


default search action
39th DBSec 2025: Gjøvik, Norway
- Sokratis K. Katsikas

, Basit Shafiq
:
Data and Applications Security and Privacy XXXIX - 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025, Proceedings. Lecture Notes in Computer Science 15722, Springer 2025, ISBN 978-3-031-96589-0
AI Applications in Security and Privacy
- Maxwel Bar-on, Kiley Krosky, Federico Larrieu, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:

Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. 3-22 - Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Ashish Kundu:

Automated Privacy Policy Analysis Using Large Language Models. 23-43 - Qianying Liao, Maarten Kesters, Dimitri Van Landuyt

, Wouter Joosen:
Data Chameleon: A Self-adaptive Synthetic Data Management System. 44-56 - Francis Wanko Naa, Nora Boulahia-Cuppens, Frédéric Cuppens:

Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. 57-72 - Reika Nishimura Arakawa, Yo Kanemoto, Mitsuaki Akiyama

:
Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. 73-95 - Federico Mazzone

, Ahmad Al Badawi
, Yuriy Polyakov
, Maarten H. Everts
, Florian Hahn
, Andreas Peter
:
Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. 96-115 - Basel Abdeen

, S. M. Tahmid Siddiqui
, Meah Tahmeed Ahmed, Anoop Singhal
, Latifur Khan
, Punya Parag Modi, Ehab Al-Shaer
:
Hallucination Detection in Large Language Models Using Diversion Decoding. 116-133
User and Data Privacy
- Cristòfol Daudén-Esmel

, Jordi Castellà-Roca
, Alexandre Viejo
, Vicenç Torra
:
Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. 137-155 - Anand Manojkumar Parikh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:

Enabling Right to be Forgotten in a Collaborative Environment Using Permissioned Blockchains. 156-175 - Jingzhe Wang, Balaji Palanisamy:

P-EDR: Privacy-Preserving Event-Driven Data Release Using Smart Contracts. 176-195 - Lars Tomer Yavor, Anne V. D. M. Kayem

:
Performance-Efficient Anti-fingerprinting for Privacy. 196-210 - Antonio Muñoz

, Javier López
, Cristina Alcaraz
, Fabio Martinelli:
Trusted Platform and Privacy Management in Cyber Physical Systems: The DUCA Framework. 211-230
Database and Storage Security
- Shlomi Dolev

, Ehud Gudes
, Daniel Shlomo:
Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. 233-250 - Paulo R. P. Amora

, Francisco D. B. S. Praciano
, Javam C. Machado
:
Purpose Filter: A Space-efficient Purpose Metadata Storage. 251-270 - Zahra Ebadi Ansaroudi

, Amir Sharif
, Giada Sciarretta
, Francesco Antonio Marino
, Silvio Ranise
:
Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. 271-289
Differential Privacy
- Kevin Pfisterer

, Quentin Hillebrand
, Vorapong Suppakitpaisarn
:
Facility Location Problem Under Local Differential Privacy Without Super-Set Assumption. 293-310 - Hao Du, Shang Liu, Yang Cao:

Can Differentially Private Fine-Tuning LLMs Protect Against Privacy Attacks? 311-329
Attackers and Attack Detection
- Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge, Junaid Haseeb:

Metadata Assisted Supply-Chain Attack Detection for Ansible. 333-350 - Mohamed Amine Merzouk

, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens, Foutse Khomh:
Diffusion-Based Adversarial Purification for Intrusion Detection. 351-370 - Junaid Haseeb, Masood Mansoori

, Ian Welch:
Feature Identification and Study of Attackers' Behaviours Using Honeypots. 371-389
Access Control and Internal Controls and Audit Process
- Sabrina De Capitani di Vimercati

, Sara Foresti
, Stefano Paraboschi
, Sara Petrilli, Pierangela Samarati
:
Supporting Delegation in Outsourced ICA Process. 393-412 - Sascha Kern

, Thomas Baumer
, Raphael Neudert, Günther Pernul
:
Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. 413-424
Cryptography for Security and Privacy
- Michael H. Ziegler, Mariusz Nowostawski

, Basel Katt
:
The Privacy Impact of Dash Mixing Fee Payments. 427-438 - Sona Alex, Bian Yang:

Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE). 439-455

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














