咨询与建议

限定检索结果

文献类型

  • 33 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 27 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 4 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 5 篇 privacy
  • 3 篇 internet of thin...
  • 3 篇 traffic analysis
  • 3 篇 behavior-based t...
  • 3 篇 android (operati...
  • 3 篇 pattern recognit...
  • 2 篇 access control
  • 2 篇 preference model
  • 2 篇 cloud computing
  • 2 篇 cloud storage
  • 1 篇 dropbox
  • 1 篇 paillier
  • 1 篇 runtime
  • 1 篇 interdependent p...
  • 1 篇 homomorphic encr...
  • 1 篇 data privacy
  • 1 篇 user profile
  • 1 篇 hidden markov mo...
  • 1 篇 big data
  • 1 篇 sensitive data

机构

  • 3 篇 southeast univ s...
  • 2 篇 global energy in...
  • 1 篇 university of so...
  • 1 篇 faculty of scien...
  • 1 篇 university of br...
  • 1 篇 new york univ ab...
  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 computer science...
  • 1 篇 university of mi...
  • 1 篇 state grid smart...
  • 1 篇 edificio la arbo...
  • 1 篇 department of ps...
  • 1 篇 ecole polytech f...
  • 1 篇 cryptography and...
  • 1 篇 chinese academy ...
  • 1 篇 college of infor...
  • 1 篇 security researc...

作者

  • 3 篇 gu xiaodan
  • 3 篇 ling zhen
  • 3 篇 luo junzhou
  • 3 篇 yang ming
  • 2 篇 bertino elisa
  • 2 篇 shi congcong
  • 1 篇 kini gananand
  • 1 篇 bisht prithvi
  • 1 篇 lee adam j.
  • 1 篇 zhao rui
  • 1 篇 skrupsky nazari
  • 1 篇 mittag jens
  • 1 篇 petracca giusepp...
  • 1 篇 rosen sanae
  • 1 篇 chen xihui
  • 1 篇 oikonomou george
  • 1 篇 rastogi vaibhav
  • 1 篇 venkatakrishnan ...
  • 1 篇 harkous hamza
  • 1 篇 bao feng

语言

  • 34 篇 英文
检索条件"任意字段=3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013"
34 条 记 录,以下是1-10 订阅
排序:
codaspy 2013 - Proceedings of the 3rd acm conference on data and application security and privacy
CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
The proceedings contain 41 papers. The topics discussed include: for some eyes only: protecting online information sharing;do online social network friends still threaten my privacy?;exploring dependency for query pri...
来源: 评论
A message authentication scheme for VANETs based on trapdoor hash function  3
A message authentication scheme for VANETs based on trapdoor...
收藏 引用
3rd IEEE International conference on Big data Analysis, ICBDA 2018
作者: Yang, Xiaodong An, Faying Yang, Ping Xiao, Likun Li, Yutong Ma, Tingchun Wang, Caifen College of Computer Science and Engineering Northwest Normal University Lanzhou China
Vehicle ad-hoc networks (VANETs) is an important area of big data application. Big data can help VANETs to solve the traffic safety and congestion problems faced by many cities. In this paper, based on proxy re-signat... 详细信息
来源: 评论
"If You Can't Beat them, Join them": A Usability Approach to Interdependent privacy in Cloud Apps  17
"If You Can't Beat them, Join them": A Usability Approach to...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Harkous, Hamza Aberer, Karl Ecole Polytech Fed Lausanne Lausanne Switzerland
Cloud storage services, like Dropbox and Google Drive, have growing ecosystems of 3rd party apps that are designed to work with users' cloud files. Such apps often request full access to users' files, includin... 详细信息
来源: 评论
A novel attack to track users based on the behavior patterns
A novel attack to track users based on the behavior patterns
收藏 引用
3rd International conference on Advanced Cloud and Big data (CBD)
作者: Gu, Xiaodan Yang, Ming Shi, Congcong Ling, Zhen Luo, Junzhou Southeast Univ Sch Comp Sci & Engn Nanjing Jiangsu Peoples R China Global Energy Interconnect Res Inst Nanjing Jiangsu Peoples R China
Currently, people around the world daily use the Internet to access various services, such as e-mail and online shopping. However, the behavior-based tracking attacks have posed a considerable threat to users' pri... 详细信息
来源: 评论
A novel attack to track users based on the behavior patterns
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2017年 第6期29卷
作者: Gu, Xiaodan Yang, Ming Shi, Congcong Ling, Zhen Luo, Junzhou Southeast Univ Sch Comp Sci & Engn Nanjing Jiangsu Peoples R China Global Energy Interconnect Res Inst Nanjing Jiangsu Peoples R China
Currently, people around the world daily use the Internet to access various services, such as e-mail and online shopping. However, the behavior-based tracking attacks have posed a considerable threat to users' pri... 详细信息
来源: 评论
A Novel Behavior-based Tracking Attack for User Identification  3
A Novel Behavior-based Tracking Attack for User Identificati...
收藏 引用
3rd International conference on Advanced Cloud and Big data (CBD)
作者: Gu, Xiaodan Yang, Ming Fei, Jiaxuan Ling, Zhen Luo, Junzhou Southeast Univ Sch Comp Sci & Engn Nanjing Jiangsu Peoples R China State Grid Smart Grid Res Inst Beijing Peoples R China
Currently, people around the world daily use the Internet to access various services, such as, email and online shopping. However, the behavior-based tracking attacks have posed a considerable threat to users' pri... 详细信息
来源: 评论
An extensible platform for the forensic analysis of social media data  3rd
An extensible platform for the forensic analysis of social m...
收藏 引用
3rd International conference on Human Aspects of Information security, privacy and Trust, HAS 2015 Held as Part of 17th International conference on Human-Computer Interaction, HCI International 2015
作者: Read, Huw Xynos, Konstantinos Sutherland, Iain Roarson, Frode Andriotis, Panagiotis Oikonomou, George University of South Wales PontypriddCF37 1DL United Kingdom Noroff University College 4608 Kristiansand S Vest Agder Norway University of Bristol BristolBS8 1TH United Kingdom Security Research Institute Edith Cowan University Perth Australia
Visualising data is an important part of the forensic analysis process. Many cell phone forensic tools have specialised visualisation components, but are as of yet able to tackle questions concerning the broad spectru... 详细信息
来源: 评论
AppsPlayground: Automatic security analysis of smartphone applications  13
AppsPlayground: Automatic security analysis of smartphone ap...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Rastogi, Vaibhav Chen, Yan Enck, William Northwestern University United States North Carolina State University United States
Today's smartphone application markets host an ever in- creasing number of applications. The sheer number of ap- plications makes their review a daunting task. We propose AppsPlayground for Android, a framework th... 详细信息
来源: 评论
TamperProof: A server-agnostic defense for parameter tampering attacks on web applications  13
TamperProof: A server-agnostic defense for parameter tamperi...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Skrupsky, Nazari Bisht, Prithvi Hinrichs, Timothy Venkatakrishnan, V.N. Zuck, Lenore University of Illinois Chicago United States
Parameter tampering attacks are dangerous to a web application whose server performs weaker data sanitization than its client. This paper presents TamperProof, a methodology and tool that offers a novel and efficient ... 详细信息
来源: 评论
privacy by design: Formal framework for the analysis of architectural choices
Privacy by design: Formal framework for the analysis of arch...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Le Métayer, Daniel CITI Domaine Scientifique de La Doua Inria University of Lyon 6 avenue des Arts 69621 Villeurbanne France
The privacy by design approach has already been applied in different areas. We believe that the next challenge in this area today is to go beyond individual cases and to provide methodologies to explore the design spa... 详细信息
来源: 评论