ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2013 Eleventh Annual Conference on Privacy, Security and Trust
Latest Publications
TOTAL DOCUMENTS
57
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
9781467358392
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Socio-technical formal analysis of TLS certificate validation in modern browsers
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596067
◽
2013
◽
Cited By ~ 7
Author(s):
Giampaolo Bella
◽
Rosario Giustolisi
◽
Gabriele Lenzini
Keyword(s):
Formal Analysis
Download Full-text
Differential privacy via t-closeness in data publishing
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596033
◽
2013
◽
Cited By ~ 15
Author(s):
Jordi Soria-Comas
◽
Josep Domingo-Ferrert
Keyword(s):
Differential Privacy
◽
Data Publishing
Download Full-text
Improving security of virtual machines during live migrations
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596088
◽
2013
◽
Cited By ~ 7
Author(s):
Sebastian Biedermann
◽
Martin Zittel
◽
Stefan Katzenbeisser
Keyword(s):
Virtual Machines
Download Full-text
How people care about their personal data released on social media
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596044
◽
2013
◽
Cited By ~ 5
Author(s):
Kellyton dos Santos Brito
◽
Frederico Araujo Durao
◽
Vinicius Cardoso Garcia
◽
Silvio Romero de Lemos Meira
Keyword(s):
Social Media
◽
Personal Data
Download Full-text
A self-adaptive classification for the dissociating privacy agent
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596035
◽
2013
◽
Cited By ~ 3
Author(s):
Marc Juarez
◽
Vicenc Torra
Keyword(s):
Adaptive Classification
◽
Self Adaptive
Download Full-text
Encouraging second thoughts: Obstructive user interfaces for raising security awareness
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596092
◽
2013
◽
Cited By ~ 6
Author(s):
Tim Storer
◽
Stephen Marsh
◽
Sylvie Noel
◽
Babak Esfandiari
◽
Khalil El-Khatib
◽
...
Keyword(s):
User Interfaces
◽
Security Awareness
Download Full-text
An efficient and provably-secure coercion-resistant e-voting protocol
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596050
◽
2013
◽
Cited By ~ 1
Author(s):
Alireza Toroghi Haghighat
◽
Mohammad Sadeq Dousti
◽
Rasool Jalili
Keyword(s):
Provably Secure
Download Full-text
Traceability analysis of quadratic residue-based RFID authentication protocols
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596037
◽
2013
◽
Cited By ~ 6
Author(s):
Zahra Sohrabi-Bonab
◽
Mahdi R. Alagheband
◽
Mohammad Reza Aref
Keyword(s):
Quadratic Residue
◽
Authentication Protocols
◽
Traceability Analysis
◽
Rfid Authentication Protocols
Download Full-text
Communicating trustworthiness using radar graphs: A detailed look
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596085
◽
2013
◽
Cited By ~ 4
Author(s):
Jason R. C. Nurse
◽
Ioannis Agrafiotis
◽
Sadie Creese
◽
Michael Goldsmith
◽
Koen Lamberts
Download Full-text
Real-time malicious fast-flux detection using DNS and bot related features
2013 Eleventh Annual Conference on Privacy, Security and Trust
◽
10.1109/pst.2013.6596093
◽
2013
◽
Cited By ~ 9
Author(s):
Sergi Martinez-Bea
◽
Sergio Castillo-Perez
◽
Joaquin Garcia-Alfaro
Keyword(s):
Real Time
◽
Fast Flux
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close