The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Privacy, Security and Trust (pst)
2004 (conf/pst/2004)

  1. Ali Grami, Bernadette Schell
    Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:1-14 [Conf]
  2. Milena M. Head, Khaled Hassanein
    Building Online Trust through Socially Rich Web Interfaces. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:15-22 [Conf]
  3. Jie Zhang, Ali A. Ghorbani
    Familiarity and Trust: Measuring Familiarity with a Web Site. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:23-28 [Conf]
  4. Anna Shubina, Sean Smith
    Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:29-39 [Conf]
  5. Tim Storer, Ishbel Duncan
    Practical Remote Electronic Elections for the UK. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:41-45 [Conf]
  6. Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen
    Combating Spam with TEA. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:47-58 [Conf]
  7. Lori Kettel, Christopher A. Brooks, Jim E. Greer
    Supporting Privacy in E-Learning with Semantic Streams. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:59-67 [Conf]
  8. Mohammad Mannan, Paul C. van Oorschot
    Secure Public Instant Messaging. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:69-77 [Conf]
  9. Scott Buffett, Nathan Scott, Bruce Spencer, Michael Richter, Michael W. Fleming
    Determining Internet Users' Values for Private Information. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:79-88 [Conf]
  10. Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen
    Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:89-101 [Conf]
  11. Brian R. Richardson, Jim E. Greer
    An Architecture for Identity Management (August 2004). [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:103-108 [Conf]
  12. Terry Roebuck
    A Diagrammatical Framework for Information Systems Attacks. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:109-117 [Conf]
  13. Panayiotis Periorellis, Christopher J. W. Townson, Philip English
    Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:119-130 [Conf]
  14. Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba
    Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:131-136 [Conf]
  15. Evelien van de Garde-Perik, Boris E. R. de Ruyter, Panos Markopoulos, Berry Eggen
    The Sensitivities of User Profile Information in Music Recommender Systems. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:137-141 [Conf]
  16. Bastin Tony Roy Savarimuthu, Martin K. Purvis, Marcos De Oliveira, Maryam Purvis
    Towards secure interaction in agent societies. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:143-148 [Conf]
  17. Stephen Marsh
    infoDNA (Version 2) Agent Enhanced Trustworthy Distributed Information. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:149-153 [Conf]
  18. Oded Tal, Scott Knight, Tom Dean
    Syntax-based Vulnerability Testing of Frame-based Network Protocols. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:155-160 [Conf]
  19. Alexandre Lacasse, Mohamed Mejri, Béchir Ktari
    Formal Implementation of Network Security Policies. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:161-166 [Conf]
  20. Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
    A novel visualization technique for network anomaly detection. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:167-174 [Conf]
  21. Mathieu Couture, Béchir Ktari, Mohamed Mejri, Frédéric Massicotte
    A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:175-179 [Conf]
  22. Mehdi Shajari, Ali A. Ghorbani
    Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:181-191 [Conf]
  23. Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan
    Detection of New Malicious Code Using N-grams Signatures. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:193-196 [Conf]
  24. Nabil Seddigh, Peter Pieda, Ashraf Matrawy, Biswajit Nandy, Ioannis Lambadaris, Adam Hatfield
    Current Trends and Advances in Information Assurance Metrics. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:197-205 [Conf]
  25. Marc Branchaud, Scott Flinn
    xTrust: A Scalable Trust Management Infrastructure. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:207-218 [Conf]
  26. Deholo Nali, Ali Miri, Carlisle M. Adams
    Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:219-223 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002