default search action
15th PST 2017: Calgary, AB, Canada
- 15th Annual Conference on Privacy, Security and Trust, PST 2017, Calgary, AB, Canada, August 28-30, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2487-6
Keynote
- David W. Kravitz:
Transaction Immutability and Reputation Traceability: Blockchain as a Platform for Access Controlled IoT and Human Interactivity. 3-14
Blockchain and Applications
- Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-Based Anonymous Physical Delivery System. 15-24 - Daniel Augot, Hervé Chabanne, Olivier Clémot, William George:
Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain. 25-34 - Gongxian Zeng, Siu-Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au:
A Nonoutsourceable Puzzle Under GHOST Rule. 35-43 - Yuan Liu, Zheng Zhao, Guibing Guo, Xingwei Wang, Zhenhua Tan, Shuang Wang:
An Identity Management System Based on Blockchain. 44-56
The Internet of Things
- Hyunsung Lee, Seong Hoon Jeong, Huy Kang Kim:
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. 57-66 - Subhojeet Mukherjee, Jacob Walker, Indrakshi Ray, Jeremy Daily:
A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks. 67-76 - Ali ElShakankiry, Thomas R. Dean:
Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols. 77-86 - Khaoula Es-Salhi, David Espes, Nora Cuppens:
A New Segmentation Method for Integrated ICS (Short Paper). 87-94
Data Privacy
- Doudalis Stylianos, Sharad Mehrotra:
SORTaki: A Framework to Integrate Sorting with Differential Private Histogramming Algorithms. 95-104 - Sébastien Canard, Baptiste Olivier, Tony Quertier:
Differentially Private Instance-Based Noise Mechanisms in Practice. 105-114 - Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes. 115-126
Authentication
- Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Christopher Bellman, Ramiro Liscano, Amit Maraj:
What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability. 127-136 - Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
System-Assigned Passwords You Can't Write Down, But Don't Need To. 137-146 - Mario Parreño Centeno, Aad van Moorsel, Stefano Castruccio:
Smartphone Continuous Authentication Using Deep Learning Autoencoders. 147-158
Best Paper Awards
- Karthik Sheshadri, Nirav Ajmeri, Jessica Staddon:
No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016. 159-168 - Abhinav Jangda, Mohit Mishra:
RandHeap: Heap Randomization for Mitigating Heap Spray Attacks in Virtual Machines. 169-180
Understanding Privacy
- Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things. 181-190 - Rebecca Cooper, Hala Assal, Sonia Chiasson:
Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper). 191-196 - Jeremy Martin, Dane Brown, Kris Merrion, Lamont Brown, Travis Mayberry:
How Much Privacy Does $3, 165 Buy You? 197-204
Security and Privacy in Multi-party Computation
- Stefan Wüller, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. 205-214 - Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt:
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. 215-224 - Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper). 225-232
Mobile Security
- Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Hugo Gonzalez, Kenneth Fon Mbah, Ali A. Ghorbani:
Towards a Network-Based Framework for Android Malware Detection and Characterization. 233-234 - Anastasia Skovoroda, Dennis Gamayunov:
Automated Static Analysis and Classification of Android Malware using Permission and API Calls Models. 243-252 - Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper). 253-258 - Akshaya Venkateswara Raja, Jehyun Lee, Debin Gao:
On Return Oriented Programming Threats in Android Runtime. 259-267 - Nurul Momen, Tobias Pulls, Lothar Fritsch, Stefan Lindskog:
How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper). 268-276
Cloud Computing and Encrypted Data
- Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann:
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper). 277-282 - Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey:
Running Compression Algorithms in the Encrypted Domain: A Case-Study on the Homomorphic Execution of RLE. 283-292 - Meiqi He, Jun Zhang, Gongxian Zeng, Siu-Ming Yiu:
A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database. 293-302 - Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey:
Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification. 303-310
Social Network
- Lydia Garms, Keith M. Martin, Siaw-Lynn Ng:
Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper). 311-316 - Yasushi Shinjo, Sota Naito, Xiao Kunyao, Akira Sato:
ABnews: A Fast Private Social Messaging System Using Untrusted Storage and Attribute-Based Encryption. 317-326 - Andrew Cortese, Amirreza Masoumzadeh:
Modeling Exposure in Online Social Networks. 327-336 - Anna Cinzia Squicciarini, Andrea Novelli, Dan Lin, Cornelia Caragea, Haoti Zhong:
From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing. 337-348
Applied Cryptography and Web Security
- Marc-André Laverdière, Ettore Merlo:
Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper). 349-354 - Apostolis Zarras, Federico Maggi:
Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks. 355-364 - Petr Dzurenda, Sara Ricci, Jan Hajny, Lukas Malina:
Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards. 365-374 - Ju-Sung Kang, Hojoong Park, Yongjin Yeom:
On the Additional Chi-Square Tests for the IID Assumption of NIST SP 800-90B. 375-384
Posters
- Shadan Ghaffaripour, Fadi Younis, Hoi Ting Poon, Ali Miri:
An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network. 385-387 - Andrew Bedford:
Information-Flow Control with Fading Labels. 388-390 - Bahman Sistany, Amy P. Felty:
A Certified Core Policy Language. 391-393 - Scott A. Thompson, Bharath K. Samanthula:
Optimized Secure Data Aggregation in Wireless Sensor Networks. 394-396 - Masoumeh Shafieinejad, Reihaneh Safavi-Naini:
A Post-Quantum One Time Signature Using Bloom Filter. 397-399 - Thomas P. Keenan:
Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems. 400-402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.