


default search action
35th DBSec 2021: Calgary, Canada
- Ken Barker, Kambiz Ghazinour

:
Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings. Lecture Notes in Computer Science 12840, Springer 2021, ISBN 978-3-030-81241-6
Differential Privacy
- Liyue Fan, Akarsh Pokkunuru:

DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks. 3-21 - Daniel Bernau, Jonas Robl, Philip-William Grassal, Steffen Schneider, Florian Kerschbaum:

Comparing Local and Central Differential Privacy Using Membership Inference Attacks. 22-42 - Fumiyuki Kato, Yang Cao

, Masatoshi Yoshikawa:
Preventing Manipulation Attack in Local Differential Privacy Using Verifiable Randomization Mechanism. 43-60
Cryptology I
- Jiafan Wang

, Sherman S. M. Chow
:
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed). 63-83 - Alexandros Bakas, Antonis Michalas

:
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme. 84-95 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Distributed Query Evaluation over Encrypted Data. 96-114
Cryptology II
- Sara Ramezanian

, Tommi Meskanen, Valtteri Niemi:
Multi-party Private Set Operations with an External Decider. 117-135 - Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan, Kurt Rohloff, David Bruce Cousins, Yuriy Polyakov

:
Encrypted-Input Obfuscation of Image Classifiers. 136-156 - D. V. N. Siva Kumar

, P. Santhi Thilagam
:
Preserving Privacy of Co-occurring Keywords over Encrypted Data. 157-168
Machine Learning
- John Heaps, Ram Krishnan

, Yufei Huang, Jianwei Niu, Ravi S. Sandhu:
Access Control Policy Generation from User Stories Using Machine Learning. 171-188 - Wojciech Ozga, Do Le Quoc, Christof Fetzer:

Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration Support. 189-208 - Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang, Hung-Min Sun:

PDF Malware Detection Using Visualization and Machine Learning. 209-220 - Qingtian Zou

, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep Learning for Detecting Network Attacks: An End-to-End Approach. 221-234
Potpourri I
- Mina Alishahi, Nicola Zannone

:
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets. 237-258 - Ioannis Chrysakis

, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsampanaki, Elias Tzortzakakis
, Elisjana Ymeralli, Tom Seymoens
, Anastasia Dimou
, Ruben Verborgh:
A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness. 259-277 - Na Shi

, Bo Tang, Ravi S. Sandhu, Qi Li:
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things. 278-290
Potpourri II
- Manfred Vielberth

, Magdalena Glas
, Marietheres Dietz
, Stylianos Karagiannis
, Emmanouil Magkos
, Günther Pernul
:
A Digital Twin-Based Cyber Range for SOC Analysts. 293-311 - Kalvin Eng, Eleni Stroulia:

The ${tkl}\hbox {-}\mathrm {Score}$ for Data-Sharing Misuseability. 312-324 - Salimeh Dashti

, Amir Sharif
, Roberto Carbone
, Silvio Ranise
:
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments. 325-337 - Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine, Michaël Rusinowitch:

Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks. 338-354
Access Control
- Anna Lisa Ferrara, Federica Paci, Chiara Ricciardi:

Verifiable Hierarchical Key Assignment Schemes. 357-376 - Adi Swissa, Ehud Gudes:

An ABAC Model with Trust and Gossiping (ABAC-TG) for Online Social Networks. 377-392 - Shuvra Chakraborty, Ravi S. Sandhu:

On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining. 393-405

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














