咨询与建议

限定检索结果

文献类型

  • 43 篇 会议

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 28 篇 计算机科学与技术...
    • 16 篇 软件工程
    • 6 篇 信息与通信工程
    • 3 篇 电气工程
    • 3 篇 安全科学与工程
    • 2 篇 控制科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 7 篇 管理学
    • 5 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 6 篇 理学
    • 6 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 4 篇 privacy
  • 3 篇 machine learning
  • 3 篇 mobile security
  • 2 篇 access control
  • 2 篇 big data
  • 2 篇 androids
  • 2 篇 sensitive data
  • 2 篇 static analysis
  • 2 篇 security
  • 1 篇 obstruction
  • 1 篇 consumers
  • 1 篇 human behavior
  • 1 篇 data privacy
  • 1 篇 privacy policy
  • 1 篇 linux
  • 1 篇 smartphones
  • 1 篇 security model
  • 1 篇 business process
  • 1 篇 one time passwor...
  • 1 篇 cryptography mis...

机构

  • 2 篇 computer science...
  • 2 篇 google inc. irvi...
  • 1 篇 natl res univ hi...
  • 1 篇 department of ps...
  • 1 篇 linköping univer...
  • 1 篇 univ tokyo bunky...
  • 1 篇 mobileevolution ...
  • 1 篇 dept. of electri...
  • 1 篇 key laboratory o...
  • 1 篇 ericsson secur r...
  • 1 篇 astar inst infoc...
  • 1 篇 north carolina s...
  • 1 篇 dept. of compute...
  • 1 篇 university of pi...
  • 1 篇 snt university o...
  • 1 篇 department of co...
  • 1 篇 unc dept comp sc...
  • 1 篇 university of pa...
  • 1 篇 mitsubishi elect...
  • 1 篇 purdue universit...

作者

  • 2 篇 shu xiaokui
  • 2 篇 yao danfeng daph...
  • 2 篇 krishnan ram
  • 2 篇 ravishankar chin...
  • 2 篇 sandhu ravi
  • 2 篇 dautrich jonatha...
  • 1 篇 crispo bruno
  • 1 篇 hu xiaohan
  • 1 篇 günter karjoth
  • 1 篇 jiang rong
  • 1 篇 li xiong
  • 1 篇 lee adam j.
  • 1 篇 li yingjiu
  • 1 篇 saji nobuyuki
  • 1 篇 carlsson niklas
  • 1 篇 hornsburg kurt
  • 1 篇 feng wu-chun
  • 1 篇 patel hiren
  • 1 篇 ahmadi mansour
  • 1 篇 bharavi mishra

语言

  • 43 篇 英文
检索条件"任意字段=5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015"
43 条 记 录,以下是1-10 订阅
排序:
CCSM: Building Cross-Cluster security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters  24
CCSM: Building Cross-Cluster Security Models for Edge-Core E...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: GholipourChoubeh, Mahmood Kermabon-Bobinnec, Hugo Majumdar, Suryadipta Jarraya, Yosr Wang, Lingyu Nour, Boubakr Pourzandi, Makan Concordia Univ Montreal PQ Canada Ericsson Secur Res Montreal PQ Canada
With the emergence of 5G networks and their large scale applications such as IoT and autonomous vehicles, telecom operators are increasingly offloading the computation closer to customers (i.e., on the edge). Such edg... 详细信息
来源: 评论
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores  24
Examining Cryptography and Randomness Failures in Open-Sourc...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: English, K. Virgil Bennett, Nathaniel thorn, Seaver Butler, Kevin R. B. Enck, William Traynor, Patrick North Carolina State Univ Raleigh NC 27695 USA Univ Florida Gainesville FL USA
Industry is increasingly adopting private 5G networks to securely manage their wireless devices in retail, manufacturing, natural resources, and healthcare. As with most technology sectors, open-source software is wel... 详细信息
来源: 评论
the Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits  24
The Avg-Act Swap and Plaintext Overflow Detection in Fully H...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Nam, Ihyun Stanford Univ Stanford CA 94305 USA
Fully homomorphic encryption is a cryptographic scheme that enables any function to be computed on encrypted data. Although homomorphic evaluation on deep circuits has many real-life applications, fully homomorphic en... 详细信息
来源: 评论
codaspy 2015 - Proceedings of the 5th acm conference on data and application security and privacy
CODASPY 2015 - Proceedings of the 5th ACM Conference on Data...
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
the proceedings contain 40 papers. the topics discussed include: DBMask: fine-grained access control on encrypted relational databases;differentially-private mining of moderately-frequent high-confidence association r...
来源: 评论
Client Diversity Factor in HTTPS Webpage Fingerprinting  19
Client Diversity Factor in HTTPS Webpage Fingerprinting
收藏 引用
9th acm conference on data and application security and privacy (codaspy)
作者: Alan, Hasan Faik Kaur, Jasleen UNC Dept Comp Sci Chapel Hill NC 27599 USA
Webpage fingerprinting methods infer the webpages visited in a traffic trace and are serious threats to the privacy of web users. Prior work evaluates webpage fingerprinting methods using traffic samples from a single... 详细信息
来源: 评论
Large Scale PoC Experiment with 57,000 people to Accumulate Patterns for Lifestyle Authentication  19
Large Scale PoC Experiment with 57,000 people to Accumulate ...
收藏 引用
9th acm conference on data and application security and privacy (codaspy)
作者: Kobayashi, Ryosuke Saji, Nobuyuki Shigeta, Nobuo Yamaguchi, Rie Shigetomi Mitsubishi Elect Informat Syst Corp Minato Ku 4-13-23 Shibaura Tokyo 1080023 Japan INFOCORPUS Inc Meguro Ku 3-5-1 Shimomeguro Tokyo 1530064 Japan Univ Tokyo Bunkyo Ku 7-3-1 Hongo Tokyo 1138656 Japan
the spread of ICT has made it possible for people to use various online services via the Internet. User authentication technique is important for using online services in order to confirm that the user is legitimate. ... 详细信息
来源: 评论
Research on Medical Big data security Management  15th
Research on Medical Big Data Security Management
收藏 引用
15th International conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2019, co-located with the 5th International conference on Harmony Search, Soft Computing and applications, ICHSA 2019
作者: Hu, Xiaohan Jiang, Rong Qian, Zhenwei Shi, Mingyue Shang, Jingwei Yunnan University of Finance and Economics Kunming650221 China Key Laboratory of Service Computing and Safety Management of Yunnan Provincial Universities Kunming650221 China
Medical big data, as an important basic strategic resource of the countries, can bring disruptive changes to the medical field with its application, but its safety management problems are also becoming increasingly pr... 详细信息
来源: 评论
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android applications  18
SCLib: A Practical and Lightweight Defense against Component...
收藏 引用
8th acm conference on data and application security and privacy (codaspy)
作者: Wu, Daoyuan Cheng, Yao Gao, Debin Li, Yingjiu Deng, Robert H. Singapore Management Univ Sch Informat Syst Singapore Singapore ASTAR Inst Infocomm Res Singapore Singapore Singapore Management Univ Singapore Singapore
Cross-app collaboration via inter-component communication is a fundamental mechanism on Android. Although it brings the benefits such as functionality reuse and data sharing, a threat called component hijacking is als... 详细信息
来源: 评论
A New Bloom Filter Structure for Searchable Encryption Schemes  17
A New Bloom Filter Structure for Searchable Encryption Schem...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Chum, Chi Sing Zhang, Xiaowen CUNY Dept Comp Sci Grad Ctr 365 5th Ave New York NY 10016 USA CUNY Dept Comp Sci Grad Ctr 2800 Victory Blvd Staten Isl NY 10314 USA CUNY Coll Staten Isl 2800 Victory Blvd Staten Isl NY 10314 USA
We propose a new Bloom filter structure for searchable encryption schemes in which a large Bloom filter is treated as (replaced with) two smaller ones for the search index. False positive is one inherent drawback of B... 详细信息
来源: 评论
Automatic Summarization of privacy Policies using Ensemble Learning  16
Automatic Summarization of Privacy Policies using Ensemble L...
收藏 引用
6th acm conference on data and application security and privacy (codaspy)
作者: Tomuro, Noriko Lytinen, Steven Hornsburg, Kurt Depaul Univ Coll Comp & Digital Media CDM Chicago IL 60604 USA MobileEvolution Vienna Austria
When customers purchase a product or sign up for service from a company, they often are required to agree to a privacy Policy or Terms of Service agreement. Many of these policies are lengthy, and a typical customer a... 详细信息
来源: 评论