researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
XML
XML Schema
access control
analysis
architecture
control systems
data-flow
database
design
e-science
meta-model
meta-objects
object-role modeling
role-based access control
rule-based
security
systematic-approach
workflow
Filter by Author
[+]
OR
AND
NOT
1
Anoop Singhal
Bhavani M. Thuraisingham
Ehud Gudes
Elisa Bertino
Frédéric Cuppens
Günther Pernul
Indrajit Ray
Indrakshi Ray
Jaideep Vaidya
Joachim Biskup
Martin S. Olivier
Pierangela Samarati
Ravi Mukkamala
Ravi S. Sandhu
Sabrina De Capitani di Vimercati
Steve Barker
Steven A. Demurjian
Sushil Jajodia
T. C. Ting
Vijayalakshmi Atluri
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
applications
control
data
database
databases
distributed
ifip
inference
model
multilevel
policies
privacy
role
secure
security
system
systems
using
DBSec (dbsec)
Editions
Publications
Viewing Publication 1 - 100 from 971
2025
Trusted Platform and Privacy Management in Cyber Physical Systems: The DUCA Framework
Antonio Muñoz 0001
,
Javier López 0001
,
Cristina Alcaraz
,
Fabio Martinelli
.
dbsec 2025
:
211-230
[doi]
Hallucination Detection in Large Language Models Using Diversion Decoding
Basel Abdeen
,
S. M. Tahmid Siddiqui
,
Meah Tahmeed Ahmed
,
Anoop Singhal
,
Latifur Khan
,
Punya Parag Modi
,
Ehab Al-Shaer
.
dbsec 2025
:
116-133
[doi]
Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE)
Sona Alex
,
Bian Yang
.
dbsec 2025
:
439-455
[doi]
Purpose Filter: A Space-efficient Purpose Metadata Storage
Paulo R. P. Amora
,
Francisco D. B. S. Praciano
,
Javam C. Machado
.
dbsec 2025
:
251-270
[doi]
Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0
Zahra Ebadi Ansaroudi
,
Amir Sharif
,
Giada Sciarretta
,
Francesco Antonio Marino
,
Silvio Ranise
.
dbsec 2025
:
271-289
[doi]
Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs
Reika Nishimura Arakawa
,
Yo Kanemoto
,
Mitsuaki Akiyama
.
dbsec 2025
:
73-95
[doi]
Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications
Maxwel Bar-on
,
Kiley Krosky
,
Federico Larrieu
,
Bruhadeshwar Bezawada
,
Indrakshi Ray
,
Indrajit Ray
.
dbsec 2025
:
3-22
[doi]
Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding
Cristòfol Daudén-Esmel
,
Jordi Castellà-Roca
,
Alexandre Viejo
,
Vicenç Torra
.
dbsec 2025
:
137-155
[doi]
Supporting Delegation in Outsourced ICA Process
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Stefano Paraboschi
,
Sara Petrilli
,
Pierangela Samarati
.
dbsec 2025
:
393-412
[doi]
Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3
Shlomi Dolev
,
Ehud Gudes
,
Daniel Shlomo
.
dbsec 2025
:
233-250
[doi]
Can Differentially Private Fine-Tuning LLMs Protect Against Privacy Attacks?
Hao Du
,
Shang Liu
,
Yang Cao
.
dbsec 2025
:
311-329
[doi]
Feature Identification and Study of Attackers' Behaviours Using Honeypots
Junaid Haseeb
,
Masood Mansoori
,
Ian Welch
.
dbsec 2025
:
371-389
[doi]
Data and Applications Security and Privacy XXXIX - 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025, Proceedings
Sokratis K. Katsikas
,
Basit Shafiq
, editors,
Volume 15722 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source
Sascha Kern
,
Thomas Baumer
,
Raphael Neudert
,
Günther Pernul
.
dbsec 2025
:
413-424
[doi]
Metadata Assisted Supply-Chain Attack Detection for Ansible
Pandu Ranga Reddy Konala
,
Vimal Kumar 0001
,
David Bainbridge 0001
,
Junaid Haseeb
.
dbsec 2025
:
333-350
[doi]
Data Chameleon: A Self-adaptive Synthetic Data Management System
Qianying Liao
,
Maarten Kesters
,
Dimitri Van Landuyt
,
Wouter Joosen
.
dbsec 2025
:
44-56
[doi]
Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning
Federico Mazzone
,
Ahmad Al Badawi
,
Yuriy Polyakov
,
Maarten H. Everts
,
Florian Hahn 0001
,
Andreas Peter 0001
.
dbsec 2025
:
96-115
[doi]
Diffusion-Based Adversarial Purification for Intrusion Detection
Mohamed Amine Merzouk
,
Erwan Beurier
,
Reda Yaich
,
Nora Boulahia-Cuppens
,
Frédéric Cuppens
,
Foutse Khomh
.
dbsec 2025
:
351-370
[doi]
Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management
Francis Wanko Naa
,
Nora Boulahia-Cuppens
,
Frédéric Cuppens
.
dbsec 2025
:
57-72
[doi]
Enabling Right to be Forgotten in a Collaborative Environment Using Permissioned Blockchains
Anand Manojkumar Parikh
,
Shamik Sural
,
Vijayalakshmi Atluri
,
Jaideep Vaidya
.
dbsec 2025
:
156-175
[doi]
Facility Location Problem Under Local Differential Privacy Without Super-Set Assumption
Kevin Pfisterer
,
Quentin Hillebrand
,
Vorapong Suppakitpaisarn
.
dbsec 2025
:
293-310
[doi]
P-EDR: Privacy-Preserving Event-Driven Data Release Using Smart Contracts
Jingzhe Wang
,
Balaji Palanisamy
.
dbsec 2025
:
176-195
[doi]
Automated Privacy Policy Analysis Using Large Language Models
Mian Yang
,
Vijayalakshmi Atluri
,
Shamik Sural
,
Ashish Kundu
.
dbsec 2025
:
23-43
[doi]
Performance-Efficient Anti-fingerprinting for Privacy
Lars Tomer Yavor
,
Anne V. D. M. Kayem
.
dbsec 2025
:
196-210
[doi]
The Privacy Impact of Dash Mixing Fee Payments
Michael H. Ziegler
,
Mariusz Nowostawski
,
Basel Katt
.
dbsec 2025
:
427-438
[doi]
2024
Resiliency Analysis of Mission-Critical System of Systems Using Formal Methods
Mahmoud Abdelgawad
,
Indrakshi Ray
.
dbsec 2024
:
153-170
[doi]
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024
Emmanuel Dana Buedi
,
Ali A. Ghorbani 0001
,
Sajjad Dadkhah
,
Raphael Ferreira
.
dbsec 2024
:
171-190
[doi]
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains
Saptarshi De Chaudhury
,
Likhith Reddy
,
Matta Varun
,
Tirthankar Sengupta
,
Sandip Chakraborty
,
Shamik Sural
,
Jaideep Vaidya
,
Vijayalakshmi Atluri
.
dbsec 2024
:
301-319
[doi]
DT-Anon: Decision Tree Target-Driven Anonymization
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Valerio Ghirimoldi
,
Pierangela Samarati
.
dbsec 2024
:
111-130
[doi]
Visor: Privacy-Preserving Reputation for Decentralized Marketplaces
Tassos Dimitriou
.
dbsec 2024
:
131-150
[doi]
Data and Applications Security and Privacy XXXVIII - 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings
Anna Lisa Ferrara
,
Ram Krishnan
, editors,
Volume 14901 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics
Sabrina Friedl
,
Tobias Reittinger
,
Günther Pernul
.
dbsec 2024
:
269-289
[doi]
SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security
Tieming Geng
,
Chin-Tser Huang
.
dbsec 2024
:
55-70
[doi]
VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning
Saquib Irtiza
,
Xiaodi Li
,
Mahmoud Zamani
,
Latifur Khan
,
Kevin W. Hamlen
.
dbsec 2024
:
221-240
[doi]
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing
Md Shihabul Islam
,
Mahmoud Zamani
,
Kevin W. Hamlen
,
Latifur Khan
,
Murat Kantarcioglu
.
dbsec 2024
:
71-91
[doi]
A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM
Seyni Kane
,
Anis Bkakria
.
dbsec 2024
:
101-108
[doi]
Towards Atomicity and Composability in Cross-Chain NFTs
Yong Zhi Lim
,
Wen Qing Ong Perry
,
Jianying Zhou
.
dbsec 2024
:
92-100
[doi]
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence
Alexander Puchta
,
Thomas Baumer
,
Mathis Müller
,
Günther Pernul
.
dbsec 2024
:
44-52
[doi]
All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset
Fatima Zahra Qachfar
,
Rakesh M. Verma
.
dbsec 2024
:
241-258
[doi]
ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning
Fariha Ishrat Rahman
,
Sadaf Md. Halim
,
Anoop Singhal
,
Latifur Khan
.
dbsec 2024
:
203-220
[doi]
Does Differential Privacy Prevent Backdoor Attacks in Practice?
Fereshteh Razmi
,
Jian Lou 0001
,
Li Xiong 0001
.
dbsec 2024
:
320-340
[doi]
User Perceptions of CAPTCHAs: University vs. Internet Users
Arun Reddy
,
Yuan Cheng 0002
.
dbsec 2024
:
290-297
[doi]
Optimal Automated Generation of Playbooks
Kéren Saint-Hilaire
,
Christopher Neal
,
Frédéric Cuppens
,
Nora Boulahia-Cuppens
,
Makhlouf Hadji
.
dbsec 2024
:
191-199
[doi]
Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation
Giorgia Sirigu
,
Barbara Carminati
,
Elena Ferrari
.
dbsec 2024
:
24-43
[doi]
Adaptive Image Adversarial Example Detection Based on Class Activation Mapping
Xiujuan Wang
,
Qipeng Li
,
Shuaibing Lu
.
dbsec 2024
:
259-266
[doi]
A Graph-Based Framework for ABAC Policy Enforcement and Analysis
Mian Yang
,
Vijayalakshmi Atluri
,
Shamik Sural
,
Jaideep Vaidya
.
dbsec 2024
:
3-23
[doi]
2023
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity
Basel Abdeen
,
Ehab Al-Shaer
,
Anoop Singhal
,
Latifur Khan
,
Kevin W. Hamlen
.
dbsec 2023
:
243-260
[doi]
Building Quadtrees for Spatial Data Under Local Differential Privacy
Ece Alptekin
,
Mehmet Emre Gursoy
.
dbsec 2023
:
22-39
[doi]
Control is Nothing Without Trust a First Look into Digital Identity Wallet Trends
Zahra Ebadi Ansaroudi
,
Roberto Carbone
,
Giada Sciarretta
,
Silvio Ranise
.
dbsec 2023
:
113-132
[doi]
(Local) Differential Privacy has NO Disparate Impact on Fairness
Héber Hwang Arcolezi
,
Karima Makhlouf
,
Catuscia Palamidessi
.
dbsec 2023
:
3-21
[doi]
On the Utility Gain of Iterative Bayesian Update for Locally Differentially Private Mechanisms
Héber Hwang Arcolezi
,
Selene Cerna
,
Catuscia Palamidessi
.
dbsec 2023
:
165-183
[doi]
Data and Applications Security and Privacy XXXVII - 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings
Vijayalakshmi Atluri
,
Anna Lisa Ferrara
, editors,
Volume 13942 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrapping
Adda-Akram Bendoukha
,
Pierre-Emmanuel Clet
,
Aymen Boudguiga
,
Renaud Sirdey
.
dbsec 2023
:
91-109
[doi]
Differentially Private Streaming Data Release Under Temporal Correlations via Post-processing
Xuyang Cao
,
Yang Cao 0011
,
Primal Pappachan
,
Atsuyoshi Nakamura
,
Masatoshi Yoshikawa
.
dbsec 2023
:
184-200
[doi]
2 Prediction
Marlon P. da Silva
,
Henry C. Nunes
,
Charles V. Neu
,
Luana T. Thomas
,
Avelino F. Zorzo
,
Charles Morisset
.
dbsec 2023
:
133-140
[doi]
AMOE: A Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit
Franz Deimling
,
Michela Fazzolari
.
dbsec 2023
:
369-385
[doi]
Data Distribution Impact on Preserving Privacy in Centralized and Decentralized Learning
Bakary Dolo
,
Faiza Loukil
,
Khouloud Boukadi
.
dbsec 2023
:
153-164
[doi]
Digital Twins for IoT Security Management
Philip Empl
,
Henric Hager
,
Günther Pernul
.
dbsec 2023
:
141-149
[doi]
A Dynamic Approach to Defuse Logic Bombs in Android Applications
Fausto Fasano
,
Michele Guerra
,
Roberto Milanese
,
Rocco Oliveto
.
dbsec 2023
:
358-365
[doi]
CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery
Tom Ganz
,
Erik Imgrund
,
Martin Härterich
,
Konrad Rieck
.
dbsec 2023
:
282-301
[doi]
Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach
Sascha Kern
,
Thomas Baumer
,
Ludwig Fuchs
,
Günther Pernul
.
dbsec 2023
:
223-242
[doi]
Classification Auto-Encoder Based Detector Against Diverse Data Poisoning Attacks
Fereshteh Razmi
,
Li Xiong 0001
.
dbsec 2023
:
263-281
[doi]
An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning
David Rodriguez
,
Ram Krishnan
.
dbsec 2023
:
302-316
[doi]
An Analysis of Hybrid Consensus in Blockchain Protocols for Correctness and Progress
Sangita Roy
,
Rudrapatna K. Shyamasundar
.
dbsec 2023
:
404-412
[doi]
New Results on Distributed Secret Sharing Protocols
Alfredo De Santis
,
Barbara Masucci
.
dbsec 2023
:
51-68
[doi]
Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments
Gianluca Sassetti
,
Amir Sharif
,
Giada Sciarretta
,
Roberto Carbone
,
Silvio Ranise
.
dbsec 2023
:
203-222
[doi]
Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin
Janaka Senanayake
,
Harsha K. Kalutarage
,
M. Omar Al-Kadri
,
Andrei Petrovski 0001
,
Luca Piras
.
dbsec 2023
:
339-357
[doi]
Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications
Aishwarya Surani
,
Amani Bawaked
,
Matthew Wheeler
,
Braden Kelsey
,
Nikki Roberts
,
David Vincent
,
Sanchari Das
.
dbsec 2023
:
319-338
[doi]
Privacy-Preserving Genomic Statistical Analysis Under Local Differential Privacy
Akito Yamamoto
,
Tetsuo Shibuya
.
dbsec 2023
:
40-48
[doi]
Probabilistic Fingerprinting Scheme for Correlated Data
Emre Yilmaz
,
Erman Ayday
.
dbsec 2023
:
69-90
[doi]
VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation
Siqi Zhang
,
Mengyuan Zhang
,
Lianying Zhao
.
dbsec 2023
:
386-403
[doi]
2022
Knowledge Mining in Cybersecurity: From Attack to Defense
Khandakar Ashrafi Akbar
,
Sadaf Md. Halim
,
Yibo Hu
,
Anoop Singhal
,
Latifur Khan
,
Bhavani Thuraisingham
.
dbsec 2022
:
110-122
[doi]
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors
Alexandros Bakas
,
Antonis Michalas
,
Eugene Frimpong
,
Reyhaneh Rabaninejad
.
dbsec 2022
:
279-299
[doi]
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies
Stefano Berlato
,
Umberto Morelli
,
Roberto Carbone
,
Silvio Ranise
.
dbsec 2022
:
236-255
[doi]
Assessing Differentially Private Variational Autoencoders Under Membership Inference
Daniel Bernau
,
Jonas Robl
,
Florian Kerschbaum
.
dbsec 2022
:
3-14
[doi]
Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption
Anis Bkakria
.
dbsec 2022
:
197-214
[doi]
ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases
Stanley Clark
,
Nikolay Yakovets
,
George Fletcher 0001
,
Nicola Zannone
.
dbsec 2022
:
303-315
[doi]
Verification and Validation Methods for a Trust-by-Design Framework for the IoT
Davide Ferraris
,
M. Carmen Fernández Gago
,
Javier López 0001
.
dbsec 2022
:
183-194
[doi]
Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection
Matt Gorbett
,
Hossein Shirazi
,
Indrakshi Ray
.
dbsec 2022
:
143-161
[doi]
Mitigating Privacy Vulnerability Caused by Map Asymmetry
Ryota Hiraishi
,
Masatoshi Yoshikawa
,
Shun Takagi
,
Yang Cao 0011
,
Sumio Fujita
,
Hidehito Gomi
.
dbsec 2022
:
68-86
[doi]
Utility and Privacy Assessment of Synthetic Microbiome Data
Markus Hittmeir
,
Rudolf Mayer
,
Andreas Ekelhart
.
dbsec 2022
:
15-27
[doi]
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data
Xiaodi Li
,
Latifur Khan
,
Mahmoud Zamani
,
Shamila Wickramasuriya
,
Kevin W. Hamlen
,
Bhavani Thuraisingham
.
dbsec 2022
:
48-67
[doi]
Liberate Your Servers: A Decentralized Content Compliance Validation Protocol
Bowen Liu
,
Jianying Zhou 0001
.
dbsec 2022
:
89-109
[doi]
Combining Defences Against Data-Poisoning Based Backdoor Attacks on Neural Networks
Andrea Milakovic
,
Rudolf Mayer
.
dbsec 2022
:
28-47
[doi]
On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps
Shradha Neupane
,
Faiza Tazi
,
Upakar Paudel
,
Freddy Veloz Baez
,
Merzia Adamjee
,
Lorenzo De Carli
,
Sanchari Das
,
Indrakshi Ray
.
dbsec 2022
:
162-182
[doi]
Security Operations Center Roles and Skills: A Comparison of Theory and Practice
Andreas Reisser
,
Manfred Vielberth
,
Sofia Fohringer
,
Günther Pernul
.
dbsec 2022
:
316-327
[doi]
Data and Applications Security and Privacy XXXVI - 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings
Shamik Sural
,
Haibing Lu
, editors,
Volume 13383 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Integrating and Evaluating Quantum-safe TLS in Database Applications
Anselme Tueno
,
David Boehm
,
Shin Ho Choe
.
dbsec 2022
:
259-278
[doi]
Attack-Resilient Blockchain-Based Decentralized Timed Data Release
Jingzhe Wang
,
Balaji Palanisamy
.
dbsec 2022
:
123-140
[doi]
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards
Jeroen Weener
,
Florian Hahn 0004
,
Andreas Peter
.
dbsec 2022
:
215-235
[doi]
2021
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed)
Jiafan Wang 0001
,
Sherman S. M. Chow
.
dbsec 2021
:
63-83
[doi]
Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings
Ken Barker 0001
,
Kambiz Ghazinour
, editors,
Volume 12840 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme
Alexandros Bakas
,
Antonis Michalas
.
dbsec 2021
:
84-95
[doi]
On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining
Shuvra Chakraborty
,
Ravi S. Sandhu
.
dbsec 2021
:
393-405
[doi]
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks
Sanaz Eidizadehakhcheloo
,
Bizhan Alipour Pijani
,
Abdessamad Imine
,
Michaël Rusinowitch
.
dbsec 2021
:
338-354
[doi]
The ${tkl}\hbox {-}\mathrm {Score}$ for Data-Sharing Misuseability
Kalvin Eng
,
Eleni Stroulia
.
dbsec 2021
:
312-324
[doi]
DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks
Liyue Fan
,
Akarsh Pokkunuru
.
dbsec 2021
:
3-21
[doi]
PDF Malware Detection Using Visualization and Machine Learning
Ching-Yuan Liu
,
Min-Yi Chiu
,
Qi-Xian Huang
,
Hung-Min Sun
.
dbsec 2021
:
209-220
[doi]
Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration Support
Wojciech Ozga
,
Do Le Quoc
,
Christof Fetzer
.
dbsec 2021
:
189-208
[doi]
Multi-party Private Set Operations with an External Decider
Sara Ramezanian
,
Tommi Meskanen
,
Valtteri Niemi
.
dbsec 2021
:
117-135
[doi]
Sign in
or
sign up
to see more results.