


default search action
19th PST 2022: Fredericton, NB, Canada
- 19th Annual International Conference on Privacy, Security & Trust, PST 2022, Fredericton, NB, Canada, August 22-24, 2022. IEEE 2022, ISBN 978-1-6654-7398-9

- Saul Hughes, Sana Maqsood:

Usability of Paper Audit Trails in Electronic Voting Machines. 1-10 - Jacob Krabbe Pedersen, Mikkel Bøchman, Weizhi Meng

:
Security Analysis in Satellite Communication based on Geostationary Orbit. 1-10 - Shaveta Dandyan, Habib Louafi, Samira Sadaoui:

A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces. 1-11 - Khosro Salmani:

An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward Privacy. 1-10 - Xueqin Gao, Tao Shang, Da Li, Jianwei Liu:

Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree. 1-5 - Sajjad Dadkhah

, Hassan Mahdikhani, Priscilla Kyei Danso
, Alireza Zohourian, Kevin Anh Truong, Ali A. Ghorbani:
Towards the Development of a Realistic Multidimensional IoT Profiling Dataset. 1-11 - Kun Peng:

Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An Improvement to Secure MPC Application. 1-8 - Malte Breuer, Pascal Hein, Leonardo Pompe, Ben Temme, Ulrike Meyer, Susanne Wetzel:

Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming. 1-10 - Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy:

LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach. 1-10 - Jasmin Kaur, Rozita Dara, Ritu Chaturvedi:

A Semantic-based Approach to Reduce the Reading Time of Privacy Policies. 1-10 - Huang Lin:

Faceless: A Cross-Platform Private Payment scheme for Human-Readable Identifiers. 1-10 - Weifeng Xu, Dianxiang Xu:

Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs. 1-10 - Xichen Zhang, Songnian Zhang, Suprio Ray, Ali A. Ghorbani:

Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories. 1-8 - Laurens D'hooge

, Miel Verkerken
, Tim Wauters, Bruno Volckaert, Filip De Turck:
Discovering Non-Metadata Contaminant Features in Intrusion Detection Datasets. 1-11 - Shalini Saini

, Dhiral Panjwani, Nitesh Saxena:
Mobile Mental Health Apps: Alternative Intervention or Intrusion? 1-11 - Hiroaki Kikuchi, Shun Miyoshi, Takafumi Mori, Andres Hernandez-Matamoros:

A Vulnerability in Video Anonymization - Privacy Disclosure from Face-obfuscated video. 1-10 - Andrick Adhikari, Sanchari Das, Rinku Dewri:

Privacy Policy Analysis with Sentence Classification. 1-10 - Mordechai Guri:

SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables. 1-10 - Chuhan Liu, Wei Yan, Fengkai Xu, Wenlong Yang, Beibei Li

:
User Behavior Simulation in ICS Cyber Ranges. 1-5 - Kacem Khaled, Gabriela Nicolescu, Felipe Göhring de Magalhães:

Careful What You Wish For: on the Extraction of Adversarially Trained Models. 1-10 - Yiming Sun, Weizhi Meng

, Wenjuan Li:
Designing In-Air Hand Gesture-based User Authentication System via Convex Hull. 1-5 - Nastaran Bateni, Jasmin Kaur, Rozita Dara, Fei Song:

Content Analysis of Privacy Policies Before and After GDPR. 1-9 - Euclides Carlos Pinto Neto, Sajjad Dadkhah

, Ali A. Ghorbani:
Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning. 1-10 - Suyang Wang

, Bo Yin, Shuai Zhang, Yu Cheng:
An Analytical Study of Selfish Mining Attacks on Chainweb Blockchain. 1-10 - Chengzhe Lai, Yinzhen Wang:

Achieving Efficient and Secure Query in Blockchain-based Traceability Systems. 1-5 - Tariq Bontekoe

, Maarten H. Everts, Andreas Peter:
Balancing privacy and accountability in digital payment methods using zk-SNARKs. 1-10 - Xiaodong Qu, Qinglei Kong, Feng Yin, Leixi Xu:

A Secure and Privacy-Preserving Dynamic Aggregation Mechanism for V2G System. 1-7 - Wentao Wang, Yuxuan Jin, Bin Cao:

An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data. 1-10 - Cagri Arisoy

, Anuradha Mandal, Nitesh Saxena:
Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility. 1-12 - Ahmed Ghanem, Riham AlTawy:

Garage Door Openers: A Rolling Code Protocol Case Study. 1-6 - Trent Muhr, Wensheng Zhang:

Privacy-Preserving Detection of Poisoning Attacks in Federated Learning. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














