LEADER 01395nam 2200385 a 450 001 9910699287603321 005 20230902162028.0 035 $a(CKB)5470000002401026 035 $a(OCoLC)471482409 035 $a(EXLCZ)995470000002401026 100 $a20091130d1980 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCatalog of Antarctic meteorites, 1977-1978$b[electronic resource] /$fUrsula B. Marvin and Brian Mason, editors 210 1$aWashington :$cSmithsonian Institution Press,$d1980. 215 $a1 online resource (iii, 50 pages) $cillustrations, map 225 1 $aSmithsonian contributions to the earth sciences ;$vno. 23 300 $aTitle from PDF title screen (SI, viewed Aug. 25, 2009). 320 $aIncludes bibliographical references (pages 49-50). 410 0$aSmithsonian contributions to the earth sciences ;$vno. 23. 606 $aMeteorites$zAntarctica$vCatalogs 608 $aCatalogs.$2lcgft 615 0$aMeteorites 701 $aMarvin$b Ursula B$01390904 701 $aMason$b Brian$g(Brian Harold),$f1917-2009.$019213 712 02$aSmithsonian Institution.$bPress. 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910699287603321 996 $aCatalog of Antarctic meteorites, 1977-1978$93444073 997 $aUNINA LEADER 05436nam 22007575 450 001 996664546003316 005 20250623130235.0 010 $a3-031-96590-6 024 7 $a10.1007/978-3-031-96590-6 035 $a(MiAaPQ)EBC32175397 035 $a(Au-PeEL)EBL32175397 035 $a(CKB)39445492300041 035 $a(DE-He213)978-3-031-96590-6 035 $a(OCoLC)1525621346 035 $a(EXLCZ)9939445492300041 100 $a20250623d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData and Applications Security and Privacy XXXIX $e39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025, Proceedings /$fedited by Sokratis Katsikas, Basit Shafiq 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (640 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15722 311 08$a3-031-96589-2 327 $a -- AI applications in security and privacy. -- Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. -- Automated Privacy Policy Analysis using Large Language Models. -- Data Chameleon:?a self-adaptive synthetic data management system. -- Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. -- Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. -- Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. -- Hallucination Detection in Large Language Models using Diversion Decoding. -- User and data privacy. -- Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. -- Enabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains. -- P-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts. -- Performance-Efficient Anti-fingerprinting for Privacy. -- Privacy Management in Cyber-Physical Systems: The DUCA Framework. -- Database and storage security. -- Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. -- Purpose Filter: A space-efficient purpose metadata storage. -- Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. -- Differential privacy. -- Facility Location Problem under Local Differential Privacy without Super-set Assumption. -- Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?. -- Attackers and attack detection. -- Metadata Assisted Supply-Chain Attack Detection for Ansible. -- Diffusion-based Adversarial Purification for Intrusion Detection. -- Feature Identification and Study of Attackers? Behaviours Using Honeypots. -- Access control & Internal Controls and Audit process. -- Supporting Delegation in Outsourced ICA Process. -- Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. -- Cryptography for security and privacy. -- The Privacy Impact of Dash Mixing Fee Payments. -- Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE). 330 $aThis book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy XXXIX, DBSec 2025, held in Gjøvik, Norway, during June 23-24, 2025. The 19 full papers and 5 short papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: AI applications in security and privacy; User and data privacy; Database and storage security; Differential privacy; Attackers and attack detection; Access control & Internal Controls and Audit process; and Cryptography for security and privacy. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15722 606 $aData protection 606 $aComputers 606 $aArtificial intelligence 606 $aData structures (Computer science) 606 $aInformation theory 606 $aDatabase management 606 $aApplication software 606 $aData and Information Security 606 $aComputing Milieux 606 $aArtificial Intelligence 606 $aData Structures and Information Theory 606 $aDatabase Management System 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aComputers. 615 0$aArtificial intelligence. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aDatabase management. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aComputing Milieux. 615 24$aArtificial Intelligence. 615 24$aData Structures and Information Theory. 615 24$aDatabase Management System. 615 24$aComputer and Information Systems Applications. 676 $a005.8 700 $aKatsikas$b Sokratis$0597791 701 $aShafiq$b Basit$01830169 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996664546003316 996 $aData and Applications Security and Privacy XXXIX$94400457 997 $aUNISA