咨询与建议

限定检索结果

文献类型

  • 33 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 27 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 4 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 5 篇 privacy
  • 3 篇 internet of thin...
  • 3 篇 traffic analysis
  • 3 篇 behavior-based t...
  • 3 篇 android (operati...
  • 3 篇 pattern recognit...
  • 2 篇 access control
  • 2 篇 preference model
  • 2 篇 cloud computing
  • 2 篇 cloud storage
  • 1 篇 dropbox
  • 1 篇 paillier
  • 1 篇 runtime
  • 1 篇 interdependent p...
  • 1 篇 homomorphic encr...
  • 1 篇 data privacy
  • 1 篇 user profile
  • 1 篇 hidden markov mo...
  • 1 篇 big data
  • 1 篇 sensitive data

机构

  • 3 篇 southeast univ s...
  • 2 篇 global energy in...
  • 1 篇 university of so...
  • 1 篇 faculty of scien...
  • 1 篇 university of br...
  • 1 篇 new york univ ab...
  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 computer science...
  • 1 篇 university of mi...
  • 1 篇 state grid smart...
  • 1 篇 edificio la arbo...
  • 1 篇 department of ps...
  • 1 篇 ecole polytech f...
  • 1 篇 cryptography and...
  • 1 篇 chinese academy ...
  • 1 篇 college of infor...
  • 1 篇 security researc...

作者

  • 3 篇 gu xiaodan
  • 3 篇 ling zhen
  • 3 篇 luo junzhou
  • 3 篇 yang ming
  • 2 篇 bertino elisa
  • 2 篇 shi congcong
  • 1 篇 kini gananand
  • 1 篇 bisht prithvi
  • 1 篇 lee adam j.
  • 1 篇 zhao rui
  • 1 篇 skrupsky nazari
  • 1 篇 mittag jens
  • 1 篇 petracca giusepp...
  • 1 篇 rosen sanae
  • 1 篇 chen xihui
  • 1 篇 oikonomou george
  • 1 篇 rastogi vaibhav
  • 1 篇 venkatakrishnan ...
  • 1 篇 harkous hamza
  • 1 篇 bao feng

语言

  • 34 篇 英文
检索条件"任意字段=3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013"
34 条 记 录,以下是21-30 订阅
排序:
Effect of grammar on security of long passwords  13
Effect of grammar on security of long passwords
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Rao, Ashwini Jha, Birendra Kini, Gananand Carnegie Mellon University United States Massachusetts Institute of Technology United States
Use of long sentence-like or phrase-like passwords such as "abiggerbetterpassword"and"thecommunistfairy"is increasing. In this paper, we study the role of grammatical structures underlying such pas... 详细信息
来源: 评论
Sweetening android lemon markets: Measuring and combating malware in application marketplaces  13
Sweetening android lemon markets: Measuring and combating ma...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Vidas, Timothy Christin, Nicolas Carnegie Mellon University Pittsburgh PA United States
application marketplaces are the main software distribution mechanism for modern mobile devices but are also emerging as a viable alternative to brick-and-mortar stores for personal computers. While most application m... 详细信息
来源: 评论
FENCE: Continuous Access control enforcement in dynamic data stream environments  13
FENCE: Continuous Access control enforcement in dynamic data...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Nehme, Rimma V. Lim, Hyo-Sang Bertino, Elisa Microsoft Jim Gray Systems Lab United States Computer and Telecommunications Engineering Division Yonsei University Korea Republic of Department of Computer Science and Cyber Center Purdue University United States
In this paper, we address the problem of continuous access control enforcement in dynamic data stream environments, where both data and query security restrictions may potentially change in realtime. We present FENCE ... 详细信息
来源: 评论
Multi-user dynamic proofs of data possession using trusted hardware  13
Multi-user dynamic proofs of data possession using trusted h...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Tate, Stephen R. Vishwanathan, Roopa Everhart, Lance Dept. of Computer Science UNC Greensboro United States
In storage outsourcing services, clients store their data on a potentially untrusted server, which has more computational power and storage capacity than the individual clients. In this model, security properties such... 详细信息
来源: 评论
Insured access: An approach to ad-hoc information sharing for virtual organizations  13
Insured access: An approach to ad-hoc information sharing fo...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Tanaka, Naoki Winslett, Marianne Lee, Adam J. Yau, David K.Y. Bao, Feng Department of Computer Science University of Illinois Urbana-Champaign United States Cryptography and Security Department Institute for Infocomm Research United States Advanced Digital Sciences Center United States Department of Computer Science University of Pittsburgh United States Department of Computer Science Purdue University United States
A virtual organization (VO) is a group of organizations that have banded together to achieve a common goal. Often a VO could function more effectively if its members were willing to share certain information. However,... 详细信息
来源: 评论
privacy preserving similarity detection for data analysis
Privacy preserving similarity detection for data analysis
收藏 引用
3rd IEEE International conference on Cloud and Green Computing (CGC)
作者: Leontiadis, Iraklis Oenen, Melek Molva, Refik Chorley, M. J. Colombo, G. B. EURECOM Networking & Secur Dept Sophia Antipolis France Cardiff Univ Sch Comp Sci & Informat Cardiff South Glam Wales
Current applications tend to use personal sensitive information to achieve better quality with respect to their services. Since the third parties are not trusted the data must be protected such that individual data pr... 详细信息
来源: 评论
Investigating the application of One Instruction Set Computing for Encrypted data Computation
Investigating the Application of One Instruction Set Computi...
收藏 引用
3rd International conference on security, privacy, and Applied Cryptography Engineering (SPACE)
作者: Tsoutsos, Nektarios Georgios Maniatakos, Michail NYU Polytech Sch Engn 550 1St Ave New York NY 10012 USA New York Univ Abu Dhabi Elect & Comp Engn Abu Dhabi U Arab Emirates
The cloud computing revolution has emphasized the need to execute programs in private using third party infrastructure. In this work, we investigate the application of One Instruction Set Computing (OISC) for processi... 详细信息
来源: 评论
Automated determination of security services to ensure personal data protection in the Internet of Things applications
Automated determination of security services to ensure perso...
收藏 引用
2013 3rd International conference on Innovative Computing Technology, INTECH 2013
作者: Sanchez Alcon, J.A. Lopez, Lourdes Martinez, Jose-Fernan Castillejo, Pedro Edificio la Arboleda Ctra. Valencia Km 7 28031 Madrid Spain
This paper describes a method aimed at automatically determining security services to be implemented in products, services and devices involved on the Internet of Things scenarios. It is important to consider the spec... 详细信息
来源: 评论
security, privacy, and Applied Cryptography Engineering - 3rd International conference, SPACE 2013, Proceedings
Security, Privacy, and Applied Cryptography Engineering - 3r...
收藏 引用
3rd International conference on security, privacy, and Applied Cryptography Engineering, SPACE 2013
The proceedings contain 12 papers. The topics discussed include: three design dimensions of secure embedded systems;investigating the application of one instruction set computing for encrypted data computation;alphanu...
来源: 评论
The novel application model of internet of things based on IPv6 technology
The novel application model of internet of things based on I...
收藏 引用
2013 3rd International conference on Advanced Measurement and Test, AMT 2013
作者: Kuang, Guo Fang Kuang, Chun Lin College of Information Technology Luoyang Normal University Luoyang 471022 China
IPv6 not only solves the problem of IP address deficient, also simplified the protocol header, and the success of the introduction of two new extension header AH and ESP. The Internet of things perceived terminal data... 详细信息
来源: 评论