咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 78 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 63 篇 工学
    • 52 篇 计算机科学与技术...
    • 20 篇 信息与通信工程
    • 19 篇 软件工程
    • 16 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 水利工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 6 篇 理学
    • 3 篇 物理学
    • 2 篇 数学
    • 2 篇 生物学
    • 1 篇 大气科学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 8 篇 network security
  • 6 篇 security
  • 4 篇 trust
  • 3 篇 intrusion detect...
  • 3 篇 resource managem...
  • 3 篇 cryptography
  • 2 篇 computer science
  • 2 篇 access control
  • 2 篇 mobile ad hoc ne...
  • 2 篇 communication sy...
  • 2 篇 fault tolerance
  • 2 篇 authentication
  • 2 篇 remote attestati...
  • 2 篇 cloud
  • 2 篇 computer system ...
  • 2 篇 network coding
  • 2 篇 wireless sensor ...
  • 2 篇 game theory
  • 2 篇 systems analysis
  • 2 篇 mobile computing

机构

  • 4 篇 chinese acad sci...
  • 2 篇 hp
  • 2 篇 pucrs
  • 2 篇 dalian univ tech...
  • 2 篇 id-imag grenoble
  • 1 篇 sungkyunkwan uni...
  • 1 篇 ibm global solut...
  • 1 篇 univ wisconsin d...
  • 1 篇 univ michigan an...
  • 1 篇 chinese acad sci...
  • 1 篇 department of co...
  • 1 篇 univ aizu div in...
  • 1 篇 electrical engin...
  • 1 篇 department of co...
  • 1 篇 dalian univ tech...
  • 1 篇 politechnic scho...
  • 1 篇 nyu comp sci & e...
  • 1 篇 evergreen state ...
  • 1 篇 univ waikato cyb...
  • 1 篇 hosei univ dept ...

作者

  • 2 篇 bouhoula adel
  • 1 篇 liang fengrui
  • 1 篇 jankowiak i.
  • 1 篇 cherfaoui véroni...
  • 1 篇 li sen
  • 1 篇 giffin jonathon ...
  • 1 篇 o. richard
  • 1 篇 ateniese giusepp...
  • 1 篇 kong huafeng
  • 1 篇 f.i. massetto
  • 1 篇 jacob florian
  • 1 篇 yao wei
  • 1 篇 maillard n.
  • 1 篇 chenyu yan
  • 1 篇 kim hyoungshick
  • 1 篇 li xin
  • 1 篇 coombes peter j
  • 1 篇 yu wang
  • 1 篇 fengrui liang
  • 1 篇 yang bo

语言

  • 77 篇 英文
  • 1 篇 中文
检索条件"任意字段=14th Symposium on Network and Distributed System Security, NDSS 2007"
78 条 记 录,以下是1-10 订阅
排序:
Proceedings of the symposium on network and distributed system security, ndss 2007
Proceedings of the Symposium on Network and Distributed Syst...
收藏 引用
14th symposium on network and distributed system security, ndss 2007
the proceedings contain 17 papers. the topics discussed include: a quantitative study of forum spamming using context-based analysis;army of botnets;attribute-based publishing with hidden credentials and hidden polici...
来源: 评论
File system Design with Assured Delete  14
File System Design with Assured Delete
收藏 引用
14th symposium on network and distributed system security, ndss 2007
作者: Perlman, Radia Sun Microsystems United States
this paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. this design supports three types of assured delete;expirati... 详细信息
来源: 评论
On the Computational Practicality of Private Information Retrieval  14
On the Computational Practicality of Private Information Ret...
收藏 引用
14th symposium on network and distributed system security, ndss 2007
作者: Sion, Radu Carbunar, Bogdan Network Security and Applied Cryptography Lab Computer Sciences Stony Brook University United States Pervasive Platforms and Architectures Motorola Labs United States
We explore the limits of single-server computational private information retrieval (PIR) for the purpose of preserving client access patterns leakage. We show that deployment of non-trivial single server PIR protocols... 详细信息
来源: 评论
Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized network Traces  14
Playing Devil’s Advocate: Inferring Sensitive Information f...
收藏 引用
14th symposium on network and distributed system security, ndss 2007
作者: Coull, Scott E. Wright, Charles V. Monrose, Fabian Collins, Michael P. Reiter, Michael K. Department of Computer Science Johns Hopkins University BaltimoreMD United States CERT/Network Situational Awareness Software Engineering Institute Carnegie Mellon University United States Electrical & Computer Engineering Department Computer Science Department Carnegie Mellon University PittsburghPA United States
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publishing organization. To address this d... 详细信息
来源: 评论
Secret Handshakes with Dynamic and Fuzzy Matching  14
Secret Handshakes with Dynamic and Fuzzy Matching
收藏 引用
14th symposium on network and distributed system security, ndss 2007
作者: Ateniese, Giuseppe Blanton, Marina Kirsch, Jonathan Department of Computer Science The Johns Hopkins University United States Department of Computer Science Purdue University United States
the need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have become critical primitives in building ... 详细信息
来源: 评论
Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web  20
Behind the Scenes of Online Attacks: an Analysis of Exploita...
收藏 引用
20th Annual network and distributed system security symposium, ndss 2013
作者: Canali, Davide Balzarotti, Davide EURECOM France
Web attacks are nowadays one of the major threats on the Internet, and several studies have analyzed them, providing details on how they are performed and how they spread. However, no study seems to have sufficiently ... 详细信息
来源: 评论
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control  25
Exposing Congestion Attack on Emerging Connected Vehicle bas...
收藏 引用
25th Annual network and distributed system security symposium (ndss)
作者: Chen, Qi Alfred Yin, Yucheng Feng, Yiheng Mao, Z. Morley Liu, Henry X. Univ Michigan Ann Arbor MI 48109 USA
Connected vehicle (CV) technology will soon transform today's transportation systems by connecting vehicles and the transportation infrastructure through wireless communication. Having demonstrated the potential t... 详细信息
来源: 评论
CODO: Firewall traversal by cooperative on-demand opening
CODO: Firewall traversal by cooperative on-demand opening
收藏 引用
14th IEEE International symposium on High Performance distributed Computing
作者: Son, SC Allcock, B Livny, M Univ Wisconsin Dept Comp Sci Madison WI 53706 USA
Firewalls and network address translators (NATs) cause significant connectivity problems along with benefits such as network protection and easy address planning. Connectivity problems make nodes separated by a firewa... 详细信息
来源: 评论
Get a Model! Model Hijacking Attack Against Machine Learning Models  29
Get a Model! Model Hijacking Attack Against Machine Learning...
收藏 引用
29th Annual network and distributed system security symposium, ndss 2022
作者: Salem, Ahmed Backes, Michael Zhang, Yang CISPA Helmholtz Center for Information Security Germany
Machine learning (ML) has established itself as a cornerstone for various critical applications ranging from autonomous driving to authentication systems. However, with this increasing adoption rate of machine learnin... 详细信息
来源: 评论
No Grammar, No Problem: Towards Fuzzing the Linux Kernel without system-Call Descriptions  30
No Grammar, No Problem: Towards Fuzzing the Linux Kernel wit...
收藏 引用
30th Annual network and distributed system security symposium, ndss 2023
作者: Bulekov, Alexander Das, Bandan Hajnoczi, Stefan Egele, Manuel Boston University United States Red Hat
the integrity of the entire computing ecosystem depends on the security of our operating systems (OSes). Unfortunately, due to the scale and complexity of OS code, hundreds of security issues are found in OSes, every ...
来源: 评论