咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 1 册 图书

馆藏范围

  • 45 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41 篇 工学
    • 41 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 5 篇 信息与通信工程
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 6 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 6 篇 security
  • 6 篇 privacy
  • 4 篇 differential pri...
  • 2 篇 secret sharing
  • 2 篇 homomorphic encr...
  • 2 篇 data privacy
  • 2 篇 spoofing
  • 2 篇 web security
  • 1 篇 iso
  • 1 篇 life cycle asses...
  • 1 篇 internet of thin...
  • 1 篇 dropbox
  • 1 篇 smart homes
  • 1 篇 intrusion detect...
  • 1 篇 traffic analysis
  • 1 篇 lattice-based cr...
  • 1 篇 trust models
  • 1 篇 graphs
  • 1 篇 hijacking
  • 1 篇 scalability

机构

  • 2 篇 north carolina s...
  • 1 篇 fdn bruno kessle...
  • 1 篇 telfer school of...
  • 1 篇 univ coimbra cis...
  • 1 篇 stevens inst tec...
  • 1 篇 public research ...
  • 1 篇 univ toronto on
  • 1 篇 school of cybers...
  • 1 篇 inst technol & s...
  • 1 篇 seeburger ag 6 g...
  • 1 篇 us mil acad dept...
  • 1 篇 ecole polytech f...
  • 1 篇 univ roma la sap...
  • 1 篇 swiss fed inst t...
  • 1 篇 umass boston bos...
  • 1 篇 univ waterloo ec...
  • 1 篇 florida polytech...
  • 1 篇 soochow univ peo...
  • 1 篇 school of comput...
  • 1 篇 univ illinois ur...

作者

  • 2 篇 enck william
  • 1 篇 samet saeed
  • 1 篇 kostiainen kari
  • 1 篇 sharma anupam
  • 1 篇 poupart claude
  • 1 篇 baldoni roberto
  • 1 篇 balmau oana
  • 1 篇 gu xiaohui
  • 1 篇 egecioglu omer
  • 1 篇 fragopoulou para...
  • 1 篇 capkun srdjan
  • 1 篇 wang xiao
  • 1 篇 forg fabian
  • 1 篇 mannan mohammad
  • 1 篇 petrova-antonova...
  • 1 篇 el abbadi amr
  • 1 篇 che jiazhen
  • 1 篇 durand arnaud
  • 1 篇 ahmadi mansour
  • 1 篇 wehrle klaus

语言

  • 45 篇 英文
检索条件"任意字段=7th ACM Conference on Data and Application Security and Privacy, CODASPY 2017"
45 条 记 录,以下是1-10 订阅
排序:
codaspy 2017 - Proceedings of the 7th acm conference on data and application security and privacy
CODASPY 2017 - Proceedings of the 7th ACM Conference on Data...
收藏 引用
7th acm conference on data and application security and privacy, codaspy 2017
the proceedings contain 41 papers. the topics discussed include: Ghostbuster: a fine-grained approach for anomaly detection in file system accesses;mining attributed graphs for threat intelligence;statistical security...
来源: 评论
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores  24
Examining Cryptography and Randomness Failures in Open-Sourc...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: English, K. Virgil Bennett, Nathaniel thorn, Seaver Butler, Kevin R. B. Enck, William Traynor, Patrick North Carolina State Univ Raleigh NC 27695 USA Univ Florida Gainesville FL USA
Industry is increasingly adopting private 5G networks to securely manage their wireless devices in retail, manufacturing, natural resources, and healthcare. As with most technology sectors, open-source software is wel... 详细信息
来源: 评论
All Your IoT Devices Are Belong to Us: securityWeaknesses in IoT Management Platforms  23
All Your IoT Devices Are Belong to Us: SecurityWeaknesses in...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Tejaswi, Bhaskar Mannan, Mohammad Youssef, Amr Concordia Univ Montreal PQ Canada
IoT devices have become an integral part of our day to day activities, and are also being deployed to fulfil a number of industrial, enterprise and agricultural use cases. To efficiently manage and operate these devic... 详细信息
来源: 评论
Velocity-Aware Geo-Indistinguishability  23
Velocity-Aware Geo-Indistinguishability
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Mendes, Ricardo Cunha, Mariana Vilela, Joao P. Univ Coimbra CISUC Coimbra Portugal Univ Coimbra Dept Informat Coimbra Portugal Univ Porto Fac Ciencias CISUC CRACS INESCTEC Rua Campo Alegre S-N P-4169007 Porto Portugal Univ Porto Fac Ciencias Dept Ciencia Comp Rua Campo Alegre S-N P-4169007 Porto Portugal
Location privacy-Preserving Mechanisms (LPPMs) have been proposed to mitigate the risks of privacy disclosure yielded from location sharing. However, due to the nature of this type of data, spatio-temporal correlation... 详细信息
来源: 评论
Stream Processing with Adaptive Edge-Enhanced Confidential Computing  7
Stream Processing with Adaptive Edge-Enhanced Confidential C...
收藏 引用
7th International Workshop on Edge Systems, Analytics and Networking (EdgeSys) Part of acm EuroSys conference
作者: Yan, Yuqin Mishra, Pritish Huang, Wei Mehta, Aastha Balmau, Oana Lie, David Univ Toronto Toronto ON Canada Univ British Columbia Vancouver BC Canada McGill Univ Montreal PQ Canada
Stream processing is becoming increasingly significant in various scenarios, including security-sensitive sectors. It benefits from keeping data in memory, which exposes large volumes of data in use, thereby emphasisi... 详细信息
来源: 评论
CCIOT 2022 - 2022 7th International conference on Cloud Computing and Internet of things
CCIOT 2022 - 2022 7th International Conference on Cloud Comp...
收藏 引用
7th International conference on Cloud Computing and Internet of things, CCIOT 2022
the proceedings contain 11 papers. the topics discussed include: fast multi-label tumor classification based on homomorphic encryption;SecMesh: an efficient information security method for stream processing in edge-fo...
来源: 评论
Research on Novel TLS Protocol Network Traffic Management and Monitoring Method  22
Research on Novel TLS Protocol Network Traffic Management an...
收藏 引用
7th International conference on Cyber security and Information Engineering, ICCSIE 2022
作者: Guan, Yangyang Li, Zhen Xiong, Gang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). the full encryption technology of network traffic brings great challenge... 详细信息
来源: 评论
Design and Implementation of Information Detection System Based on privacy Sensitive data  7th
Design and Implementation of Information Detection System Ba...
收藏 引用
7th International conference on Artificial Intelligence and security, ICAIS 2021
作者: Che, Jiazhen Zhang, Chong Xing, Xiao Yu, Xiangzhan School of Cyberspace Science Harbin Institute of Technology Harbin150001 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing100032 China
In recent years, with the development of network technology, network applications and network transmission protocols emerge one after another. Although a growing awareness for the protection of private data, network a... 详细信息
来源: 评论
Far Cry: Will CDNs Hear NDN's Call?  7
Far Cry: Will CDNs Hear NDN's Call?
收藏 引用
7th acm Annual conference on Information-Centric Networking (ICN)
作者: Ghasemi, Chavoosh Yousefi, Hamed Zhang, Beichuan Univ Arizona Tucson AZ 85721 USA Aryaka Networks San Mateo CA USA
Content Delivery Networks (CDNs) have become indispensable to Internet content distribution. As they evolve to meet the ever-increasing demands, they are also facing challenges such as system complexity, resource foot... 详细信息
来源: 评论
Research on privacy Protection with Weak security Network Coding for Mobile Computing  7
Research on Privacy Protection with Weak Security Network Co...
收藏 引用
7th International conference on Advanced Cloud and Big data (CBD)
作者: Zhang, Yang Chen, Pengfei Long, Hao Soochow Univ Suzhou Peoples R China
With the rapid development of the contemporary society, wide use of smart phone and vehicle sensing devices brings a huge influence on the extensive data collection. Network coding can only provide weak security priva... 详细信息
来源: 评论