Default Cover Image

2018 16th Annual Conference on Privacy, Security and Trust (PST)

Aug. 28 2018 to Aug. 30 2018

Belfast, Ireland

Table of Contents

PST 2018 Copyright PageFreely available from IEEE.pp. i-i
PST 2018 TOCFreely available from IEEE.pp. i-v
PST 2018 Welcome MessageFreely available from IEEE.pp. i-ii
PST 2018 OrganizersFreely available from IEEE.pp. i-vii
PST 2018 Keynote SpeakersFull-text access may be available. Sign in or learn about subscription options.pp. i-iii
At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosureFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Enabling Users to Balance Social Benefit and Privacy in Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Privacy-Preserving Architectures with Probabilistic GuarantiesFull-text access may be available. Sign in or learn about subscription options.pp. 1
-10

Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online ShoppingFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Location Privacy and Utility in Geo-social Networks: Survey and Research ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Approximating Robust Linear Regression With An Integral Privacy GuaranteeFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
On Sybil Classification in Online Social Networks Using Only Structural FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Crossing Cross-Domain Paths in the Current WebFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
How-to Express Explicit and Auditable ConsentFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Privacy-Preserving Subgraph CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
CHARIOT: Cloud-Assisted Access Control for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Parallel Linear Regression on Encrypted DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Analysis and Evaluation of Syntactic Privacy Notions and GamesFull-text access may be available. Sign in or learn about subscription options.pp. 1
-2

Mitigating Client Subnet Leakage in DNS QueriesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Evaluation and Development of Onomatopoeia CAPTCHAsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Towards Improving Privacy Control for Smart Homes: A Privacy Decision FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Extended Abstract: Ethical and Privacy Considerations in CybersecurityFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Weak and Strong Deniable Authenticated Encryption: On their Relationship and ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Exploring the Impact of Password Dataset Distribution on GuessingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Mining Sequential Patterns from Outsourced Data via Encryption SwitchingFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Detecting Cryptomining Using Dynamic AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Andro-Simnet: Android Malware Family Classification using Social Network AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Secure Compression and Pattern Matching Based on Burrows-Wheeler TransformFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Automated Proofs of Signatures using Bilinear PairingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Industry-Wide Analysis of Open Source SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Unmasking Android Obfuscation Tools Using Spatial AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Managing Publicly Known Security Vulnerabilities in Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Hide-and-Seek with Website Identity InformationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Mitigating CSRF attacks on OAuth 2.0 SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
GIDS: GAN based Intrusion Detection System for In-Vehicle NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
EagleEye: A Novel Visual Anomaly Detection MethodFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Using AP-TED to Detect Phishing Attack VariationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Enforcing Privacy and Security in Public Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Power Analysis of Cryptocurrency Mining: A Mobile Device PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Usability and Security Effects of Code Examples on Crypto APIsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Poster: Agent-based (BDI) modeling for automation of penetration testingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Problem-based Derivation of Trustworthiness Requirements from Users’ Trust ConcernsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Digitized Trust in Human-in-the-Loop Health ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Coalition-Resistant Peer Rating for Long-Term ConfidentialityFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Mutual Authentication in Electronic Voting SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Showing 58 out of 58