咨询与建议

限定检索结果

文献类型

  • 43 篇 会议

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 28 篇 计算机科学与技术...
    • 16 篇 软件工程
    • 6 篇 信息与通信工程
    • 3 篇 电气工程
    • 3 篇 安全科学与工程
    • 2 篇 控制科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 7 篇 管理学
    • 5 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 6 篇 理学
    • 6 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 4 篇 privacy
  • 3 篇 machine learning
  • 3 篇 mobile security
  • 2 篇 access control
  • 2 篇 big data
  • 2 篇 androids
  • 2 篇 sensitive data
  • 2 篇 static analysis
  • 2 篇 security
  • 1 篇 obstruction
  • 1 篇 consumers
  • 1 篇 human behavior
  • 1 篇 data privacy
  • 1 篇 privacy policy
  • 1 篇 linux
  • 1 篇 smartphones
  • 1 篇 security model
  • 1 篇 business process
  • 1 篇 one time passwor...
  • 1 篇 cryptography mis...

机构

  • 2 篇 computer science...
  • 2 篇 google inc. irvi...
  • 1 篇 natl res univ hi...
  • 1 篇 department of ps...
  • 1 篇 linköping univer...
  • 1 篇 univ tokyo bunky...
  • 1 篇 mobileevolution ...
  • 1 篇 dept. of electri...
  • 1 篇 key laboratory o...
  • 1 篇 ericsson secur r...
  • 1 篇 astar inst infoc...
  • 1 篇 north carolina s...
  • 1 篇 dept. of compute...
  • 1 篇 university of pi...
  • 1 篇 snt university o...
  • 1 篇 department of co...
  • 1 篇 unc dept comp sc...
  • 1 篇 university of pa...
  • 1 篇 mitsubishi elect...
  • 1 篇 purdue universit...

作者

  • 2 篇 shu xiaokui
  • 2 篇 yao danfeng daph...
  • 2 篇 krishnan ram
  • 2 篇 ravishankar chin...
  • 2 篇 sandhu ravi
  • 2 篇 dautrich jonatha...
  • 1 篇 crispo bruno
  • 1 篇 hu xiaohan
  • 1 篇 günter karjoth
  • 1 篇 jiang rong
  • 1 篇 li xiong
  • 1 篇 lee adam j.
  • 1 篇 li yingjiu
  • 1 篇 saji nobuyuki
  • 1 篇 carlsson niklas
  • 1 篇 hornsburg kurt
  • 1 篇 feng wu-chun
  • 1 篇 patel hiren
  • 1 篇 ahmadi mansour
  • 1 篇 bharavi mishra

语言

  • 43 篇 英文
检索条件"任意字段=5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015"
43 条 记 录,以下是31-40 订阅
排序:
URBAN security SYSTEM BASED ON QUADRANTS  6th
URBAN SECURITY SYSTEM BASED ON QUADRANTS
收藏 引用
6th International conference on Ambient Systems, Networks and Technologies (ANT) / 5th International conference on Sustainable Energy Information Technology (SEIT)
作者: Gomez, Jorge Hernandez, Velssy Cobo, Luis Univ Cordoba Dept Ingn Sistemas & Telecomunicac Grp Invest SOCRATES Monteria Colombia Univ EAN Bogota Colombia
In this work, a solution is proposed to the problem of crime fighting in a city using a mobile application that gets data in real time and offers risk control, privacy protection and security to the citizens. this app... 详细信息
来源: 评论
privacy preservation using novel identity management scheme in cloud computing  5
Privacy preservation using novel identity management scheme ...
收藏 引用
5th International conference on Communication Systems and Network Technologies (CSNT)
作者: Soni, Dishant Patel, Hiren Sankalchand Patel Coll Engn Dept Comp Engn Visnagar Gujarat India
the Cloud Computing is known for its high availability and low cost in implementation and maintenance. the Users of Cloud often give their secret credential for accessing application and/or data hosted on Cloud enviro... 详细信息
来源: 评论
2015 5th International conference on Information and Communication Technology and Accessibility, ICTA 2015
2015 5th International Conference on Information and Communi...
收藏 引用
5th International conference on Information and Communication Technology and Accessibility, ICTA 2015
the proceedings contain 68 papers. the topics discussed include: towards the automatic generation of sign language gestures from d images;stemming impact on Arabic text categorization performance: a survey;drug discov...
来源: 评论
Session details: privacy Preserving Techniques  15
Session details: Privacy Preserving Techniques
收藏 引用
Proceedings of the 5th acm conference on data and application security and privacy
作者: Li Xiong Emory University
No abstract available.
来源: 评论
Session details: Novel Techniques for data security  15
Session details: Novel Techniques for Data Security
收藏 引用
Proceedings of the 5th acm conference on data and application security and privacy
作者: Adam J. Lee University of Pittsburgh
No abstract available.
来源: 评论
Session details: Cloud and Bigdata security  15
Session details: Cloud and BigData Security
收藏 引用
Proceedings of the 5th acm conference on data and application security and privacy
作者: Elisa Bertino Purdue University
No abstract available.
来源: 评论
Session details: Mobile security  15
Session details: Mobile Security
收藏 引用
Proceedings of the 5th acm conference on data and application security and privacy
作者: Gabriel Ghinita Univerity of Massachusetts Boston
No abstract available.
来源: 评论
Session details: Software security  15
Session details: Software Security
收藏 引用
Proceedings of the 5th acm conference on data and application security and privacy
作者: Murat Kantarcioglu The University of Texas at Dallas
No abstract available.
来源: 评论
Session details: privacy and Access Control  15
Session details: Privacy and Access Control
收藏 引用
Proceedings of the 5th acm conference on data and application security and privacy
作者: Alexander Pretschner Technische Universität München
No abstract available.
来源: 评论
A privacy Enhanced security Framework for Android Users
A Privacy Enhanced Security Framework for Android Users
收藏 引用
International conference on IT Convergence and security (ICITCS)
作者: Shirish Kumar Singh Bharavi Mishra Poonam Gera Computer Science and Engineering Dept. The LNM-Institute of Information Technology Jaipur India
In the past few years, the primary focus of computing has shifted from PCs to smart-phones and tablets. As a result, smart-phones have become more than a communication device, now it can store vast amount of user'... 详细信息
来源: 评论