Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PST
PST 2018
Generate Citations
2018 16th Annual Conference on Privacy, Security and Trust (PST)
Aug. 28 2018 to Aug. 30 2018
Belfast, Ireland
Table of Contents
PST 2018 Copyright Page
Freely available from IEEE.
pp. i-i
PST 2018 TOC
Freely available from IEEE.
pp. i-v
PST 2018 Welcome Message
Freely available from IEEE.
pp. i-ii
PST 2018 Organizers
Freely available from IEEE.
pp. i-vii
PST 2018 Keynote Speakers
Full-text access may be available. Sign in or learn about subscription options.
pp. i-iii
At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Nicolás E. Díaz Ferreyra
,
Rene Meis
,
Maritta Heisel
Enabling Users to Balance Social Benefit and Privacy in Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Sourya Joyee De
,
Abdessamad Imine
Privacy-Preserving Architectures with Probabilistic Guaranties
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
-10

by
Kai Bavendiek
,
Robin Adams
,
Sibylle Schupp
Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online Shopping
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ghada El Haddad
,
Amin Shahab
,
Esma Aïmeur
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Tomoaki Mimoto
,
Shinsaku Kiyomoto
,
Seira Hidano
,
Anirban Basu
,
Atsuko Miyaji
Location Privacy and Utility in Geo-social Networks: Survey and Research Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Zohaib Riaz
,
Frank Dürr
,
Kurt Rothermel
Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ibrahim Lazrig
,
Toan C. Ong
,
Indrajit Ray
,
Indrakshi Ray
,
Xiaoqian Jiang
,
Jaideep Vaidya
Approximating Robust Linear Regression With An Integral Privacy Guarantee
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Navoda Senavirathne
,
Vicenc Torra
On Sybil Classification in Online Social Networks Using Only Structural Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Dieudonne Mulamba
,
Indrajit Ray
,
Indrakshi Ray
Crossing Cross-Domain Paths in the Current Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jukka Ruohonen
,
Joonas Salovaara
,
Ville Leppänen
How-to Express Explicit and Auditable Consent
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ana C. Carvalho
,
Rolando Martins
,
Luís Antunes
Privacy-Preserving Subgraph Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Stefan Wuller
,
Benjamin Assadsolimani
,
Ulrike Meyer
,
Susanne Wetzel
CHARIOT: Cloud-Assisted Access Control for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Clémentine Gritti
,
Melek Önen
,
Refik Molva
Parallel Linear Regression on Encrypted Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Toufique Morshed
,
Dima Alhadidi
,
Noman Mohammed
Analysis and Evaluation of Syntactic Privacy Notions and Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
-2

by
Robin Ankele
,
Andrew Simpson
Mitigating Client Subnet Leakage in DNS Queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Lanlan Pan
,
Xin Zhang
,
Anlei Hu
,
Xuebiao Yuchi
,
Jian Wang
Evaluation and Development of Onomatopoeia CAPTCHAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Michihiro Yamada
,
Riko Shigeno
,
Hiroaki Kikuchi
,
Maki Sakamoto
Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Soheil Varastehpour
,
Hamid Sharifzadeh
,
Iman Ardekani
,
Abdolhossein Sarrafzadeh
Towards Improving Privacy Control for Smart Homes: A Privacy Decision Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Mahsa Keshavarz
,
Mohd Anwar
Extended Abstract: Ethical and Privacy Considerations in Cybersecurity
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Brittany Davis
,
Christopher Whitfield
,
Mohd Anwar
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Kasper Rasmussen
,
Paolo Gasti
Exploring the Impact of Password Dataset Distribution on Guessing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hazel Murray
,
David Malone
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Lucky Onwuzurike
,
Mario Almeida
,
Enrico Mariconti
,
Jeremy Blackburn
,
Gianluca Stringhini
,
Emiliano De Cristofaro
Mining Sequential Patterns from Outsourced Data via Encryption Switching
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Gamze Tillem
,
Zekeriya Erkin
,
Reginald L. Lagendijk
Detecting Cryptomining Using Dynamic Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Domhnall Carlin
,
Philip O’Kane
,
Sakir Sezer
,
Jonah Burgess
Andro-Simnet: Android Malware Family Classification using Social Network Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hye Min Kim
,
Hyun Min Song
,
Jae Woo Seo
,
Huy Kang Kim
Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Gongxian Zeng
,
Meiqi He
,
Linru Zhang
,
Jun Zhang
,
Yuechen Chen
,
Siu Ming Yiu
Automated Proofs of Signatures using Bilinear Pairings
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Guruprasad Eswaraiah
,
Roopa Vishwanathan
,
Douglas Nedza
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Jeman Park
,
DaeHun Nyang
,
Aziz Mohaisen
Industry-Wide Analysis of Open Source Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yiming Zhang
,
Baljeet Malhotra
,
Cheng Chen
Unmasking Android Obfuscation Tools Using Spatial Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ratinder Kaur
,
Ye Ning
,
Hugo Gonzalez
,
Natalia Stakhanova
Managing Publicly Known Security Vulnerabilities in Software Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Hesham Mahrous
,
Baljeet Malhotra
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Rafiullah Khan
,
Kieran McLaughlin
,
John Hastings David Laverty
,
Hastings David
,
Sakir Sezer
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Mordechai Guri
,
Boris Zadov
,
Andrey Daidakulov
,
Yuval Elovici
Hide-and-Seek with Website Identity Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Milica Stojmenoviæ
,
Robert Biddle
Mitigating CSRF attacks on OAuth 2.0 Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Wanpeng Li
,
Chris J Mitchell
,
Thomas Chen
GIDS: GAN based Intrusion Detection System for In-Vehicle Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Eunbi Seo
,
Hyun Min Song
,
Huy Kang Kim
EagleEye: A Novel Visual Anomaly Detection Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Iman Sharafaldin
,
Ali A. Ghorbani
Using AP-TED to Detect Phishing Attack Variations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sophie Le Page
,
Gregor v. Bochmann
,
Qian Cui
,
Jason Flood
,
Guy-Vincent Jourdan
,
Iosif-Viorel Onut
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
William Aiken
,
Hyoungshick Kim
,
Jungwoo Ryoo
,
Mary Beth Rosson
Enforcing Privacy and Security in Public Cloud Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
João S. Resende
,
Rolando Martins
,
Lu's Antunes
A Power Analysis of Cryptocurrency Mining: A Mobile Device Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
James Clay
,
Alexander Hargrave
,
Ramalingam Sridhar
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Matthew Hagan
,
BooJoong Kang
,
Kieran McLaughlin
,
Sakir Sezer
Usability and Security Effects of Code Examples on Crypto APIs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Kai Mindermann
,
Stefan Wagner
Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Shin-Ying Huang
,
Tzu-Hsien Chuang
,
Shi-Meng Huang
,
Tao Ban
A Twofold Group Key Agreement Protocol for NoC based MPSoCs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Gaurav Sharma
,
Veronika Kuchta
,
Rajeev Anand Sahu
,
Soultana Ellinidou
,
Olivier Markowitch
,
Jean-Michel Dricot
Poster: Agent-based (BDI) modeling for automation of penetration testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Ge Chu
,
Alexei Lisitsa
Problem-based Derivation of Trustworthiness Requirements from Users’ Trust Concerns
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Nazila Gol Mohammadi
,
Nelufar Ulfat-Bunyadi
,
Maritta Heisel
Trust-driven, Decentralized Data Access Control for Open Network of Autonomous Data Providers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Łukasz Opioła
,
Łukasz Dutka
,
Renata G. Słota
,
Jacek Kitowski
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Nissy Sombatruang
,
Youki Kadobayashi
,
M. Angela Sasse
,
Michelle Baddeley
,
Daisuke Miyamoto
Digitized Trust in Human-in-the-Loop Health Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Andrew Sutton
,
Reza Samavi
,
Thomas E. Doyle
,
David Koff
Coalition-Resistant Peer Rating for Long-Term Confidentiality
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Giulia Traverso
,
Denis Butin
,
Johannes Buchmann
,
Alex Palesandro
Mutual Authentication in Electronic Voting Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Voke Augoye
,
Allan Tomlinson
Showing 58 out of 58