default search action
17th PST 2019: Fredericton, NB, Canada
- 17th International Conference on Privacy, Security and Trust, PST 2019, Fredericton, NB, Canada, August 26-28, 2019. IEEE 2019, ISBN 978-1-7281-3265-5
- Ali Ghorbani:
Preface. 1 - Jessica Staddon, Noelle Easterday:
"it's a generally exhausting field" A Large-Scale Study of Security Incident Management Workflows and Pain Points. 1-12 - Kazuya Kakizaki, Kosuke Yoshida, Tsubasa Takahashi:
GlassMasq: Adversarial Examples Masquerading in Face Identification Systems with Feature Extractor. 1-7 - Batnyam Enkhtaivan, Takao Takenouchi, Kazue Sako:
A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain. 1-5 - Hemant Gupta, Paul C. van Oorschot:
Onboarding and Software Update Architecture for IoT Devices. 1-11 - Amit Maraj, Miguel Vargas Martin, Matthew Shane, Mohammad Mannan:
On the null relationship between personality types and passwords. 1-7 - Yu Wang, Reza Samavi, Nitin Sood:
Blockchain-based Marketplace for Software Testing. 1-3 - Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim, Jaeseung Song:
EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging. 1-5 - Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest. 1-3 - Eric Spero, Milica Stojmenovic, Zahra Hassanzadeh, Sonia Chiasson, Robert Biddle:
Mixed Pictures: Mental Models of Malware. 1-3 - Andrew Foresi, Reza Samavi:
User Authentication Using Keystroke Dynamics via Crowdsourcing. 1-3 - Babins Shrestha, Manar Mohamed, Nitesh Saxena:
ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics. 1-10 - Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari:
Geographic Hints for Passphrase Authentication. 1-9 - Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
On Embedding Backdoor in Malware Detectors Using Machine Learning. 1-5 - Timothy A. Chadza, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan:
Contemporary Sequential Network Attacks Prediction using Hidden Markov Model. 1-3 - Munir Geden, Kasper Rasmussen:
Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems. 1-10 - May Almousa, Mohd Anwar:
Detecting Exploit Websites Using Browser-based Predictive Analytics. 1-3 - Sophie Le Page, Guy-Vincent Jourdan:
Victim or Attacker? A Multi-dataset Domain Classification of Phishing Attacks. 1-10 - Jafar Haadi Jafarian, Kuntal Das:
A Novel Permutational Sampling Technique for Cooperative Network Scanning. 1-6 - Jimmy Tekli, Bechara al Bouna, Raphaël Couturier, Gilbert Tekli, Zeinab al Zein, Marc Kamradt:
A Framework for Evaluating Image Obfuscation under Deep Learning-Assisted Privacy Attacks. 1-10 - Yomna Abdelaziz, Daniela Napoli, Sonia Chiasson:
End-Users and Service Providers: Trust and Distributed Responsibility for Account Security. 1-6 - Hamid Azimy, Ali A. Ghorbani:
Competitive Selfish Mining. 1-8 - Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Fabian Förg, Susanne Wetzel:
Privacy - Preserving Multi-Party Conditional Random Selection. 1-7 - Pouyan Momeni, Yu Wang, Reza Samavi:
Machine Learning Model for Smart Contracts Security Analysis. 1-6 - Duc-Phong Le, Guomin Yang, Ali A. Ghorbani:
A New Multisignature Scheme with Public Key Aggregation for Blockchain. 1-7 - Sultan S. Al-Qahtani, Juergen Rilling:
Semantic Modeling Approach for Software Vulnerabilities Data Sources. 1-7 - Milica Stojmenovic, Eric Spero, Temitayo Oyelowo, Robert Biddle:
Website Identity Notification: Testing the Simplest Thing That Could Possibly Work. 1-7 - Jason Chang, Rongxing Lu:
Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application to Genomic Data. 1-9 - Sultan S. Al-Qahtani:
Automated Extraction of Security Concerns from Bug Reports. 1-3 - Lalitha Muthu Subramanian, Guruprasad Eswaraiah, Roopa Vishwanathan:
Rebalancing in Acyclic Payment Networks. 1-5 - Matthew Hagan, Fahad Siddiqui, Sakir Sezer:
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies. 1-5 - S. Abhishek Anand, Payton Walker, Nitesh Saxena:
Compromising Speech Privacy under Continuous Masking in Personal Spaces. 1-10 - Elahe Fazeldehkordi, Olaf Owe, Josef Noll:
Security and Privacy Functionalities in IoT. 1-12 - Guruprasad Eswaraiah, Lalitha Muthu Subramanian, Roopa Vishwanathan:
Exploring Automation in Proofs of Attribute-based Encryption in the Standard Model. 1-5 - Zakery Fyke, Isaac Griswold-Steiner, Abdul Serwadda:
Prying into Private Spaces Using Mobile Device Motion Sensors. 1-10 - Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra:
Model Checking the IKEv2 Protocol Using Spin. 1-7 - Christopher Bellman, Paul C. van Oorschot:
Analysis, Implications, and Challenges of an Evolving Consumer IoT Security Landscape. 1-7 - David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach. 1-3 - Xue Bai, Licheng Wang, Lijing Zhou, Sijia Yang, Lixiang Li:
RZcash: A Privacy Protection Scheme for the Account-based Blockchain. 1-9 - Ajaya Neupane, Kiavash Satvat, Mahshid Hosseini, Nitesh Saxena:
Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information. 1-10 - Alaadin Addas, Amirali Salehi-Abari, Julie Thorpe:
Geographical Security Questions for Fallback Authentication. 1-6 - Xin Yang, Lei Shi:
Ari: a P2P optimization for blockchain systems. 1-6 - Meriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria:
Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network. 1-5 - Liang Xue, Jianbing Ni, Cheng Huang, Xiaodong Lin, Xuemin Sherman Shen:
Forward Secure and Fine-grained Data Sharing for Mobile Crowdsensing. 1-9 - Jehyun Lee, Akshaya Venkateswara Raja, Debin Gao:
SplitSecond: Flexible Privilege Separation of Android Apps. 1-10 - Maliheh Shirvanian, Nitesh Saxena:
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations. 1-10 - Khalid T. Mursi, Yu Zhuang, Mohammed Saeed Alkatheiri, Ahmad O. Aseeri:
Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices. 1-9 - Espen Kjellstadli Lund, Mariusz Nowostawski, Abylay Satybaldy, Nader Aeinehchi:
Privacy-preserving tax-case processing. 1-10 - Iago Sestrem Ochôa, Leonardo Calbusch, Karize Viecelli, Juan F. De Paz, Valderi R. Q. Leithardt, Cesar A. Zeferino:
Privacy in the Internet of Things: A Study to Protect User's Data in LPR Systems Using Blockchain. 1-5 - Xiaoya Hu, Licheng Wang, Lijing Zhou, Lixiang Li, Sijia Yang:
A blockchain-based loan over-prevention mechanism. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.