Accepted Papers

Accepted Papers

 

Full Papers (19)

 

  1. Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo and Vicenç Torra. Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding
  1. Kevin Pfisterer, Quentin Hillebrand and Vorapong SuppakitpaisarnFacility Location Problem under Local Differential Privacy without Super-set Assumption
  1. Daniel Shlomo, Ehud Gudess and Shlomi DolevBloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3
  1. Paulo Amora, Francisco Daniel Praciano and Javam MachadoPurpose Filter: A space-efficient purpose metadata storage
  1. Reika Arakawa, Yo Kanemoto and Mitsuaki AkiyamaTowards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs
  1. Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov, Maarten Everts, Florian Hahn and Andreas PeterEncrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning
  1. Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge and Junaid HaseebMetadata Assisted Supply-Chain Attack Detection for Ansible
  1. Anand Manojkumar Parikh, Shamik Sural, Vijay Atluri and Jaideep VaidyaEnabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains
  1. Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens and Frédéric CuppensDiffusion-based Adversarial Purification for Intrusion Detection
  1. Maxwel Bar-On, Kiley Krosky, Federico Larrieu, Bruhadeshwar Bezawada, Indrakshi Ray and Indrajit RayJibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications
  1. Jingzhe Wang and Balaji PalanisamyP-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts
  1. Antonio Muñoz, Javier López, Cristina Alcaraz and Fabio MartinelliPrivacy Management in Cyber-Physical Systems: The DUCA Framework
  1. Basel Abdeen, Latifur Khan, S M Tahmid Siddiqui, Meah Tahmeed Ahmed and Anoop Singhal. Hallucination Detection in Large Language Models using Diversion Decoding
  1. Junaid Haseeb, Masood Mansoori and Ian WelchFeature Identification and Study of Attackers' Behaviours Using Honeypots
  1. Mian Yang, Vijayalakshmi Atluri, Shamik Sural and Ashish KunduAutomated Privacy Policy Analysis using Large Language Models
  1. Zahra Ebadi Ansaroudi, Amir Sharif, Giada Sciarretta, Francesco Antonio Marino and Silvio RaniseSecure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0
  1. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Sara Petrilli and Pierangela SamaratiSupporting delegation in outsourced ICA process
  1. Hao Du, Shang Liu and Yang CaoCan Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?
  1. Sona Alex and Bian YangCryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE)

 

Short Papers (5)

 

  1. Sascha Kern, Thomas Baumer, Raphael Neudert and Günther PernulTransaction Logs in Access Control: Leveraging an Under-Utilized Data Source
  1. Lars Tomer Yavor and Anne KayemPerformance-Efficient Anti-fingerprinting for Privacy
  1. Michael Ziegler, Mariusz Nowostawski and Basel KattThe Privacy Impact of Dash Mixing Fee Payments
  1. Qianying Liao, Maarten Kesters, Dimitri Van Landuyt and Wouter JoosenData Chameleon:~a self-adaptive synthetic data management system
  1. Francis Wanko Naa, Nora Boulahia-Cuppens and Frederic CuppensOperating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management