咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 46 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 37 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 6 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 18 篇 理学
    • 17 篇 数学
    • 1 篇 物理学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 军事学

主题

  • 5 篇 privacy
  • 3 篇 iot
  • 3 篇 differential pri...
  • 2 篇 smpc
  • 2 篇 attacks
  • 2 篇 security
  • 1 篇 internet of thin...
  • 1 篇 log obfuscation
  • 1 篇 conditional gan
  • 1 篇 hijacking
  • 1 篇 policy language
  • 1 篇 web tracking
  • 1 篇 access control
  • 1 篇 human behavior
  • 1 篇 homomorphic encr...
  • 1 篇 data privacy
  • 1 篇 mobile devices
  • 1 篇 privacy leakage
  • 1 篇 tags
  • 1 篇 deep learning se...

机构

  • 2 篇 north carolina s...
  • 2 篇 rhein westfal th...
  • 1 篇 florida int univ...
  • 1 篇 penn state univ ...
  • 1 篇 univ tokyo bunky...
  • 1 篇 univ coimbra cis...
  • 1 篇 centre for advan...
  • 1 篇 shenzhen huazhon...
  • 1 篇 hunan automobile...
  • 1 篇 chinese acad sci...
  • 1 篇 inria le chesnay
  • 1 篇 zhejiang key lab...
  • 1 篇 shandong univers...
  • 1 篇 penn state univ ...
  • 1 篇 natl univ singap...
  • 1 篇 ericsson secur r...
  • 1 篇 computer science...
  • 1 篇 nanyang technolo...
  • 1 篇 school of comput...
  • 1 篇 florida polytech...

作者

  • 2 篇 klinger andreas
  • 2 篇 meyer ulrike
  • 2 篇 chen bo
  • 2 篇 liu peng
  • 1 篇 atsley ryan she
  • 1 篇 wu dinghao
  • 1 篇 xia luning
  • 1 篇 gupta maanak
  • 1 篇 li jiahao
  • 1 篇 onen melek
  • 1 篇 he ruhan
  • 1 篇 alcantara nathan...
  • 1 篇 mcdaniel patrick
  • 1 篇 faith ayodele
  • 1 篇 luo xiaonan
  • 1 篇 mannan mohammad
  • 1 篇 saji nobuyuki
  • 1 篇 ghazali kamarul ...
  • 1 篇 shen yanjin
  • 1 篇 carlsson niklas

语言

  • 44 篇 英文
  • 2 篇 其他
检索条件"任意字段=13th ACM Conference on Data and Application Security and Privacy, CODASPY 2023"
46 条 记 录,以下是1-10 订阅
排序:
codaspy 2023 - Proceedings of the 13th acm conference on data and application security and privacy
CODASPY 2023 - Proceedings of the 13th ACM Conference on Dat...
收藏 引用
13th acm conference on data and application security and privacy, codaspy 2023
the proceedings contain 30 papers. the topics discussed include: comparative privacy analysis of mobile browsers;IdDecoder: a face embedding inversion tool and its privacy and security implications on facial recogniti...
来源: 评论
GROTE: Group Testing for privacy-Preserving Face Identification  23
GROTE: Group Testing for Privacy-Preserving Face Identificat...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Ibarrondo, Alberto Chabanne, Herve Despiegel, Vincent Onen, Melek Idemia Paris France EURECOM Sophia Antipolis France
this paper proposes a novel method to perform privacy-preserving face identification based on the notion of group testing, and applies it to a solution using the Cheon-Kim-Kim-Song (CKKS) homomorphic encryption scheme... 详细信息
来源: 评论
the Design of an Ontology for ATT&CK and its application to Cybersecurity  23
The Design of an Ontology for ATT&CK and its Application to ...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Akbar, Khandakar Ashrafi Halim, Sadaf Md Singhal, Anoop Abdeen, Basel Khan, Latifur thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA Natl Inst Stand & Technol Gaithersburg MD 20899 USA
the spread of attacks in computer networks and within systems can have severe consequences for both individuals and organizations. One approach to preventing the spread of attacks is to use ontological aid, which is t... 详细信息
来源: 评论
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux  23
Infotainment System Matters: Understanding the Impact and Im...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Jeong, Seonghoon Ryu, Minsoo Kang, Hyunjae Kim, Huy Kang Korea Univ Sch Cybersecur Seoul South Korea
An in-vehicle infotainment (IVI) system is connected to heterogeneous networks such as Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything communications. An IVI system has control... 详细信息
来源: 评论
privacy-Preserving Fully Online Matching with Deadlines  23
Privacy-Preserving Fully Online Matching with Deadlines
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Klinger, Andreas Meyer, Ulrike Rhein Westfal TH Aachen Aachen Germany
In classical secure multi-party computation (SMPC) it is assumed that a fixed and a priori known set of parties wants to securely evaluate a function of their private inputs. this assumption implies that online proble... 详细信息
来源: 评论
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation  23
Anonymous System for Fully Distributed and Robust Secure Mul...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Klinger, Andreas Battermann, Felix Meyer, Ulrike Rhein Westfal TH Aachen Aachen Germany
In secure multi-party computation (SMPC), it is considered that multiple parties that are known to each other evaluate a function over their private inputs in a secure fashion. the participating parties do not learn a... 详细信息
来源: 评论
SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand  23
SCAtt-man: Side-Channel-Based Remote Attestation for Embedde...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Surminski, Sebastian Niesler, Christian Linsner, Sebastian Davi, Lucas Reuter, Christian Univ Duisburg Essen Essen Germany Tech Univ Darmstadt Darmstadt Germany
From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely th... 详细信息
来源: 评论
All Your IoT Devices Are Belong to Us: securityWeaknesses in IoT Management Platforms  23
All Your IoT Devices Are Belong to Us: SecurityWeaknesses in...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Tejaswi, Bhaskar Mannan, Mohammad Youssef, Amr Concordia Univ Montreal PQ Canada
IoT devices have become an integral part of our day to day activities, and are also being deployed to fulfil a number of industrial, enterprise and agricultural use cases. To efficiently manage and operate these devic... 详细信息
来源: 评论
IdDecoder: A Face Embedding Inversion Tool and its privacy and security Implications on Facial Recognition Systems  23
IdDecoder: A Face Embedding Inversion Tool and its Privacy a...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Minh-Ha Le Carlsson, Niklas Linkoping Univ Linkoping Sweden
Most state-of-the-art facial recognition systems (FRS:s) use face embeddings. In this paper, we present the IdDecoder framework, capable of effectively synthesizing realistic-neutralized face images from face embeddin... 详细信息
来源: 评论
Tool/dataset Paper: Realistic ABAC data Generation using Conditional Tabular GAN  23
Tool/Dataset Paper: Realistic ABAC Data Generation using Con...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Rai, Ritwik Sural, Shamik Indian Inst Technol Kharagpur Kharagpur W Bengal India
Attribute-based Access Control (ABAC) is increasingly being used in a wide variety of applications that include cloud services, IoT, smart homes, healthcare and several others. Conducting systematic and reproducible e... 详细信息
来源: 评论