default search action
36th DBSec 2022: Newark, NJ, USA
- Shamik Sural, Haibing Lu:
Data and Applications Security and Privacy XXXVI - 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13383, Springer 2022, ISBN 978-3-031-10683-5
Data Privacy
- Daniel Bernau, Jonas Robl, Florian Kerschbaum:
Assessing Differentially Private Variational Autoencoders Under Membership Inference. 3-14 - Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart:
Utility and Privacy Assessment of Synthetic Microbiome Data. 15-27 - Andrea Milakovic, Rudolf Mayer:
Combining Defences Against Data-Poisoning Based Backdoor Attacks on Neural Networks. 28-47 - Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham:
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data. 48-67 - Ryota Hiraishi, Masatoshi Yoshikawa, Shun Takagi, Yang Cao, Sumio Fujita, Hidehito Gomi:
Mitigating Privacy Vulnerability Caused by Map Asymmetry. 68-86
Distributed Systems
- Bowen Liu, Jianying Zhou:
Liberate Your Servers: A Decentralized Content Compliance Validation Protocol. 89-109 - Khandakar Ashrafi Akbar, Sadaf Md. Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham:
Knowledge Mining in Cybersecurity: From Attack to Defense. 110-122 - Jingzhe Wang, Balaji Palanisamy:
Attack-Resilient Blockchain-Based Decentralized Timed Data Release. 123-140
IoT Security
- Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection. 143-161 - Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das, Indrakshi Ray:
On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps. 162-182 - Davide Ferraris, M. Carmen Fernández Gago, Javier López:
Verification and Validation Methods for a Trust-by-Design Framework for the IoT. 183-194
Privacy-Preserving Access and Computation
- Anis Bkakria:
Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption. 197-214 - Jeroen Weener, Florian Hahn, Andreas Peter:
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards. 215-235 - Stefano Berlato, Umberto Morelli, Roberto Carbone, Silvio Ranise:
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies. 236-255
Quantum Security
- Anselme Tueno, David Boehm, Shin Ho Choe:
Integrating and Evaluating Quantum-safe TLS in Database Applications. 259-278 - Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabaninejad:
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors. 279-299
Security Operations and Policies
- Stanley Clark, Nikolay Yakovets, George Fletcher, Nicola Zannone:
ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases. 303-315 - Andreas Reisser, Manfred Vielberth, Sofia Fohringer, Günther Pernul:
Security Operations Center Roles and Skills: A Comparison of Theory and Practice. 316-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.