


default search action
PST 2008: Fredericton, New Brunswick, Canada
- Larry Korba, Stephen Marsh, Reihaneh Safavi-Naini:

Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada. IEEE Computer Society 2008, ISBN 978-0-7695-3390-2
Security
- Viktor Krammer:

An Effective Defense against Intrusive Web Advertising. 3-14 - Jani Suomalainen

, Seamus Moloney, Juha Koivisto, Kari Keinänen:
OpenHouse: A Secure Platform for Distributed Home Services. 15-23 - Wilfred Villegas, Bader Ali

, Muthucumaru Maheswaran:
An Access Control Scheme for Protecting Personal Data. 24-35 - Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles

:
A Multiple-Control Fuzzy Vault. 36-47
Privacy
- Volker Fusenig, Eugen Staab

, Uli Sorger, Thomas Engel:
Unlinkable Communication. 51-55 - Kamil Reddy, H. S. Venter

, Martin S. Olivier
, Iain Currie:
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. 56-64 - Piotr Cofta:

Confidence-Compensating Privacy Protection. 65-74 - Princely Ifinedo:

IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter? 75-84
Security
- Azzam Mourad

, Dima Alhadidi, Mourad Debbabi
:
Cross-Language Weaving Approach Targeting Software Security Hardening. 87-98 - Adetokunbo Makanju, Stephen Brooks, Nur Zincir-Heywood

, Evangelos E. Milios
:
LogView: Visualizing Event Log Clusters. 99-108 - S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan:

Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. 109-120 - Heidar Pirzadeh, Danny Dubé:

Encoding the Program Correctness Proofs as Programs in PCC Technology. 121-132 - Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi

:
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. 133-142
Trust
- Farag Azzedin

, Ahmad Ridha
:
The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems. 145-150 - Nathan Lewis, Noria Foukia:

An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes. 151-155 - Riyad Alshammari, Nur Zincir-Heywood

:
Investigating Two Different Approaches for Encrypted Traffic Classification. 156-166 - Sheikh Iqbal Ahamed, Mehrab Monjur, Mohammad Saiful Islam:

CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. 167-174
Trust and Security
- Michel Deriaz:

The Uncertainty of the Truth. 177-188 - Jie Zhang, Murat Sensoy

, Robin Cohen:
A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems. 189-200 - Apurva Mohan, Douglas M. Blough:

AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System. 201-212 - Hilmi Günes Kayacik, Nur Zincir-Heywood:

Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? 213-223
Privacy
- Michal Sramka

, Reihaneh Safavi-Naini, Jörg Denzinger
, Mina Askari, Jie Gao:
Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. 227-231 - Ed Brown, Tracy Ann Kosa:

Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks. 232-239 - David Benjamin, Mikhail J. Atallah:

Private and Cheating-Free Outsourcing of Algebraic Computations. 240-245 - Baishakhi Ray, Shivakant Mishra:

A Protocol for Building Secure and Reliable Covert Channel. 246-253

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














