wikidata.org
Conference on Privacy, Security and Trust
container_zb4rq5sfzzczvgii5ae2373dhq
Example Publications
Undetectable communication: The Online Social Networks case
Filipe Beato, Emiliano De Cristofaro, Kasper B. Rasmussen
2014
|
Conference on Privacy, Security and Trust
doi:10.1109/pst.2014.6890919 dblp:conf/pst/BeatoCR14
WhACKY! - What anyone could know about you from Twitter
Denzil Correa, Ashish Sureka, Raghav Sethi
2012
|
Conference on Privacy, Security and Trust
doi:10.1109/pst.2012.6297918 dblp:conf/pst/CorreaSS12
Out of sight, out of mind: Effects of displaying access-control information near the item it controls
Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter
2012
|
Conference on Privacy, Security and Trust
doi:10.1109/pst.2012.6297929 dblp:conf/pst/VanieaBCR12
Investigating Two Different Approaches for Encrypted Traffic Classification
Riyad Alshammari, A. Nur Zincir-Heywood
2008
|
Conference on Privacy, Security and Trust
doi:10.1109/pst.2008.15 dblp:conf/pst/AlshammariZ08
A provenance-based access control model
Jaehong Park, Dang Nguyen, Ravi Sandhu
2012
|
Conference on Privacy, Security and Trust
doi:10.1109/pst.2012.6297930 dblp:conf/pst/ParkNS12