咨询与建议

限定检索结果

文献类型

  • 1,499 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,160 篇 工学
    • 1,085 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 323 篇 信息与通信工程
    • 143 篇 电气工程
    • 128 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 47 篇 网络空间安全
    • 45 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 40 篇 生物医学工程(可授...
    • 36 篇 生物工程
    • 34 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 26 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 242 篇 理学
    • 170 篇 数学
    • 42 篇 生物学
    • 30 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 226 篇 管理学
    • 150 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 64 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 42 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 16 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 25 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,251 篇 英文
  • 278 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1531 条 记 录,以下是1131-1140 订阅
排序:
Analysis of security Algorithms in Cloud Computing  3
Analysis of Security Algorithms in Cloud Computing
收藏 引用
3rd International conference on Computing for Sustainable Global Development (INDIACom)
作者: Agrawal, Tanvi Singh, S. K. Amity Univ Lucknow Uttar Pradesh India
Cloud computing is a collection of distributed services, application, information and infrastructure .Cloud computing may he defined as the set of services that provide infrastructure resources using internet and data... 详细信息
来源: 评论
Efficient approach for mining top-k strong patterns in Social Network Service  5
Efficient approach for mining top-k strong patterns in Socia...
收藏 引用
5th International conference on Eco-Friendly Computing and Communication Systems, ICECCS 2016
作者: Bakariya, Brijesh Chaturvedi, Kapil Singh, Krishna Pratap thakur, G.S. Department of Computer Applications MANIT Bhopal India Department of Computer Applications UIT RGPV Bhopal India
Social Network Service is a one of the service where people may communicate with one another;and may also exchange messages even of any type of audio or video communication. Social Network Service as name suggests a t... 详细信息
来源: 评论
5th International conference on Soft Computing for Problem Solving, SocProS 2015
5th International Conference on Soft Computing for Problem S...
收藏 引用
5th International conference on Soft Computing for Problem Solving, SocProS 2015
the proceedings contain 87 papers. the special focus in this conference is on Soft Computing for Problem Solving. the topics include: Traffic accident prediction model using support vector machines with gaussian kerne...
来源: 评论
On privacy verification in the IoT service based on PN2
On privacy verification in the IoT service based on PN2
收藏 引用
IEEE Global conference on Consumer Electronics (GCCE)
作者: Muhammad Syafiq Bin Ab Malek Mohd Anuaruddin Bin Ahmadon Shingo Yamaguchi B. B. Gupta Yamaguchi Daigaku Yamaguchi Yamaguchi JP National Institute of Technology Calicut Calicut Kerala IN
In recent years, Internet of things (IoT) has attracted many attention. However, it still lacks on security consideration. Conventional ways of security design might not be sufficiently effective when dealing with new... 详细信息
来源: 评论
A network security game model  15
A network security game model
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Shandilya, Vivek Shiva, Sajjan Dept of Computer Science University of Memphis MemphisTN38152 United States
there have been attempts to model the interaction between users, both malicious and benign, and network administrators as games. Building on such works, we here present a game model which is generic enough to capture ... 详细信息
来源: 评论
Information sharing and user privacy in the third-party identity management landscape  15
Information sharing and user privacy in the third-party iden...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Vapen, Anna Carlsson, Niklas Mahanti, Anirban Shahmehri, Nahid Linköping University Sweden NICTA Australia
third-party identity management services enable cross-site information sharing, making Web access seamless but also raise significant privacy implications for the users. Using a combination of manual analysis of ident... 详细信息
来源: 评论
Secure information and resource sharing in cloud  15
Secure information and resource sharing in cloud
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Zhang, Yun Krishnan, Ram Sandhu, Ravi Institute for Cyber Security Univ of Texas at San Antonio San AntonioTX78249 United States Dept. of Electrical and Computer Engineering Univ of Texas at San Antonio San AntonioTX78249 United States
the significant threats from information security breaches in cyber world is one of the most serious security problems. Organizations are facing growing number of sophisticated cyber-attacks every year. Efficient and ... 详细信息
来源: 评论
privacy-preserving scanning of big content for sensitive data exposure with mapreduce  15
Privacy-preserving scanning of big content for sensitive dat...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Liu, Fang Shu, Xiaokui Yao, Danfeng Daphne Butt, Ali R. Department Computer Science Virginia Tech BlacksburgVA United States
the exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal secu- rity. data leak detection aims at scanning content (in stor- age or transmission) for exposed sens... 详细信息
来源: 评论
Evaluating risks in cloud computing: security perspective
Evaluating risks in cloud computing: Security perspective
收藏 引用
International conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: Amit Kumar Dhingra Dinesh Rai Ansal University Gurgaon Dept. of Engineering & Comp Application Ansal University Gurgaon (NCR) Haryana India
the cloud computing provide resources and service as and when required over the internet. In cloud computing environment users share highly important data, maintaining centralizing storage of data and resource sharing... 详细信息
来源: 评论
Combining ORAM with PIR to minimize bandwidth costs  15
Combining ORAM with PIR to minimize bandwidth costs
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Dautrich, Jonathan Ravishankar, Chinya Google Inc. IrvineCA United States Computer Science and Engineering University of California Riverside United States
Cloud computing allows customers to outsource the burden of data management and benefit from economy of scale, but privacy concerns limit its reach. Even if the stored data are encrypted, access patterns may leak valu... 详细信息
来源: 评论