Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PST
PST 2015
Generate Citations
2015 13th Annual Conference on Privacy, Security and Trust (PST)
July 21 2015 to July 23 2015
Izmir, Turkey
Table of Contents
Table of contents
Freely available from IEEE.
pp. 1-2
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Per Hallgren
,
Martin Ochoa
,
Andrei Sabelfeld
Recommendation of categories in an agents world: The role of (not) local communicative environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-13
by
Rino Falcone
,
Alessandro Sapienza
,
Cristiano Castelfranchi
Zipf distribution model for quantifying risk of re-identification from trajectory data
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-21
by
Hiroaki Kikuchi
,
Katsumi Takahashi
Who manages the manager? Identity management and user ownership in the age of data
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-27
by
Jonas Breuer
,
Heritiana Ranaivoson
,
Uschi Buchinger
,
Pieter Ballon
Disclosure risk assessment via record linkage by a maximum-knowledge attacker
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-35
by
Josep Domingo-Ferrer
,
Sara Ricci
,
Jordi Soria-Comas
Privacy preserving business process matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-43
by
Dilian Gurov
,
Peeter Laud
,
Roberto Guanciale
Privacy-preserving conditional random selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-53
by
Stefan Wuller
,
Ulrike Meyer
,
Fabian Forg
,
Susanne Wetzel
Laplace noise generation for two-party computational differential privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-61
by
Balamurugan Anandan
,
Chris Clifton
A framework for a privacy-aware feature selection evaluation measure
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-69
by
Yasser Jafer
,
Stan Matwin
,
Marina Sokolova
An adaptive algorithm for multivariate data-oriented microaggregation
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-76
by
Balkis Abidi
,
Sadok Ben Yahia
Is privacy a human right? An empirical examination in a global context
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-84
by
Hsiao-Ying Huang
,
Masooda Bashir
Towards automatic real time identification of malicious posts on Facebook
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-92
by
Prateek Dewan
,
Ponnurangam Kumaraguru
What they do in shadows: Twitter underground follower market
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-100
by
Anupama Aggarwal
,
Ponnurangam Kumaraguru
Revealing the relationship network behind link spam
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-108
by
Apostolis Zarras
,
Antonis Papadogiannakis
,
Sotiris Ioannidis
,
Thorsten Holz
A secure revocable personal health record system with policy-based fine-grained access control
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-116
by
Mitu Kumar Debnath
,
Saeed Samet
,
Krishnamurthy Vidyasankar
An efficient ID-based message recoverable privacy-preserving auditing scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-124
by
Mehmet Sabir Kiraz
,
Isa Sertkaya
,
Osmanbey Uzunkol
An access control model for protecting provenance graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-132
by
Liang Chen
,
Peter Edwards
,
John D. Nelson
,
Timothy J. Norman
ECA rules for controlling authorisation plan to satisfy dynamic constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-138
by
Meriam Jemel
,
Nadia Ben Azzouna
,
Khaled Ghedira
Devil in a box: Installing backdoors in electronic door locks
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-144
by
Seongyeol Oh
,
Joon-Sung Yang
,
Andrea Bianchi
,
Hyoungshick Kim
Embedded systems security: Threats, vulnerabilities, and attack taxonomy
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-152
by
Dorottya Papp
,
Zhendong Ma
,
Levente Buttyan
Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-156
by
Tiago Vanderlei de Arruda
,
Yeda Regina Venturini
,
Tiemi Christine Sakata
Real-time signature-based detection approach for SMS botnet
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-164
by
Abdullah J. Alzahrani
,
Ali A. Ghorbani
Network security supported by arguments
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-172
by
Fabio Martinelli
,
Francesco Santini
,
Artsiom Yautsiukhin
Keyboard or keylogger?: A security analysis of third-party keyboards on Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-176
by
Junsung Cho
,
Geumhwan Cho
,
Hyoungshick Kim
A model for calculating user-identity trustworthiness in online transactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-185
by
Brian Soeder
,
K. Suzanne Barber
Physical trust-based persistent authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-190
by
Masahiro Fujita
,
Christian D. Jensen
,
Shiori Arimura
,
Yuki Ikeya
,
Masakatsu Nishigaki
Minimizing transitive trust threats in software management systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-198
by
Jaap Boender
,
Giuseppe Primiero
,
Franco Raimondi
Author index
Freely available from IEEE.
pp. 199-199
Showing 29 out of 29