咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是1141-1150 订阅
排序:
Dimensions of risk in mobile applications: A user study  15
Dimensions of risk in mobile applications: A user study
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Jorgensen, Zach Chen, Jing Gates, Christopher S. Li, Ninghui Proctor, Robert W. Yu, Ting Department of Computer Science North Carolina State University RaleighNC United States Department of Psychological Sciences CERIAS Purdue University West LafayetteIN United States Department of Computer Science CERIAS Purdue University West LafayetteIN United States Qatar Computing Research Institute Doha Qatar
Mobile platforms, such as Android, warn users about the permissions an app requests and trust that the user will make the correct decision about whether or not to install the app. Unfortunately many users either ignor... 详细信息
来源: 评论
Human Mobility Profiling Using privacy-Friendly Wi-Fi and Activity Traces: Demo Abstract  16
Human Mobility Profiling Using Privacy-Friendly Wi-Fi and Ac...
收藏 引用
proceedings of the 14th acm conference on Embedded Network Sensor Systems CD-ROM
作者: Sébastien Faye Ibrahim Tahirou thomas Engel University of Luxembourg SnT Alphonse Weicker Luxembourg
Human mobility is one of the key topics to be considered in the networks of the future, both by industrial and research communities that are already focused on multidisciplinary applications and user-centric systems. ...
来源: 评论
DetAnom: Detecting anomalous database transactions by insiders  15
DetAnom: Detecting anomalous database transactions by inside...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Hussain, Syed Rafiul Sallam, Asmaa Bertino, Elisa Dept. of Computer Science Purdue University United States Dept. of Computer Science Cyber Center Purdue University United States
databaseManagement Systems (DBMSs) provide access con- trol mechanisms that allow database administrators (DBA) to grant application programs access privileges to databases. However, securing the database alone is not... 详细信息
来源: 评论
Distributed search over encrypted big data  15
Distributed search over encrypted big data
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Kuzu, Mehmet Islam, Mohammad Saiful Kantarcioglu, Murat Department of Computer Science University of Texas at Dallas RichardsonTX United States
Nowadays, huge amount of documents are increasingly trans- ferred to the remote servers due to the appealing features of cloud computing. On the other hand, privacy and se- curity of the sensitive information in untru... 详细信息
来源: 评论
9th International Workshop on Artificial Intelligence and security: AISec 2016  16
9th International Workshop on Artificial Intelligence and Se...
收藏 引用
proceedings of the 2016 acm SIGSAC conference on Computer and Communications security
作者: David Mandell Freeman Katerina Mitrokotsa Arunesh Sinha LinkedIn Corporation Mountain View CA USA Chalmers University of Technology Gothenburg Sweden University of Michigan Ann Arbor MI USA
Artificial Intelligence (AI) and Machine Learning (ML) provide a set of useful analytic and decision-making techniques that are being leveraged by an ever-growing community of practitioners, including many whose appli... 详细信息
来源: 评论
A privacy Enhanced security Framework for Android Users  5
A Privacy Enhanced Security Framework for Android Users
收藏 引用
5th International conference on IT Convergence and security (ICITCS)
作者: Singh, Shirish Kumar Mishra, Bharavi Gera, Poonam LNM Inst Informat Technol Comp Sci & Engn Dept Jaipur Rajasthan India
In the past few years, the primary focus of computing has shifted from PCs to smart-phones and tablets. As a result, smart-phones have become more than a communication device, now it can store vast amount of users sen... 详细信息
来源: 评论
AppSec: A Safe Execution Environment for security Sensitive applicationst  15
AppSec: A Safe Execution Environment for Security Sensitive ...
收藏 引用
11th acm SIGPLAN/SIGOPS International conference on Virtual Execution Environments
作者: Ren, Jianbao Qi, Yong Dai, Yuehua Wang, Xiaoguang Shi, Yi Xi An Jiao Tong Univ Xian Peoples R China
Malicious OS kernel can easily access user's private data in main memory and pries human-machine interaction data, even one that employs privacy enforcement based on application level or OS level. this paper intro... 详细信息
来源: 评论
A privacy preserving message authentication code  5
A privacy preserving message authentication code
收藏 引用
5th International conference on IT Convergence and security, ICITCS 2015
作者: Van, Dang Hai thuc, Nguyen Dinh University of Science VNU-HCM Viet Nam
In this paper, we propose a new message authentication code which can preserve privacy of data. the proposed mechanism supports to verify data integrity from only partly information of the original data. In addition, ... 详细信息
来源: 评论
security of Web applications with short web service : a review Study  5
Security of Web Applications with short web service : a revi...
收藏 引用
5th International conference on Advanced Computing & Communication Technologies (ACCT)
作者: Ajay, Anadi Jaiswal, Arunima Verma, Kritika Amity Univ Comp Sci & Engn Noida 201313 India Amity Univ Noida 201313 India
Web application (WA) is considered as a secured communication different users. Whereas the data that can be held by the SMS is very limited (short) therefore it is called Short Messaging Service. At the SMS follow web... 详细信息
来源: 评论
DEMO: NFCGate - An NFC relay application for android  8
DEMO: NFCGate - An NFC relay application for android
收藏 引用
8th acm conference on security and privacy in Wireless and Mobile Networks, WiSec 2015
作者: Maass, Max Müller, Uwe Schons, Tom Wegemer, Daniel Schulz, Matthias Secure Mobile Networking Lab. Technische Universität Darmstadt Darmstadt Germany
Near Field Communication (NFC) is a technology widely used for security-critical applications like access control or payment systems. Many of these systems rely on the security assumption that the card has to be in cl... 详细信息
来源: 评论