKP17URL#2853340Hendrik MeutznerSantosh GuptaViet-Hung NguyenThorsten HolzDorothea KolossaToward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding.ACM Trans. Priv. Secur.19410:1-10:312017Journal Articlesclosedjournals/tissec/MeutznerGNHK1710.1145/2856820https://doi.org/10.1145/2856820https://dblp.org/rec/journals/tissec/MeutznerGNHK17URL#2853347Reza ShokriGeorge Theodorakopoulos 0001Carmela TroncosoPrivacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy.ACM Trans. Priv. Secur.19411:1-11:312017Journal Articlesclosedjournals/tissec/ShokriTT1710.1145/3009908https://doi.org/10.1145/3009908https://dblp.org/rec/journals/tissec/ShokriTT17URL#2853354Pol Mac AonghusaDouglas J. LeithDon't Let Google Know I'm Lonely.ACM Trans. Priv. Secur.1913:1-3:252016Journal Articlesclosedjournals/tissec/AonghusaL1610.1145/2937754https://doi.org/10.1145/2937754https://dblp.org/rec/journals/tissec/AonghusaL16URL#3184463Jason CramptonAndrei GagarinGregory Z. GutinMark Jones 0001Magnus WahlströmOn the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations.ACM Trans. Priv. Secur.1938:1-8:292016Journal Articlesclosedjournals/tissec/CramptonGGJW1610.1145/2988239https://doi.org/10.1145/2988239https://dblp.org/rec/journals/tissec/CramptonGGJW16URL#3184465Zheng DongKevin KaneL. Jean CampDetection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks.ACM Trans. Priv. Secur.1925:1-5:312016Journal Articlesclosedjournals/tissec/DongKC1610.1145/2975591https://doi.org/10.1145/2975591https://dblp.org/rec/journals/tissec/DongKC16URL#3184466Simon EberzKasper Bonne RasmussenVincent LendersIvan MartinovicLooks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics.ACM Trans. Priv. Secur.1911:1-1:312016Journal Articlesclosedjournals/tissec/EberzRLM1610.1145/2904018https://doi.org/10.1145/2904018https://dblp.org/rec/journals/tissec/EberzRLM16URL#3184467Juan A. GarayVladimir KolesnikovRae McLellanMAC Precomputation with Applications to Secure Memory.ACM Trans. Priv. Secur.1926:1-6:212016Journal Articlesclosedjournals/tissec/GarayKM1610.1145/2943780https://doi.org/10.1145/2943780https://dblp.org/rec/journals/tissec/GarayKM16URL#3184468Christopher N. GutierrezMohammed H. AlmeshekahEugene H. SpaffordMikhail J. AtallahJeffrey AveryInhibiting and Detecting Offline Password Cracking Using ErsatzPasswords.ACM Trans. Priv. Secur.1939:1-9:302016Journal Articlesclosedjournals/tissec/GutierrezASAA16http://dl.acm.org/citation.cfm?id=2996457https://dblp.org/rec/journals/tissec/GutierrezASAA16URL#3184469Dimitris MitropoulosKonstantinos StroggylosDiomidis SpinellisAngelos D. KeromytisHow to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints.ACM Trans. Priv. Secur.1912:1-2:312016Journal Articlesclosedjournals/tissec/MitropoulosSSK1610.1145/2939374https://doi.org/10.1145/2939374https://dblp.org/rec/journals/tissec/MitropoulosSSK16URL#3184471Ismet OzalpMehmet Emre GursoyMehmet Ercan NergizYücel SayginPrivacy-Preserving Publishing of Hierarchical Data.ACM Trans. Priv. Secur.1937:1-7:292016Journal Articlesclosedjournals/tissec/OzalpGNS1610.1145/2976738https://doi.org/10.1145/2976738https://dblp.org/rec/journals/tissec/OzalpGNS16URL#3184472Babak RahbariniaRoberto PerdisciManos AntonakakisEfficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.ACM Trans. Priv. Secur.1924:1-4:312016Journal Articlesclosedjournals/tissec/RahbariniaPA1610.1145/2960409https://doi.org/10.1145/2960409https://dblp.org/rec/journals/tissec/RahbariniaPA16URL#3184473