![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
37th DBSec 2023: Sophia-Antipolis, France
- Vijayalakshmi Atluri
, Anna Lisa Ferrara
:
Data and Applications Security and Privacy XXXVII - 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings. Lecture Notes in Computer Science 13942, Springer 2023, ISBN 978-3-031-37585-9
Differential Privacy
- Héber Hwang Arcolezi
, Karima Makhlouf
, Catuscia Palamidessi
:
(Local) Differential Privacy has NO Disparate Impact on Fairness. 3-21 - Ece Alptekin, Mehmet Emre Gursoy:
Building Quadtrees for Spatial Data Under Local Differential Privacy. 22-39 - Akito Yamamoto
, Tetsuo Shibuya
:
Privacy-Preserving Genomic Statistical Analysis Under Local Differential Privacy. 40-48
Secure Data Sharing
- Alfredo De Santis, Barbara Masucci:
New Results on Distributed Secret Sharing Protocols. 51-68 - Emre Yilmaz
, Erman Ayday
:
Probabilistic Fingerprinting Scheme for Correlated Data. 69-90 - Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrapping. 91-109
Applications
- Zahra Ebadi Ansaroudi
, Roberto Carbone
, Giada Sciarretta
, Silvio Ranise
:
Control is Nothing Without Trust a First Look into Digital Identity Wallet Trends. 113-132 - Marlon P. da Silva, Henry C. Nunes, Charles V. Neu, Luana T. Thomas, Avelino F. Zorzo, Charles Morisset:
Impact of Using a Privacy Model on Smart Buildings Data for CO2 Prediction. 133-140 - Philip Empl
, Henric Hager
, Günther Pernul
:
Digital Twins for IoT Security Management. 141-149
Privacy
- Bakary Dolo
, Faiza Loukil
, Khouloud Boukadi
:
Data Distribution Impact on Preserving Privacy in Centralized and Decentralized Learning. 153-164 - Héber Hwang Arcolezi
, Selene Cerna
, Catuscia Palamidessi
:
On the Utility Gain of Iterative Bayesian Update for Locally Differentially Private Mechanisms. 165-183 - Xuyang Cao, Yang Cao, Primal Pappachan, Atsuyoshi Nakamura, Masatoshi Yoshikawa:
Differentially Private Streaming Data Release Under Temporal Correlations via Post-processing. 184-200
Access Control and Vulnerability Assessment
- Gianluca Sassetti
, Amir Sharif
, Giada Sciarretta
, Roberto Carbone
, Silvio Ranise
:
Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments. 203-222 - Sascha Kern
, Thomas Baumer
, Ludwig Fuchs, Günther Pernul
:
Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach. 223-242 - Basel Abdeen, Ehab Al-Shaer, Anoop Singhal, Latifur Khan, Kevin W. Hamlen:
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity. 243-260
Machine Learning
- Fereshteh Razmi
, Li Xiong
:
Classification Auto-Encoder Based Detector Against Diverse Data Poisoning Attacks. 263-281 - Tom Ganz, Erik Imgrund, Martin Härterich, Konrad Rieck:
CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery. 282-301 - David Rodriguez, Ram Krishnan:
An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning. 302-316
Mobile Applications
- Aishwarya Surani
, Amani Bawaked
, Matthew Wheeler
, Braden Kelsey
, Nikki Roberts
, David Vincent
, Sanchari Das
:
Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications. 319-338 - Janaka Senanayake
, Harsha K. Kalutarage
, M. Omar Al-Kadri
, Andrei Petrovski
, Luca Piras
:
Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin. 339-357 - Fausto Fasano
, Michele Guerra
, Roberto Milanese, Rocco Oliveto
:
A Dynamic Approach to Defuse Logic Bombs in Android Applications. 358-365
Defense Mechanisms
- Franz Deimling
, Michela Fazzolari:
AMOE: A Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit. 369-385 - Siqi Zhang, Mengyuan Zhang, Lianying Zhao:
VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation. 386-403 - Sangita Roy
, Rudrapatna K. Shyamasundar:
An Analysis of Hybrid Consensus in Blockchain Protocols for Correctness and Progress. 404-412
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.