咨询与建议

限定检索结果

文献类型

  • 503 篇 会议
  • 8 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 517 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 377 篇 工学
    • 346 篇 计算机科学与技术...
    • 263 篇 信息与通信工程
    • 135 篇 软件工程
    • 114 篇 电气工程
    • 42 篇 安全科学与工程
    • 30 篇 网络空间安全
    • 29 篇 交通运输工程
    • 16 篇 控制科学与工程
    • 12 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 5 篇 建筑学
    • 5 篇 航空宇航科学与技...
    • 5 篇 生物工程
    • 3 篇 土木工程
  • 63 篇 理学
    • 47 篇 数学
    • 12 篇 统计学(可授理学、...
    • 7 篇 物理学
    • 5 篇 生物学
    • 2 篇 系统科学
  • 57 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 18 篇 法学
    • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 44 篇 privacy
  • 41 篇 security
  • 21 篇 authentication
  • 17 篇 internet of thin...
  • 16 篇 wireless sensor ...
  • 16 篇 wireless network...
  • 11 篇 network security
  • 10 篇 physical layer s...
  • 8 篇 mobile ad hoc ne...
  • 8 篇 mobile communica...
  • 8 篇 mobile computing
  • 8 篇 telecommunicatio...
  • 7 篇 data privacy
  • 7 篇 communication sy...
  • 7 篇 location privacy
  • 7 篇 5g
  • 7 篇 iot
  • 7 篇 vehicular ad hoc...
  • 7 篇 cryptography
  • 6 篇 bluetooth

机构

  • 5 篇 networked system...
  • 5 篇 swiss fed inst t...
  • 4 篇 tech univ darmst...
  • 4 篇 univ padua padua
  • 4 篇 armasuisse
  • 4 篇 new york univ ab...
  • 3 篇 inria
  • 3 篇 univ texas san a...
  • 3 篇 kth royal inst t...
  • 3 篇 ohio state univ ...
  • 3 篇 university of ka...
  • 3 篇 ibm thomas j. wa...
  • 3 篇 networked system...
  • 3 篇 xidian univ stat...
  • 3 篇 purdue universit...
  • 2 篇 north carolina s...
  • 2 篇 univ lyon insa l...
  • 2 篇 chalmers univers...
  • 2 篇 uppsala univ upp...
  • 2 篇 north carolina s...

作者

  • 11 篇 papadimitratos p...
  • 9 篇 cunche mathieu
  • 7 篇 hollick matthias
  • 6 篇 lenders vincent
  • 5 篇 saxena nitesh
  • 5 篇 ranganathan aanj...
  • 5 篇 sadeghi ahmad-re...
  • 5 篇 panos papadimitr...
  • 4 篇 capkun srdjan
  • 4 篇 akkaya kemal
  • 4 篇 conti mauro
  • 4 篇 schulz matthias
  • 4 篇 de cristofaro em...
  • 4 篇 martinovic ivan
  • 4 篇 hubaux jean-pier...
  • 4 篇 tippenhauer nils...
  • 4 篇 tague patrick
  • 3 篇 strohmeier marti...
  • 3 篇 paar christof
  • 3 篇 jadliwala murtuz...

语言

  • 510 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"任意字段=Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks"
517 条 记 录,以下是1-10 订阅
排序:
proceedings of the 10th acm conference on security and privacy in wireless and mobile networks, WiSec 2017
Proceedings of the 10th ACM Conference on Security and Priva...
收藏 引用
10th acm conference on security and privacy in wireless and mobile networks, WiSec 2017
the proceedings contain 40 papers. the topics discussed include: user authentication and identification from user interface interactions on touch-enabled devices;using hover to compromise the confidentiality of user i...
来源: 评论
WiSec 2024 - proceedings of the 17th acm conference on security and privacy in wireless and mobile networks
WiSec 2024 - Proceedings of the 17th ACM Conference on Secur...
收藏 引用
17th acm conference on security and privacy in wireless and mobile networks, WiSec 2024
the proceedings contain 29 papers. the topics discussed include: covert communications with simultaneous multi-modal transmission;watch nearby! privacy analysis of the people nearby service of telegram;securing contra...
来源: 评论
WiSec 2023 - proceedings of the 16th acm conference on security and privacy in wireless and mobile networks
WiSec 2023 - Proceedings of the 16th ACM Conference on Secur...
收藏 引用
16th acm conference on security and privacy in wireless and mobile networks, WiSec 2023
the proceedings contain 34 papers. the topics discussed include: commercial anti-smishing tools and their comparative effectiveness against modern threats;what is your location privacy worth? monetary valuation of dif...
来源: 评论
WiSec 2022 - proceedings of the 15th acm conference on security and privacy in wireless and mobile networks
WiSec 2022 - Proceedings of the 15th ACM Conference on Secur...
收藏 引用
15th acm conference on security and privacy in wireless and mobile networks, WiSec 2022
the proceedings contain 36 papers. the topics discussed include: wireless and mobile security research and teaching in the post-pandemic world;automating the quantitative analysis of reproducibility for build artifact...
来源: 评论
WiSec 2021 - proceedings of the 14th acm conference on security and privacy in wireless and mobile networks
WiSec 2021 - Proceedings of the 14th ACM Conference on Secur...
收藏 引用
14th acm conference on security and privacy in wireless and mobile networks, WiSec 2021
the proceedings contain 45 papers. the topics discussed include: a comprehensive formal analysis of 5G handover;amazon echo dot or the reverberating secrets of IoT devices;anonymous device authorization for cellular n...
来源: 评论
WiSec 2020 - proceedings of the 13th acm conference on security and privacy in wireless and mobile networks
WiSec 2020 - Proceedings of the 13th ACM Conference on Secur...
收藏 引用
13th acm conference on security and privacy in wireless and mobile networks, WiSec 2020
the proceedings contain 41 papers. the topics discussed include: KRATOS: multi-user multi-device-aware access control system for the smart home;hacksaw: biometric-free non-stop web authentication in an emerging world ...
来源: 评论
WiSec 2018 - proceedings of the 11th acm conference on security and privacy in wireless and mobile networks
WiSec 2018 - Proceedings of the 11th ACM Conference on Secur...
收藏 引用
11th acm conference on security and privacy in wireless and mobile networks, WiSec 2018
the proceedings contain 40 papers. the topics discussed include: I send, therefore I leak: information leakage in low-powerwide area networks;tracking private browsing sessions using CPU-based covert channels;listenin...
来源: 评论
privacy-Preserving Pseudonyms for LoRaWAN  24
Privacy-Preserving Pseudonyms for LoRaWAN
收藏 引用
17th acm conference on security and privacy in wireless and mobile networks (WiSec)
作者: Pelissier, Samuel Aalmoes, Jan Mishra, Abhishek Kumar Cunche, Mathieu Roca, Vincent Donsez, Didier INSA Lyon Inria CITI Lab Lyon France Univ Grenoble Alpes Inria Grenoble France Univ Grenoble Alpes LIG Grenoble France
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata exposure, particularly concerning the exploitation of stable device identifiers. For the first time in literature, we propose two priv... 详细信息
来源: 评论
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization  24
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization
收藏 引用
17th acm conference on security and privacy in wireless and mobile networks (WiSec)
作者: Jin, Hongyu Papadimitratos, Panos KTH Royal Inst Technol Networked Syst Secur Grp Stockholm Sweden
Medium Access Control (MAC) address randomization is a key component for privacy protection in Wi-Fi networks. Current proposals periodically change the mobile device MAC addresses when it disconnects from the Access ... 详细信息
来源: 评论
Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO Systems  24
Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO...
收藏 引用
17th acm conference on security and privacy in wireless and mobile networks (WiSec)
作者: Zhao, Xingya Roy, Anwesha Banerjee, Avishek Srinivasan, Kannan Ohio State Univ Columbus OH 43210 USA Nokia Bell Labs Murray Hill NJ USA
As the demand for high-speed and reliable wireless networks continues to increase, multi-user multiple-input multiple-output (MU-MIMO) technology has become a popular choice for wireless communication systems. However... 详细信息
来源: 评论