researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Alessandro Armando
Aliaksandr Lazouski
Ana Ferreira
Andrea Saracino
Audun Jøsang
Catherine Meadows
Charles Morisset
Deepak Garg
Fabio Martinelli
Gabriele Lenzini
Jason Crampton
Javier Lopez
José Meseguer
Mark Vella
Paolo Mori
Peeter Laud
Ravi Jhawar
Santiago Escobar
Silvio Ranise
Sjouke Mauw
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
authentication
control
data
detection
international
key
management
model
policies
privacy
proceedings
secure
security
september
stm
trust
using
workshop
Security and Trust Management (STM)
Editions
Publications
Viewing Publication 1 - 100 from 209
2023
Privacy-Preserving NN for IDS: A Study on the Impact of TFHE Restrictions
Ivone Amorim
,
Pedro Barbosa
,
Eva Maia
,
Isabel Praça
.
STM 2023
:
107-125
[doi]
Consent as Mechanism to Preserve Information Privacy: Its Origin, Evolution, and Current Relevance
Marietjie Botes
.
STM 2023
:
136-145
[doi]
'State of the Union': Evaluating Open Source Zero Trust Components
Tobias Hilbig
,
Thomas Schreck
,
Tobias Limmer
.
STM 2023
:
42-61
[doi]
Decentralized Global Trust Registry Platform for Trust Discovery and Verification of e-Health Credentials Using TRAIN: COVID-19 Certificate Use Case
Isaac Henderson Johnson Jeyakumar
,
John Walker
,
Heiko Roßnagel
.
STM 2023
:
95-104
[doi]
Biometric-Based Password Management
Pavel V. Kolesnichenko
,
Dmytro Progonov
,
Valentyna Cherniakova
,
Andriy Oliynyk
,
Oleksandra Sokol
.
STM 2023
:
23-41
[doi]
Security and Trust Management - 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings
Gabriele Lenzini
,
Weizhi Meng 0001
, editors,
Volume 13867 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things
Emiliia Nazarenko
,
Felix Klement
,
Eva Gründinger
,
Stefan Katzenbeisser 0001
.
STM 2023
:
65-84
[doi]
Impact of Consensus Protocols on the Efficiency of Registration and Authentication Process in Self-sovereign Identity
Lydia Ouaili
.
STM 2023
:
3-22
[doi]
Towards a Unified Abstract Architecture to Coherently and Generically Describe Security Goals and Risks of AI Systems
Henrich C. Pöhls
.
STM 2023
:
85-94
[doi]
Security and Trust Management - 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings
Ruben Rios
,
Joachim Posegga
, editors,
Volume 14336 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System
Jan Willemson
.
STM 2023
:
126-135
[doi]
2022
The Relevance of Consent in the Digital Age: A Consideration of Its Origins and Its Fit for Digital Application
Marietjie Botes
.
STM 2023
:
177-188
[doi]
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language
Luca Buccioli
,
Stefano Cristalli
,
Edoardo Vignati
,
Lorenzo Nava
,
Daniele Badagliacca
,
Danilo Bruschi
,
Long Lu
,
Andrea Lanzi
.
STM 2023
:
136-155
[doi]
SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries
Chris Hicks
,
Vasilios Mavroudis
,
Jon Crowcroft
.
STM 2023
:
3-23
[doi]
2M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private Sketch
Florimond Houssiau
,
Vincent Schellekens
,
Antoine Chatalic
,
Shreyas Kumar Annamraju
,
Yves-Alexandre de Montjoye
.
STM 2023
:
117-135
[doi]
Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps
Giacomo Iadarola
,
Francesco Mercaldo
,
Fabio Martinelli
,
Antonella Santone
.
STM 2023
:
104-114
[doi]
Server-Supported Decryption for Mobile Devices
Johanna Maria Kirss
,
Peeter Laud
,
Nikita Snetkov
,
Jelizaveta Vakarjuk
.
STM 2023
:
71-81
[doi]
Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices
Pascal Oser
,
Felix Engelmann
,
Stefan Lüders
,
Frank Kargl
.
STM 2023
:
52-70
[doi]
FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection
Pan Wang
,
Zeyi Li
,
Xiaokang Zhou
,
Chunhua Su
,
Weizheng Wang
.
STM 2023
:
156-174
[doi]
HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks
Fangyi Yu
,
Miguel Vargas Martin
.
STM 2023
:
189-198
[doi]
A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions
Yanmin Zhao
,
Yang Wang
,
Siu-Ming Yiu
,
Yu Liu
,
Meiqin Wang
.
STM 2023
:
24-51
[doi]
Software Vulnerability Detection via Multimodal Deep Learning
Xin Zhou
,
Rakesh M. Verma
.
STM 2023
:
85-103
[doi]
2021
Secure Implementation of a Quantum-Future GAKE Protocol
Robert Abela
,
Christian Colombo 0001
,
Peter Malo
,
Peter Sýs
,
Tomás Fabsic
,
Ondrej Gallo
,
Viliam Hromada
,
Mark Vella
.
STM 2021
:
103-121
[doi]
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services
Yifei Chen
,
Meng Li 0006
,
Shuli Zheng
,
Chhagan Lal
,
Mauro Conti
.
STM 2021
:
43-61
[doi]
Deciding a Fragment of (α , β )-Privacy
Laouen Fernet
,
Sebastian Mödersheim
.
STM 2021
:
122-142
[doi]
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols
Georgios Fotiadis
,
José Moreira
,
Thanassis Giannetsos
,
Liqun Chen 0002
,
Peter B. Rønne
,
Mark Ryan 0001
,
Peter Y. A. Ryan
.
STM 2021
:
163-184
[doi]
An Aggregate Signature with Pre-communication in the Plain Public Key Model
Masayuki Fukumitsu
,
Shingo Hasegawa
.
STM 2021
:
3-19
[doi]
Efficient Scalable Multi-party Private Set Intersection Using Oblivious PRF
Alireza Kavousi
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
.
STM 2021
:
81-99
[doi]
Towards Decentralized and Provably Secure Cross-Domain Solutions
Joud Khoury
,
Zachary B. Ratliff
,
Michael Atighetchi
.
STM 2021
:
185-203
[doi]
Efficient Permutation Protocol for MPC in the Head
Peeter Laud
.
STM 2021
:
62-80
[doi]
Security and Trust Management - 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings
Rodrigo Roman
,
Jianying Zhou 0001
, editors,
Volume 13075 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
TLS Beyond the Broker: Enforcing Fine-Grained Security and Trust in Publish/Subscribe Environments for IoT
Korbinian Spielvogel
,
Henrich C. Pöhls
,
Joachim Posegga
.
STM 2021
:
145-162
[doi]
The Adversary Capabilities in Practical Byzantine Fault Tolerance
Yongge Wang
.
STM 2021
:
20-39
[doi]
2020
Improved Feature Engineering for Free-Text Keystroke Dynamics
Eden Abadi
,
Itay Hazan
.
STM 2020
:
93-105
[doi]
A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time
Vishal Arora
,
Manoj Misra
.
STM 2020
:
39-54
[doi]
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Karim Baghery
.
STM 2020
:
106-122
[doi]
Reducing the Forensic Footprint with Android Accessibility Attacks
Yonas Leguesse
,
Mark Vella
,
Christian Colombo
,
Julio Hernandez-Castro
.
STM 2020
:
22-38
[doi]
Security and Trust Management - 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, Proceedings
Konstantinos Markantonakis
,
Marinella Petrocchi
, editors,
Volume 12386 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
Revocable Access to Encrypted Message Boards
Fabian Schillinger
,
Christian Schindelhauer
.
STM 2020
:
57-72
[doi]
Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties
Rajiv Ranjan Singh
,
José Moreira
,
Tom Chothia
,
Mark D. Ryan
.
STM 2020
:
3-21
[doi]
Challenges in IT Security Processes and Solution Approaches with Process Mining
Aynesh Sundararaj
,
Silvia Knittl
,
Jens Grossklags
.
STM 2020
:
123-138
[doi]
Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0
Paul Georg Wagner
,
Pascal Birnstill
,
Jürgen Beyerer
.
STM 2020
:
73-89
[doi]
2019
BioID: A Privacy-Friendly Identity Document
Fatih Balli
,
F. Betül Durak
,
Serge Vaudenay
.
STM 2019
:
53-70
[doi]
Is a Smarter Grid Also Riskier?
Karin Bernsmed
,
Martin Gilje Jaatun
,
Christian Frøystad
.
STM 2019
:
36-52
[doi]
Personal Cross-Platform Reputation
Johannes Blömer
,
Nils Löken
.
STM 2019
:
140-157
[doi]
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits
Stelvio Cimato
,
Valentina Ciriani
,
Ernesto Damiani
,
Maryam Ehsanpour
.
STM 2019
:
158-167
[doi]
Understanding Attestation: Analyzing Protocols that Use Quotes
Joshua D. Guttman
,
John D. Ramsdell
.
STM 2019
:
89-106
[doi]
Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings
Sjouke Mauw
,
Mauro Conti
, editors,
Volume 11738 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations
Umberto Morelli
,
Silvio Ranise
,
Damiano Sartori
,
Giada Sciarretta
,
Alessandro Tomasi
.
STM 2019
:
19-35
[doi]
Secure Trust Evaluation Using Multipath and Referral Chain Methods
Mohammad G. Raeini
,
Mehrdad Nojoumian
.
STM 2019
:
124-139
[doi]
On the Statistical Detection of Adversarial Instances over Encrypted Data
Mina Sheikhalishahi
,
Majid Nateghizad
,
Fabio Martinelli
,
Zekeriya Erkin
,
Marco Loog
.
STM 2019
:
71-88
[doi]
Challenges of Using Trusted Computing for Collaborative Data Processing
Paul Georg Wagner
,
Pascal Birnstill
,
Jürgen Beyerer
.
STM 2019
:
107-123
[doi]
Improving Identity and Authentication Assurance in Research & Education Federations
Jule Anna Ziegler
,
Michael Schmidt
,
Mikael Linden
.
STM 2019
:
1-18
[doi]
2018
Verifiable Outsourcing of Computations Using Garbled Onions
Tahsin C. M. Dönmez
.
STM 2018
:
122-137
[doi]
Cyber Insurance Against Electronic Payment Service Outages - A Document Study of Terms and Conditions from Electronic Payment Service Providers and Insurance Companies
Ulrik Franke
.
STM 2018
:
73-84
[doi]
Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library
Ravi Jhawar
,
Karim Lounis
,
Sjouke Mauw
,
Yunior Ramírez-Cruz
.
STM 2018
:
85-101
[doi]
A Fast and Scalable Fragmentation Algorithm for Data Protection Using Multi-storage over Independent Locations
Katarzyna Kapusta
,
Gérard Memmi
.
STM 2018
:
54-69
[doi]
Security and Trust Management - 14th International Workshop, STM 2018, Barcelona, Spain, September 6-7, 2018, Proceedings
Sokratis K. Katsikas
,
Cristina Alcaraz
, editors,
Volume 11091 of
Lecture Notes in Computer Science
, Springer,
2018.
[doi]
Tux: Trust Update on Linux Booting
Suhho Lee
,
Seehwan Yoo
.
STM 2018
:
105-121
[doi]
Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions
Maharage Nisansala Sevwandi Perera
,
Takeshi Koshiba
.
STM 2018
:
3-19
[doi]
A Spark Is Enough in a Straw World: A Study of Websites Password Management in the Wild
Simone Raponi
,
Roberto Di Pietro
.
STM 2018
:
37-53
[doi]
Modular Verification of Sequential Composition for Private Channels in Maude-NPA
Fan Yang
,
Santiago Escobar
,
Catherine A. Meadows
,
José Meseguer
.
STM 2018
:
20-36
[doi]
2017
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems
Luca Arnaboldi
,
Charles Morisset
.
STM 2017
:
224-233
[doi]
Estimating Software Obfuscation Potency with Artificial Neural Networks
Daniele Canavese
,
Leonardo Regano
,
Cataldo Basile
,
Alessio Viticchié
.
STM 2017
:
193-202
[doi]
Exploring Botnet Evolution via Multidimensional Models and Visualisation
William Dash
,
Matthew J. Craven
.
STM 2017
:
72-88
[doi]
Exploit Prevention, Quo Vadis?
László Erdödi
,
Audun Jøsang
.
STM 2017
:
180-190
[doi]
Refinement-Aware Generation of Attack Trees
Olga Gadyatskaya
,
Ravi Jhawar
,
Sjouke Mauw
,
Rolando Trujillo-Rasua
,
Tim A. C. Willemse
.
STM 2017
:
164-179
[doi]
Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV
Giacomo Giorgi
,
Antonio La Marra
,
Fabio Martinelli
,
Paolo Mori
,
Andrea Saracino
.
STM 2017
:
118-133
[doi]
Cover Traffic: A Trade of Anonymity and Efficiency
Tim Grube
,
Markus Thummerer
,
Jörg Daubert
,
Max Mühlhäuser
.
STM 2017
:
213-223
[doi]
Dynamic Similarity Search over Encrypted Data with Low Leakage
Daniel Homann
,
Christian Göge
,
Lena Wiese
.
STM 2017
:
19-35
[doi]
A Consistent Definition of Authorization
Audun Jøsang
.
STM 2017
:
134-144
[doi]
EigenTrust for Hierarchically Structured Chord
Kalonji Kalala
,
Tao Feng
,
Iluju Kiringa
.
STM 2017
:
203-212
[doi]
How Much is Risk Increased by Sharing Credential in Group?
Hiroaki Kikuchi
,
Koichi Niihara
,
Michihiro Yamada
.
STM 2017
:
103-117
[doi]
Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings
Giovanni Livraga
,
Chris J. Mitchell
, editors,
Volume 10547 of
Lecture Notes in Computer Science
, Springer,
2017.
[doi]
Facing Uncertainty in Cyber Insurance Policies
Per Håkon Meland
,
Inger Anne Tøndel
,
Marie Elisabeth Gaup Moe
,
Fredrik Seehusen
.
STM 2017
:
89-100
[doi]
Authentic Execution of Distributed Event-Driven Applications with a Small TCB
Job Noorman
,
Jan Tobias Mühlberg
,
Frank Piessens
.
STM 2017
:
55-71
[doi]
Key Management for Versatile Pay-TV Services
Kazuto Ogawa
,
Sakurako Tamura
,
Goichiro Hanaoka
.
STM 2017
:
3-18
[doi]
Enhanced Modelling of Authenticated Key Exchange Security
Papa B. Seye
,
Augustin P. Sarr
.
STM 2017
:
36-52
[doi]
Formal Analysis of V2X Revocation Protocols
Jorden Whitefield
,
Liqun Chen
,
Frank Kargl
,
Andrew Paverd
,
Steve Schneider
,
Helen Treharne
,
Stephan Wesemeyer
.
STM 2017
:
147-163
[doi]
2016
Access Control for Weakly Consistent Replicated Information Systems
Mathias Weber 0001
,
Annette Bieniusa
,
Arnd Poetzsch-Heffter
.
STM 2016
:
82-97
[doi]
DAPA: Degradation-Aware Privacy Analysis of Android Apps
Gianluca Barbon
,
Agostino Cortesi
,
Pietro Ferrara
,
Enrico Steffinlongo
.
STM 2016
:
32-46
[doi]
Security and Trust Management - 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
Gilles Barthe
,
Evangelos P. Markatos
,
Pierangela Samarati
, editors,
Volume 9871 of
Lecture Notes in Computer Science
, Springer,
2016.
[doi]
Distributed Immutabilization of Secure Logs
Jordi Cucurull
,
Jordi Puiggali
.
STM 2016
:
122-137
[doi]
PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution
Andreas Follner
,
Alexandre Bartel
,
Hui Peng
,
Yu-Chen Chang
,
Kyriakos K. Ispoglou
,
Mathias Payer
,
Eric Bodden
.
STM 2016
:
212-228
[doi]
Information Security as Strategic (In)effectivity
Wojciech Jamroga
,
Masoud Tabatabaei
.
STM 2016
:
154-169
[doi]
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
Ravi Jhawar
,
Karim Lounis
,
Sjouke Mauw
.
STM 2016
:
138-153
[doi]
Retrofitting Mutual Authentication to GSM Using RAND Hijacking
Mohammed Shafiul Alam Khan
,
Chris J. Mitchell
.
STM 2016
:
17-31
[doi]
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems
Gabriele Lenzini
,
Sjouke Mauw
,
Samir Ouchani
.
STM 2016
:
170-178
[doi]
Enforcement of U-XACML History-Based Usage Control Policy
Fabio Martinelli
,
Ilaria Matteucci
,
Paolo Mori
,
Andrea Saracino
.
STM 2016
:
64-81
[doi]
Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection
Federico De Meo
,
Marco Rocchetto
,
Luca Viganò 0001
.
STM 2016
:
179-195
[doi]
Towards a Personal Security Device
Christof Rath
,
Thomas Niedermair
,
Thomas Zefferer
.
STM 2016
:
1-16
[doi]
Privacy-Aware Trust Negotiation
Ruben Rios
,
M. Carmen Fernández Gago
,
Javier Lopez
.
STM 2016
:
98-105
[doi]
MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers
Michael Rushanan
,
David Russell
,
Aviel D. Rubin
.
STM 2016
:
196-211
[doi]
Access Control Enforcement for Selective Disclosure of Linked Data
Tarek Sayah
,
Emmanuel Coquery
,
Romuald Thion
,
Mohand-Saïd Hacid
.
STM 2016
:
47-63
[doi]
Securely Derived Identity Credentials on Smart Phones via Self-enrolment
Fabian van den Broek
,
Brinda Hampiholi
,
Bart Jacobs 0001
.
STM 2016
:
106-121
[doi]
2015
Obligations in PTaCL
Jason Crampton
,
Conrad Williams
.
STM 2015
:
220-235
[doi]
Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments
Teemu Kanstrén
,
Antti Evesti
.
STM 2015
:
37-51
[doi]
The AC-Index: Fast Online Detection of Correlated Alerts
Andrea Pugliese
,
Antonino Rullo
,
Antonio Piccolo
.
STM 2015
:
107-122
[doi]
A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users
Tatyana Ryutov
,
Michael D. Orosz
,
James Blythe
,
Detlof von Winterfeldt
.
STM 2015
:
274-282
[doi]
Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business
Christian Zimmermann
,
Claus-Georg Nolte
.
STM 2015
:
89-104
[doi]
Sign in
or
sign up
to see more results.