Data and Applications Security and Privacy XXXV 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19–20, 2021, Proceedings /
Data and Applications Security and Privacy XXXV 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19–20, 2021, Proceedings / [electronic resource] :
edited by Ken Barker, Kambiz Ghazinour.
- 1st ed. 2021.
- XI, 408 p. 128 illus., 73 illus. in color. online resource.
- Information Systems and Applications, incl. Internet/Web, and HCI, 12840 2946-1642 ; .
- Information Systems and Applications, incl. Internet/Web, and HCI, 12840 .
Differential Privacy -- Cryptology I -- Cryptology II -- Machine Learning -- Potpourri I -- Potpourri II -- Access Control.
This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2021, held in Calgary, Canada, in July 2021.* The 15 full papers and 8 short papers presented were carefully reviewed and selected from 45 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named differential privacy, cryptology, machine learning, access control and others. *The conference was held virtually due to the COVID-19 pandemic.
9783030812423
10.1007/978-3-030-81242-3 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Application software.
Computer networks .
Data mining.
Machine learning.
Data and Information Security.
Cryptology.
Computer and Information Systems Applications.
Computer Communication Networks.
Data Mining and Knowledge Discovery.
Machine Learning.
QA76.9.A25
005.8
Differential Privacy -- Cryptology I -- Cryptology II -- Machine Learning -- Potpourri I -- Potpourri II -- Access Control.
This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2021, held in Calgary, Canada, in July 2021.* The 15 full papers and 8 short papers presented were carefully reviewed and selected from 45 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named differential privacy, cryptology, machine learning, access control and others. *The conference was held virtually due to the COVID-19 pandemic.
9783030812423
10.1007/978-3-030-81242-3 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Application software.
Computer networks .
Data mining.
Machine learning.
Data and Information Security.
Cryptology.
Computer and Information Systems Applications.
Computer Communication Networks.
Data Mining and Knowledge Discovery.
Machine Learning.
QA76.9.A25
005.8