The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Privacy, Security and Trust (pst)
2008 (conf/pst/2008)


  1. An Effective Defense against Intrusive Web Advertising. [Citation Graph (, )][DBLP]


  2. OpenHouse: A Secure Platform for Distributed Home Services. [Citation Graph (, )][DBLP]


  3. An Access Control Scheme for Protecting Personal Data. [Citation Graph (, )][DBLP]


  4. A Multiple-Control Fuzzy Vault. [Citation Graph (, )][DBLP]


  5. Unlinkable Communication. [Citation Graph (, )][DBLP]


  6. Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. [Citation Graph (, )][DBLP]


  7. Confidence-Compensating Privacy Protection. [Citation Graph (, )][DBLP]


  8. IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter? [Citation Graph (, )][DBLP]


  9. Cross-Language Weaving Approach Targeting Software Security Hardening. [Citation Graph (, )][DBLP]


  10. LogView: Visualizing Event Log Clusters. [Citation Graph (, )][DBLP]


  11. Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  12. Encoding the Program Correctness Proofs as Programs in PCC Technology. [Citation Graph (, )][DBLP]


  13. Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. [Citation Graph (, )][DBLP]


  14. The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems. [Citation Graph (, )][DBLP]


  15. An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes. [Citation Graph (, )][DBLP]


  16. Investigating Two Different Approaches for Encrypted Traffic Classification. [Citation Graph (, )][DBLP]


  17. CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. [Citation Graph (, )][DBLP]


  18. The Uncertainty of the Truth. [Citation Graph (, )][DBLP]


  19. A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems. [Citation Graph (, )][DBLP]


  20. AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System. [Citation Graph (, )][DBLP]


  21. Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? [Citation Graph (, )][DBLP]


  22. Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. [Citation Graph (, )][DBLP]


  23. Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks. [Citation Graph (, )][DBLP]


  24. Private and Cheating-Free Outsourcing of Algebraic Computations. [Citation Graph (, )][DBLP]


  25. A Protocol for Building Secure and Reliable Covert Channel. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002