Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PST
PST 2010
Generate Citations
2010 Eighth International Conference on Privacy, Security and Trust
Aug. 17 2010 to Aug. 19 2010
Ottawa, ON Canada
ISBN: 978-1-4244-7551-3
Table of Contents
Technical program
Freely available from IEEE.
pp. 1-5
Transaction signing in applications using identity federation
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-149
by
Paul Rabinovich
Analysis of Privacy Impact Assessments within Major jurisdictions
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-125
by
David Tancock
,
Siani Pearson
,
Andrew Charlesworth
Trust-aware monitoring scheme for WiMAX networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-95
by
Haidar Safa
,
Farah Abu Shahla
Keystroke dynamics: Characteristics and opportunities
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-212
by
Heather Crawford
Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-230
by
Bon K. Sy
,
Adam Ramirez
,
Arun P. Kumara Krishnan
The relationship of trust, demand, and utility: Be more trustworthy, then i will buy more
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-79
by
Amirali Salehi-Abari
,
Tony White
A new perspective of privacy protection: Unique distinct l-SR diversity
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-117
by
Yunli Wang
,
Yan Cui
,
Liqiang Geng
,
Hongyu Liu
On achieving a digital identity management system with support for non-transferability
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-159
by
Brent Carrara
,
Carlisle Adams
You are the key: Generating cryptographic keys from voice biometrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-222
by
Brent Carrara
,
Carlisle Adams
Social networks for health care: Addressing regulatory gaps with privacy-by-design
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-143
by
James B. Williams
,
Jens H. Weber-Jahnke
Guessing click-based graphical passwords by eye tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-204
by
Daniel LeBlanc
,
Alain Forget
,
Robert Biddle
A model-driven penetration test framework for Web applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-180
by
Pulei Xiong
,
Liam Peyton
Design of distributed security architecture for multihop WiMAX networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-61
by
Perumalraja Rengaraju
,
Chung-Horng Lung
,
Anand Srinivasan
Risk analysis in access control systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-166
by
J. Ma
,
K. Adi
,
M. Mejri
,
L. Logrippo
Efficient privacy preserving reputation protocols inspired by secure sum
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-133
by
Omar Hasan
,
Elisa Bertino
,
Lionel Brunie
Security of Error Correcting Code for biometric Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-235
by
Alex Stoianov
Achieving critical infrastructure protection through the interaction of computer security and network forensics
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-30
by
Ray Hunt
,
Jill Slay
Security advances and challenges in 4G wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-71
by
N. Seddigh
,
B. Nandy
,
R. Makkar
,
J.F. Beaumont
Lightweight protection against brute force login attacks on Web applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-188
by
Carlisle Adams
,
Guy-Vincent Jourdan
,
Jean-Pierre Levac
,
François Prevost
Detection, correlation, and visualization of attacks against critical infrastructure systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-22
by
Linda Briesemeister
,
Steven Cheung
,
Ulf Lindqvist
,
Alfonso Valdes
Co-located Physical-Layer Network Coding to mitigate passive eavesdropping
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Michael Hay
,
Basil Saeed
,
Chung-Horng Lung
,
Anand Srinivasan
On the analysis of the Zeus botnet crimeware toolkit
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-38
by
H. Binsalleeh
,
T. Ormerod
,
A. Boukhtouta
,
P. Sinha
,
A. Youssef
,
M. Debbabi
,
L. Wang
Method ontology for intelligent network forensics analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-14
by
Sherif Saad
,
Issa Traore
On the representation and verification of cryptographic protocols in a theory of action
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-45
by
James P. Delgrande
,
Aaron Hunter
,
Torsten Grote
Secure architecture for RFID enabled supply chain hierarchy
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-172
by
Nauman Abdullah Shah
,
M. Arif Wahla
Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-87
by
Sanat Kumar Bista
,
Keshav Dahal
,
Peter Cowling
,
Aziz Bouras
Ray - a secure micro kernel architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
by
Stefan Nürnberger
,
Thomas Feller
,
Sorin A. Huss
New approach for the dynamic enforcement of Web services security
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-196
by
Azzam Mourad
,
Sara Ayoubi
,
Hamdi Yahyaoui
,
Hadi Otrok
Towards a privacy preserving policy based infrastructure for social data access to enable scientific research
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-109
by
Palanivel Kodeswaran
,
Evelyne Viegas
J3: High payload histogram neutral JPEG steganography
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-53
by
Mahendra Kumar
,
Richard Newman
Vampire bats: Trust in Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-102
by
Tracy Ann Kosa
Showing 32 out of 32