


default search action
39th DBSec 2025: Gjøvik, Norway
- Sokratis K. Katsikas
, Basit Shafiq
:
Data and Applications Security and Privacy XXXIX - 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025, Proceedings. Lecture Notes in Computer Science 15722, Springer 2025, ISBN 978-3-031-96589-0
AI Applications in Security and Privacy
- Maxwel Bar-on, Kiley Krosky, Federico Larrieu, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. 3-22 - Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Ashish Kundu:
Automated Privacy Policy Analysis Using Large Language Models. 23-43 - Qianying Liao, Maarten Kesters, Dimitri Van Landuyt, Wouter Joosen:
Data Chameleon: A Self-adaptive Synthetic Data Management System. 44-56 - Francis Wanko Naa, Nora Boulahia-Cuppens, Frédéric Cuppens:
Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. 57-72 - Reika Nishimura Arakawa, Yo Kanemoto, Mitsuaki Akiyama
:
Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. 73-95 - Federico Mazzone
, Ahmad Al Badawi
, Yuriy Polyakov
, Maarten H. Everts
, Florian Hahn
, Andreas Peter
:
Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. 96-115 - Basel Abdeen
, S. M. Tahmid Siddiqui
, Meah Tahmeed Ahmed, Anoop Singhal
, Latifur Khan
, Punya Parag Modi, Ehab Al-Shaer
:
Hallucination Detection in Large Language Models Using Diversion Decoding. 116-133
User and Data Privacy
- Cristòfol Daudén-Esmel
, Jordi Castellà-Roca
, Alexandre Viejo
, Vicenç Torra
:
Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. 137-155 - Anand Manojkumar Parikh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Enabling Right to be Forgotten in a Collaborative Environment Using Permissioned Blockchains. 156-175 - Jingzhe Wang, Balaji Palanisamy:
P-EDR: Privacy-Preserving Event-Driven Data Release Using Smart Contracts. 176-195 - Lars Tomer Yavor, Anne V. D. M. Kayem
:
Performance-Efficient Anti-fingerprinting for Privacy. 196-210 - Antonio Muñoz
, Javier López
, Cristina Alcaraz
, Fabio Martinelli:
Trusted Platform and Privacy Management in Cyber Physical Systems: The DUCA Framework. 211-230
Database and Storage Security
- Shlomi Dolev
, Ehud Gudes
, Daniel Shlomo:
Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. 233-250 - Paulo R. P. Amora
, Francisco D. B. S. Praciano
, Javam C. Machado
:
Purpose Filter: A Space-efficient Purpose Metadata Storage. 251-270 - Zahra Ebadi Ansaroudi
, Amir Sharif
, Giada Sciarretta
, Francesco Antonio Marino
, Silvio Ranise
:
Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. 271-289
Differential Privacy
- Kevin Pfisterer, Quentin Hillebrand
, Vorapong Suppakitpaisarn
:
Facility Location Problem Under Local Differential Privacy Without Super-Set Assumption. 293-310 - Hao Du, Shang Liu, Yang Cao:
Can Differentially Private Fine-Tuning LLMs Protect Against Privacy Attacks? 311-329
Attackers and Attack Detection
- Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge, Junaid Haseeb:
Metadata Assisted Supply-Chain Attack Detection for Ansible. 333-350 - Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens, Foutse Khomh:
Diffusion-Based Adversarial Purification for Intrusion Detection. 351-370 - Junaid Haseeb, Masood Mansoori, Ian Welch:
Feature Identification and Study of Attackers' Behaviours Using Honeypots. 371-389
Access Control and Internal Controls and Audit Process
- Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Sara Petrilli, Pierangela Samarati
:
Supporting Delegation in Outsourced ICA Process. 393-412 - Sascha Kern
, Thomas Baumer
, Raphael Neudert, Günther Pernul
:
Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. 413-424
Cryptography for Security and Privacy
- Michael H. Ziegler, Mariusz Nowostawski
, Basel Katt
:
The Privacy Impact of Dash Mixing Fee Payments. 427-438 - Sona Alex, Bian Yang:
Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE). 439-455

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.