Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 31, Issue 62023Selected papers from the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy – DBSEC 2022
Reflects downloads up to 25 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
Open Access
Securing blockchain-based timed data release against adversarial attacks1

Timed data release refers to protecting sensitive data that can be accessed only after a pre-determined amount of time has passed. While blockchain-based solutions for timed data release provide a promising approach for decentralizing the process, ...

research-article
The intrinsic dimensionality of network datasets and its applications1

Modern network infrastructures are in a constant state of transformation, in large part due to the exponential growth of Internet of Things (IoT) devices. The unique properties of IoT-connected networks, such as heterogeneity and non-standardized protocol,...

research-article
Con2Mix: A semi-supervised method for imbalanced tabular security data1

Con2Mix (Contrastive Double Mixup) is a new semi-supervised learning methodology that innovates a triplet mixup data augmentation approach for finding code vulnerabilities in imbalanced, tabular security data sets. Tabular data sets in cybersecurity ...

research-article
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption1

Attribute based encryption (ABE) is a cryptographic technique allowing fine-grained access control by enabling one-to-many encryption. Existing ABE constructions suffer from at least one of the following limitations. First, single point of failure on ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.