咨询与建议

限定检索结果

文献类型

  • 46 篇 会议

馆藏范围

  • 46 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 36 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 8 篇 信息与通信工程
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 理学
    • 6 篇 数学
    • 1 篇 生物学
  • 4 篇 管理学
    • 3 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 军事学

主题

  • 4 篇 sensitive data
  • 4 篇 security
  • 2 篇 static analysis
  • 2 篇 network security
  • 2 篇 cloud computing
  • 2 篇 privacy
  • 1 篇 pattern mining
  • 1 篇 intrusion detect...
  • 1 篇 iot devices
  • 1 篇 health
  • 1 篇 role-based acces...
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 bindiff
  • 1 篇 human behavior
  • 1 篇 graph database
  • 1 篇 interoperability
  • 1 篇 data privacy
  • 1 篇 smartphones
  • 1 篇 barbican

机构

  • 1 篇 department of co...
  • 1 篇 univ tokyo bunky...
  • 1 篇 stevens inst tec...
  • 1 篇 the pennsylvania...
  • 1 篇 qinghai universi...
  • 1 篇 university of mi...
  • 1 篇 school of electr...
  • 1 篇 kth royal inst t...
  • 1 篇 purdue universit...
  • 1 篇 astar inst infoc...
  • 1 篇 north carolina s...
  • 1 篇 politehnica univ...
  • 1 篇 school of comput...
  • 1 篇 university of lu...
  • 1 篇 fraunhofer aisec...
  • 1 篇 ibm tj watson re...
  • 1 篇 vtt technical re...
  • 1 篇 umass boston uni...
  • 1 篇 bionym inc. on
  • 1 篇 gh raisoni coll ...

作者

  • 2 篇 rizvi syed zain ...
  • 2 篇 islam mohammad s...
  • 2 篇 rughinis razvan
  • 2 篇 ghinita gabriel
  • 2 篇 maiti rajib ranj...
  • 2 篇 kuzu mehmet
  • 2 篇 fong philip w. l...
  • 2 篇 kantarcioglu mur...
  • 1 篇 hsiao shou-ching
  • 1 篇 sistla a. prasad
  • 1 篇 le traon yves
  • 1 篇 litton jan-eric
  • 1 篇 guanyu tian
  • 1 篇 madhavan krishna
  • 1 篇 lovat enrico
  • 1 篇 li yingjiu
  • 1 篇 forg fabian
  • 1 篇 saji nobuyuki
  • 1 篇 michael mitchell
  • 1 篇 chen shanji

语言

  • 46 篇 英文
检索条件"任意字段=4th ACM Conference on Data and Application Security and Privacy, CODASPY 2014"
46 条 记 录,以下是1-10 订阅
排序:
IoTFuzzSentry: Hunting Bugs In the IoT Wilderness In Operational Phase Using Payload Fuzzing  24
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operati...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Chaudhary, Priyanka Rushikesh Krishna, N. Pranav Maiti, Rajib Ranjan BITS Pilani Hyderabad Campus Secunderabad India
In the operational phase, an IoT device runs a light-weight server that is responsible for responding to the user queries, like accessing video and taking a snap in a IoT camera. the flaws in the implementation of cer... 详细信息
来源: 评论
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores  24
Examining Cryptography and Randomness Failures in Open-Sourc...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: English, K. Virgil Bennett, Nathaniel thorn, Seaver Butler, Kevin R. B. Enck, William Traynor, Patrick North Carolina State Univ Raleigh NC 27695 USA Univ Florida Gainesville FL USA
Industry is increasingly adopting private 5G networks to securely manage their wireless devices in retail, manufacturing, natural resources, and healthcare. As with most technology sectors, open-source software is wel... 详细信息
来源: 评论
Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A case study on KRACK attack  24
Guarding the Wi-Fi 4-Way Handshake against Channel-based MiT...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Agrawal, Anand Maiti, Rajib Ranjan Birla Inst Technol & Sci Pilani Dept CSIS Hyderabad Campus Hyderabad India
In the rapidly evolving digital age, the security of wireless networks is paramount. In this paper, we present a comprehensive analysis and defense mechanism against Key Reinstallation Attacks (KRACKs) targeting the W... 详细信息
来源: 评论
Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity application Virtualization Platforms in Android  24
Risky Cohabitation: Understanding and Addressing Over-privil...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Hsiao, Shou-Ching Li, Shih-Wei Hsiao, Hsu-Chun Natl Taiwan Univ Taipei Taiwan Acad Sinica Taipei Taiwan
the Android system protects its users' privacy via app permissions, which govern apps' access to sensitive data and resources. However, recent research has reported that, during app virtualization, the current... 详细信息
来源: 评论
codaspy 2014 - Proceedings of the 4th acm conference on data and application security and privacy
CODASPY 2014 - Proceedings of the 4th ACM Conference on Data...
收藏 引用
4th acm conference on data and application security and privacy, codaspy 2014
the proceedings contain 41 papers. the topics discussed include: on the suitability of dissemination-centric access control systems for group-centric sharing;Streamforce: outsourcing access control enforcement for str...
来源: 评论
Large Scale PoC Experiment with 57,000 people to Accumulate Patterns for Lifestyle Authentication  19
Large Scale PoC Experiment with 57,000 people to Accumulate ...
收藏 引用
9th acm conference on data and application security and privacy (codaspy)
作者: Kobayashi, Ryosuke Saji, Nobuyuki Shigeta, Nobuo Yamaguchi, Rie Shigetomi Mitsubishi Elect Informat Syst Corp Minato Ku 4-13-23 Shibaura Tokyo 1080023 Japan INFOCORPUS Inc Meguro Ku 3-5-1 Shimomeguro Tokyo 1530064 Japan Univ Tokyo Bunkyo Ku 7-3-1 Hongo Tokyo 1138656 Japan
the spread of ICT has made it possible for people to use various online services via the Internet. User authentication technique is important for using online services in order to confirm that the user is legitimate. ... 详细信息
来源: 评论
A deep learning approach for detecting security attacks on blockchain  4
A deep learning approach for detecting security attacks on b...
收藏 引用
4th Italian conference on Cyber security, ITASEC 2020
作者: Scicchitano, Francesco Liguori, Angelica Guarascio, Massimo Ritacco, Ettore Manco, Giuseppe ICAR-CNR Via P. Bucci 8/9c Rende Italy
In these last years, Blockchain technologies have been widely used in several application fields to improve data privacy and trustworthiness and security of systems. Although the blockchain is a powerful tool, it is n... 详细信息
来源: 评论
Efficient Authorization of Graph database Queries in an Attribute-Supporting ReBAC Model  18
Efficient Authorization of Graph Database Queries in an Attr...
收藏 引用
8th acm conference on data and application security and privacy (codaspy)
作者: Rizvi, Syed Zain R. Fong, Philip W. L. Univ Calgary Calgary AB Canada
Neo4j is a popular graph database that offers two versions;a paid enterprise edition and a free community edition. the enterprise edition offers customizable Role-Based Access Control (RBAC) features through custom de... 详细信息
来源: 评论
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android applications  18
SCLib: A Practical and Lightweight Defense against Component...
收藏 引用
8th acm conference on data and application security and privacy (codaspy)
作者: Wu, Daoyuan Cheng, Yao Gao, Debin Li, Yingjiu Deng, Robert H. Singapore Management Univ Sch Informat Syst Singapore Singapore ASTAR Inst Infocomm Res Singapore Singapore Singapore Management Univ Singapore Singapore
Cross-app collaboration via inter-component communication is a fundamental mechanism on Android. Although it brings the benefits such as functionality reuse and data sharing, a threat called component hijacking is als... 详细信息
来源: 评论
Efficient Commodity Matching for privacy-Preserving Two-Party Bartering  17
Efficient Commodity Matching for Privacy-Preserving Two-Part...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Forg, Fabian Wetzel, Susanne Meyer, Ulrike Stevens Inst Technol Hoboken NJ 07030 USA Rhein Westfal TH Aachen Aachen Germany
Current bartering platforms place the burden of finding simultaneously executable quotes on their users. In addition, these bartering platforms do not keep quotes private. To address these shortcomings, this paper int... 详细信息
来源: 评论