Mitigating Privacy Vulnerability Caused by Map Asymmetry

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:DBSec (36. : 2022 : Newark, NJ) Data and applications security and privacy XXXVI
1. Verfasser: Hiraishi, Ryota (VerfasserIn)
Weitere Verfasser: Yoshikawa, Masatoshi (VerfasserIn), Takagi, Shun (VerfasserIn), Cao, Yang (VerfasserIn), Fujita, Sumio (VerfasserIn), Gomi, Hidehito (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Utility and Privacy Assessment of Synthetic Microbiome Data 2022 Hittmeir, Markus
Liberate Your Servers: A Decentralized Content Compliance Validation Protocol 2022 Liu, Bowen
On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps 2022 Neupane, hradha
Integrating and Evaluating Quantum-safe TLS in Database Applications 2022 Tueno, Anselme
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors 2022 Bakas, Alexandros
Assessing Differentially Private Variational Autoencoders Under Membership Inference 2022 Bernau, Daniel
Attack-Resilient Blockchain-Based Decentralized Timed Data Release 2022 Wang, Jingzhe
Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection 2022 Gorbett, Matt
Knowledge Mining in Cybersecurity: From Attack to Defense 2022 Akbar, Khandakar Ashrafi
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards 2022 Weener, Jeroen
Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption 2022 Bkakria, Anis
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies 2022 Berlato, Stefano
Security Operations Center Roles and Skills: A Comparison of Theory and Practice 2022 Reisser, Andreas
MCOoM: A Semi-Supervised Method for Imbalanced Tabular Security Data 2022 Li, Xiaodi
Combining Defences Against Data-Poisoning Based Backdoor Attacks on Neural Networks 2022 Milakovic, Andrea
Mitigating Privacy Vulnerability Caused by Map Asymmetry 2022 Hiraishi, Ryota
Verification and Validation Methods for a Trust-by-Design Framework for the IoT 2022 Ferraris, Davide
ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases 2022 Clark, Stanley
Alle Artikel auflisten