Default Cover Image

2010 Eighth International Conference on Privacy, Security and Trust

Aug. 17 2010 to Aug. 19 2010

Ottawa, ON Canada

ISBN: 978-1-4244-7551-3

Table of Contents

Technical programFreely available from IEEE.pp. 1-5
Transaction signing in applications using identity federationFull-text access may be available. Sign in or learn about subscription options.pp. 144-149
Analysis of Privacy Impact Assessments within Major jurisdictionsFull-text access may be available. Sign in or learn about subscription options.pp. 118-125
Trust-aware monitoring scheme for WiMAX networksFull-text access may be available. Sign in or learn about subscription options.pp. 88-95
Keystroke dynamics: Characteristics and opportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 205-212
The relationship of trust, demand, and utility: Be more trustworthy, then i will buy moreFull-text access may be available. Sign in or learn about subscription options.pp. 72-79
A new perspective of privacy protection: Unique distinct l-SR diversityFull-text access may be available. Sign in or learn about subscription options.pp. 110-117
On achieving a digital identity management system with support for non-transferabilityFull-text access may be available. Sign in or learn about subscription options.pp. 150-159
You are the key: Generating cryptographic keys from voice biometricsFull-text access may be available. Sign in or learn about subscription options.pp. 213-222
Social networks for health care: Addressing regulatory gaps with privacy-by-designFull-text access may be available. Sign in or learn about subscription options.pp. 134-143
Guessing click-based graphical passwords by eye trackingFull-text access may be available. Sign in or learn about subscription options.pp. 197-204
A model-driven penetration test framework for Web applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 173-180
Design of distributed security architecture for multihop WiMAX networksFull-text access may be available. Sign in or learn about subscription options.pp. 54-61
Risk analysis in access control systemsFull-text access may be available. Sign in or learn about subscription options.pp. 160-166
Efficient privacy preserving reputation protocols inspired by secure sumFull-text access may be available. Sign in or learn about subscription options.pp. 126-133
Security of Error Correcting Code for biometric EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 231-235
Achieving critical infrastructure protection through the interaction of computer security and network forensicsFull-text access may be available. Sign in or learn about subscription options.pp. 23-30
Security advances and challenges in 4G wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 62-71
Lightweight protection against brute force login attacks on Web applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 181-188
Co-located Physical-Layer Network Coding to mitigate passive eavesdroppingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
On the analysis of the Zeus botnet crimeware toolkitFull-text access may be available. Sign in or learn about subscription options.pp. 31-38
Method ontology for intelligent network forensics analysisFull-text access may be available. Sign in or learn about subscription options.pp. 7-14
On the representation and verification of cryptographic protocols in a theory of actionFull-text access may be available. Sign in or learn about subscription options.pp. 39-45
Secure architecture for RFID enabled supply chain hierarchyFull-text access may be available. Sign in or learn about subscription options.pp. 167-172
Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 80-87
Ray - a secure micro kernel architectureFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
New approach for the dynamic enforcement of Web services securityFull-text access may be available. Sign in or learn about subscription options.pp. 189-196
J3: High payload histogram neutral JPEG steganographyFull-text access may be available. Sign in or learn about subscription options.pp. 46-53
Vampire bats: Trust in PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 96-102
Showing 32 out of 32