


default search action
36th DBSec 2022: Newark, NJ, USA
- Shamik Sural, Haibing Lu:

Data and Applications Security and Privacy XXXVI - 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13383, Springer 2022, ISBN 978-3-031-10683-5
Data Privacy
- Daniel Bernau, Jonas Robl, Florian Kerschbaum:

Assessing Differentially Private Variational Autoencoders Under Membership Inference. 3-14 - Markus Hittmeir

, Rudolf Mayer
, Andreas Ekelhart
:
Utility and Privacy Assessment of Synthetic Microbiome Data. 15-27 - Andrea Milakovic, Rudolf Mayer

:
Combining Defences Against Data-Poisoning Based Backdoor Attacks on Neural Networks. 28-47 - Xiaodi Li

, Latifur Khan
, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen
, Bhavani Thuraisingham
:
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data. 48-67 - Ryota Hiraishi

, Masatoshi Yoshikawa
, Shun Takagi
, Yang Cao
, Sumio Fujita
, Hidehito Gomi
:
Mitigating Privacy Vulnerability Caused by Map Asymmetry. 68-86
Distributed Systems
- Bowen Liu, Jianying Zhou:

Liberate Your Servers: A Decentralized Content Compliance Validation Protocol. 89-109 - Khandakar Ashrafi Akbar, Sadaf Md. Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham:

Knowledge Mining in Cybersecurity: From Attack to Defense. 110-122 - Jingzhe Wang, Balaji Palanisamy:

Attack-Resilient Blockchain-Based Decentralized Timed Data Release. 123-140
IoT Security
- Matt Gorbett, Hossein Shirazi, Indrakshi Ray:

Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection. 143-161 - Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das, Indrakshi Ray:

On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps. 162-182 - Davide Ferraris, M. Carmen Fernández Gago, Javier López:

Verification and Validation Methods for a Trust-by-Design Framework for the IoT. 183-194
Privacy-Preserving Access and Computation
- Anis Bkakria:

Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption. 197-214 - Jeroen Weener, Florian Hahn

, Andreas Peter
:
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards. 215-235 - Stefano Berlato

, Umberto Morelli
, Roberto Carbone
, Silvio Ranise
:
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies. 236-255
Quantum Security
- Anselme Tueno, David Boehm, Shin Ho Choe:

Integrating and Evaluating Quantum-safe TLS in Database Applications. 259-278 - Alexandros Bakas, Antonis Michalas

, Eugene Frimpong
, Reyhaneh Rabaninejad:
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors. 279-299
Security Operations and Policies
- Stanley Clark, Nikolay Yakovets

, George Fletcher
, Nicola Zannone
:
ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases. 303-315 - Andreas Reisser, Manfred Vielberth, Sofia Fohringer, Günther Pernul:

Security Operations Center Roles and Skills: A Comparison of Theory and Practice. 316-327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














