咨询与建议

限定检索结果

文献类型

  • 443 篇 会议
  • 31 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 301 篇 工学
    • 228 篇 计算机科学与技术...
    • 168 篇 信息与通信工程
    • 134 篇 软件工程
    • 82 篇 电气工程
    • 34 篇 控制科学与工程
    • 22 篇 网络空间安全
    • 17 篇 交通运输工程
    • 15 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 11 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 8 篇 动力工程及工程热...
    • 7 篇 生物医学工程(可授...
    • 5 篇 建筑学
    • 4 篇 土木工程
  • 45 篇 理学
    • 26 篇 数学
    • 11 篇 化学
    • 9 篇 生物学
    • 4 篇 物理学
    • 4 篇 统计学(可授理学、...
    • 3 篇 大气科学
  • 38 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 10 篇 社会学
  • 12 篇 医学
    • 10 篇 公共卫生与预防医...
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 68 篇 security
  • 58 篇 privacy
  • 42 篇 authentication
  • 24 篇 data privacy
  • 24 篇 wireless sensor ...
  • 22 篇 computer communi...
  • 19 篇 internet of thin...
  • 19 篇 protocols
  • 16 篇 network security
  • 15 篇 information syst...
  • 14 篇 vehicular ad hoc...
  • 14 篇 cryptology
  • 13 篇 communication sy...
  • 13 篇 encryption
  • 13 篇 systems and data...
  • 12 篇 blockchain
  • 11 篇 data security
  • 10 篇 wireless communi...
  • 10 篇 wireless network...
  • 9 篇 scalability

机构

  • 5 篇 maharishi school...
  • 4 篇 department of pr...
  • 4 篇 school of busine...
  • 4 篇 maharishi school...
  • 4 篇 department of ma...
  • 4 篇 department of cy...
  • 4 篇 laboratory of ur...
  • 4 篇 faculty of engin...
  • 3 篇 centre of interd...
  • 3 篇 chitkara univers...
  • 3 篇 department of in...
  • 3 篇 centre for inter...
  • 3 篇 vishwakarma inst...
  • 3 篇 delft university...
  • 3 篇 department of in...
  • 3 篇 chitkara univers...
  • 3 篇 ibm thomas j. wa...
  • 3 篇 sathyabama insti...
  • 2 篇 department of me...
  • 2 篇 cas institute of...

作者

  • 4 篇 bernady o. apduh...
  • 4 篇 osvaldo gervasi
  • 4 篇 ana maria a. c. ...
  • 4 篇 beniamino murgan...
  • 4 篇 sanjay misra
  • 4 篇 nadia nedjah
  • 4 篇 david taniar
  • 3 篇 sencun zhu
  • 3 篇 kui ren
  • 3 篇 jiwu jing
  • 3 篇 xiaodong lin
  • 3 篇 joaquin garcia-a...
  • 3 篇 ali ghorbani
  • 3 篇 aiqing zhang
  • 3 篇 zhou jianying
  • 2 篇 ankit verma
  • 2 篇 jianying zhou
  • 2 篇 saxena ashutosh
  • 2 篇 jian-hua dai
  • 2 篇 jianhua sun

语言

  • 401 篇 英文
  • 74 篇 其他
  • 10 篇 中文
检索条件"任意字段=3rd International Conference on Security and Privacy in Communication Networks and Workshops"
479 条 记 录,以下是1-10 订阅
排序:
Supply chain optimization: cross-chain data privacy protection scheme based on semi-homomorphic encryption.  24
Supply chain optimization: cross-chain data privacy protecti...
收藏 引用
3rd international conference on Cryptography, Network security and communication Technology (CNSCT)
作者: Guo, Yahui Cai, Zhiming Chen, Jian Hu, Shanwen City Univ Macau Fac Data Sci Taipa Macao Peoples R China Macau Millennium Coll Fac Digital Sci Macau Peoples R China
The existing blockchain technology has provided us with new tools to address the issue of product traceability in supply chain management, allowing for true paperless implementation of specific transaction documents. ... 详细信息
来源: 评论
privacy-Preserving Computing Scheme for Ciphertext Neural Network Training  24
Privacy-Preserving Computing Scheme for Ciphertext Neural Ne...
收藏 引用
3rd international conference on Cryptography, Network security and communication Technology (CNSCT)
作者: Yang, Shuya Li, Xiaodong Zhang, Jianyi Beijing Elect Sci & Technol Inst Beijing Peoples R China
With the rapid development of artificial intelligence, privacy protection of AI is critical for prediction and training on sensitive data. A novel scheme is presented for privacy-preserving neural network training bas... 详细信息
来源: 评论
Applicability of Fully Homomorphic Encryption in Mobile communication  3
Applicability of Fully Homomorphic Encryption in Mobile Comm...
收藏 引用
3rd international conference on 6G Networking, 6GNet 2024
作者: Sanon, Sogo Pierre Ademi, Ilir Zentara, Michael Schotten, Hans Dieter German Research Center for Artificial Intelligence Intelligent Networks Research Group KaiserslauternD-67663 Germany Institute for Wireless Communication and Navigation RPTU Kaiserslautern-Landau KaiserslauternD-67663 Germany
With the rapid evolution of wireless mobile communication technologies, the advent of Sixth Generation (6G) networks promises unprecedented advancements in speed, reliability, and connectivity. However, the need for r... 详细信息
来源: 评论
BEAT-Traffic: a Blockchain-Enabled infrastructure for Anonymous-yet-Traceable Traffic reporting  53
BEAT-Traffic: a Blockchain-Enabled infrastructure for Anonym...
收藏 引用
53rd Annual IEEE/IFIP international conference on Dependable Systems and networks (DSN)
作者: Dehez-Clementi, Marina Deneuville, Jean-Christophe Lochin, Emmanuel Lacan, Jerome Univ Toulouse ISAE SUPAERO Toulouse France Univ Toulouse Ecole Natl Aviat Civile Toulouse France
Intelligent Transportation Systems (ITS) have become increasingly popular in recent years, and are viewed as the future of transportation. These systems rely heavily on open communication networks to ensure road safet... 详细信息
来源: 评论
A Comprehensive Review of Different Frameworks for Ensuring Data privacy and security for IoT networks in Smart City  3
A Comprehensive Review of Different Frameworks for Ensuring ...
收藏 引用
3rd international conference on Intelligent Data communication Technologies and Internet of Things, IDCIoT 2025
作者: Kotian, Abhijith L. Abhishek, B. Allapur, Abhishek R. Gowda, Abhishek Gowda, Amith Alva’s Institute of Engineering and Technology Moodbidri India
Smart cities can be described as the integration of advanced technologies mainly comprising the Internet of Things (IoT) technology in an effort to change urban environments by increasing efficiency, sustainability, a... 详细信息
来源: 评论
Auditable Data Sharing Model for Multi-Domain privacy Information Retrieval  24
Auditable Data Sharing Model for Multi-Domain Privacy Inform...
收藏 引用
3rd international conference on networks, communications and Information Technology (CNCIT)
作者: Wang, Boyi Liu, Peng Li, Chunpei Huo, Hao Chen, Yuhan Guangxi Normal Univ Guilin Guangxi Peoples R China
In recent years, heightened concerns regarding personal privacy and trade secrets underscore the need to safeguard retrieved statements in data interactions, often containing easily compromised sensitive information. ... 详细信息
来源: 评论
Blockchain based security Enhancement in Decentralized Storage of IPFS using Filecoin  3
Blockchain based Security Enhancement in Decentralized Stora...
收藏 引用
3rd international conference on Intelligent Data communication Technologies and Internet of Things, IDCIoT 2025
作者: Verma, Ankit Singh, Tanya Raj, Sanyam Dwivedi, Rajendra Kumar Department of ITCA Madan Mohan Malaviya University of Technology Gorakhpur India
Decentralized storage alternatives are the revolutionary way to overcome the shortcomings of centralized data storage systems. These alternatives rely on security, privacy, and scalability through blockchain technolog... 详细信息
来源: 评论
An Efficient Anonymous Authentication Scheme for Cross-zone Scenarios in VANETs Efficient Authentication for Cross-Zone in VANETs  24
An Efficient Anonymous Authentication Scheme for Cross-zone ...
收藏 引用
3rd international conference on Signal Processing, Computer networks and communications, SPCNC 2024
作者: Lin, Ruomeng Ma, Wei Li, Kaiyue City University of Macau China
Vehicular Ad Hoc networks (VANETs) serve as a critical solution for ensuring the safe and efficient operation of intelligent transportation systems and show great potential in the deployment of autonomous driving scen... 详细信息
来源: 评论
Graph-Theoretical Approaches Integrated with Deep Learning for Data privacy Enhancement in Blockchain networks  3
Graph-Theoretical Approaches Integrated with Deep Learning f...
收藏 引用
3rd international conference on Integrated Circuits and communication Systems, ICICACS 2025
作者: Bala Samuvel, J. Mahmoud, Mina Ismail Lotus, A. Annie Rajeshwari, M. Mutlag, Ali Hilal Raj, I. Infant Srm Institute of Science and Technology Department of Mathematics Chennai India Uruk University Department of Radiology Techniques Baghdad Iraq Sona College of Technology Department of Mathematics Salem India Presidency University Department of Mathematics Bangalore India Al Kitab University Department of Medical Engineering Kirkuk Iraq K. Ramakrishnan College of Engineering Department of Computer Science and Engineering Trichy India
Blockchain creates a decentralized platform which maintains strong security while showing all transactions completely transparently throughout diverse applications from financial networks to supply chain processes. It... 详细信息
来源: 评论
Proceedings of 2024 3rd international conference on Cryptography, Network security and communication Technology, CNSCT 2024
Proceedings of 2024 3rd International Conference on Cryptogr...
收藏 引用
3rd international conference on Cryptography, Network security and communication Technology, CNSCT 2024
The proceedings contain 110 papers. The topics discussed include: experimental design of Intranet penetration for anti-virus traffic characterization;software-define cloud-edge collaborative defense architecture again...
来源: 评论