ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 Twelfth Annual International Conference on Privacy, Security and Trust
Latest Publications
TOTAL DOCUMENTS
61
(FIVE YEARS 0)
H-INDEX
10
(FIVE YEARS 0)
Published By IEEE
9781479935031, 9781479935024
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Another free app: Does it have the right intentions?
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890950
◽
2014
◽
Cited By ~ 5
Author(s):
Mohamed Fazeen
◽
Ram Dantu
Keyword(s):
The Right
Download Full-text
Desperately seeking assurances: Segmenting users by their information-seeking preferences
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890929
◽
2014
◽
Cited By ~ 14
Author(s):
Anthony Morton
◽
M. Angela Sasse
Keyword(s):
Information Seeking
Download Full-text
Automata-based approach to design and analyze security policies
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890953
◽
2014
◽
Cited By ~ 6
Author(s):
Wadie Krombi
◽
Mohammed Erradi
◽
Ahmed Khoumsi
Keyword(s):
Security Policies
Download Full-text
Inferring social relationships from technology-level device connections
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890922
◽
2014
◽
Cited By ~ 6
Author(s):
Jason R. C. Nurse
◽
Jess Pumphrey
◽
Thomas Gibson-Robinson
◽
Michael Goldsmith
◽
Sadie Creese
Keyword(s):
Social Relationships
◽
Technology Level
Download Full-text
Author index
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890971
◽
2014
◽
Download Full-text
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890923
◽
2014
◽
Cited By ~ 6
Author(s):
Yuuki Takano
◽
Satoshi Ohta
◽
Takeshi Takahashi
◽
Ruo Ando
◽
Tomoya Inoue
Keyword(s):
Third Party
◽
Visualization System
◽
Design And Implementation
Download Full-text
Secure exams despite malicious management
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890949
◽
2014
◽
Cited By ~ 2
Author(s):
Giampaolo Bella
◽
Rosario Giustolisi
◽
Gabriele Lenzini
Download Full-text
Undetectable communication: The Online Social Networks case
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890919
◽
2014
◽
Cited By ~ 5
Author(s):
Filipe Beato
◽
Emiliano De Cristofaro
◽
Kasper B. Rasmussen
Keyword(s):
Social Networks
◽
Online Social Networks
Download Full-text
A study of mnemonic image passwords
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890941
◽
2014
◽
Cited By ~ 1
Author(s):
Soumyadeb Chowdhury
◽
Ron Poet
◽
Lewis Mackenzie
Download Full-text
Quantifying the financial impact of it security breaches on business processes
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890934
◽
2014
◽
Cited By ~ 1
Author(s):
Clemens Martin
◽
Amina Kadry
◽
Ghada Abu-Shady
Keyword(s):
Business Processes
◽
Financial Impact
◽
It Security
◽
Security Breaches
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close