Data and applications security and p...
Annual IFIP WG 11.3 Working Conference on Data and Applications Security (2025 :)

FindBook      Google Book      Amazon      博客來     
  • Data and applications security and privacy XXXIX = 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Data and applications security and privacy XXXIX/ edited by Sokratis Katsikas, Basit Shafiq.
    其他題名: 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
    其他題名: Data and applications security and privacy 39
    其他作者: Katsikas, Sokratis.
    團體作者: Annual IFIP WG 11.3 Working Conference on Data and Applications Security
    出版者: Cham :Springer Nature Switzerland : : 2025.,
    面頁冊數: xiii, 458 p. :ill., digital ;24 cm.
    內容註: AI applications in security and privacy. -- Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. -- Automated Privacy Policy Analysis using Large Language Models. -- Data Chameleon:˜a self-adaptive synthetic data management system. -- Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. -- Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. -- Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. -- Hallucination Detection in Large Language Models using Diversion Decoding. -- User and data privacy. -- Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. -- Enabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains. -- P-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts. -- Performance-Efficient Anti-fingerprinting for Privacy. -- Privacy Management in Cyber-Physical Systems: The DUCA Framework. -- Database and storage security. -- Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. -- Purpose Filter: A space-efficient purpose metadata storage. -- Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. -- Differential privacy. -- Facility Location Problem under Local Differential Privacy without Super-set Assumption. -- Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?. -- Attackers and attack detection. -- Metadata Assisted Supply-Chain Attack Detection for Ansible. -- Diffusion-based Adversarial Purification for Intrusion Detection. -- Feature Identification and Study of Attackers' Behaviours Using Honeypots. -- Access control & Internal Controls and Audit process. -- Supporting Delegation in Outsourced ICA Process. -- Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. -- Cryptography for security and privacy. -- The Privacy Impact of Dash Mixing Fee Payments. -- Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE).
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-96590-6
    ISBN: 9783031965906
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入