咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是1211-1220 订阅
排序:
Inference attack against encrypted range queries on outsourced databases  14
Inference attack against encrypted range queries on outsourc...
收藏 引用
4th acm conference on data and application security and privacy, CODASPY 2014
作者: Islam, Mohammad Saiful Kuzu, Mehmet Kantarcioglu, Murat Computer Science Department University of Texas at Dallas United States
To mitigate security concerns of outsourced databases, quite a few protocols have been proposed that outsource data in encrypted format and allow encrypted query execution on the server side. Among the more practical ... 详细信息
来源: 评论
A Secure Virtual data Center Based on data Labeled Cloud-agent  5
A Secure Virtual Data Center Based on Data Labeled Cloud-age...
收藏 引用
5th IEEE International conference on Software Engineering and Service Science (ICSESS)
作者: Zhou, Huan Ren, Jiangchun Natl Univ Def Technol Changsha Hunan Peoples R China
How to establish a trusted framework in an untrusted environment is an important problem in many areas. So it is in the field of cloud service. It's also hard to find the balance between assuring security of the c... 详细信息
来源: 评论
SNOOP: privacy preserving middleware for secure multi-party computations  13
SNOOP: Privacy preserving middleware for secure multi-party ...
收藏 引用
13th Workshop on Adaptive and Reflective Middleware, ARM 2014, co-located with acm/IFIP/USENIX International Middleware conference
作者: Andersen, Anders Department of Computer Science UiT Arctic University of Norway Tromsø9037 Norway
SNOOP is an adaptive middleware for secure multi-party computations (SMC). It combines support for secure multi- party computations, encryption, public key infrastructure (PKI), certificates, and certificate authoriti... 详细信息
来源: 评论
privacy threat Modeling for Emerging BiobankClouds  5
Privacy Threat Modeling for Emerging BiobankClouds
收藏 引用
4th International conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICth)
作者: Gholami, Ali Lind, Anna-Sara Reichel, Jane Litton, Jan-Eric Edlund, Ake Laure, Erwin KTH Royal Inst Technol HPCViz Stockholm Sweden Uppsala Univ Fac Law & Ctr Res Ethics & Bioeth Uppsala Sweden Karolinska Inst Med Epidemiol & Biostatist Stockholm Sweden
there is an increased amount of data produced by next generation sequencing (NGS) machines which demand scalable storage and analysis of genomic data. In order to cope with this huge amount of information, many bioban... 详细信息
来源: 评论
Coordinated Attack Research between Android applications and Solutions  5
Coordinated Attack Research between Android Applications and...
收藏 引用
5th IEEE International conference on Software Engineering and Service Science (ICSESS)
作者: Qu, Xiang-Dong Yu, Ge Hangzhou Normal Univ Sch Informat Sci & Engn Hangzhou Zhejiang Peoples R China
this article mainly discusses the the Android's security mechanism and the possibility of the coordinated attack caused by the android application's component structure. then we put forward the data filtering ... 详细信息
来源: 评论
Impact of privacy Attitude, Concern and Awareness on Use of Online Social Networking  5
Impact of Privacy Attitude, Concern and Awareness on Use of ...
收藏 引用
5th International conference on Confluence - the Next Generation Information Technology Summit (Confluence)
作者: Dhawan, Sanjeev Singh, Kulvinder Goel, Shivi Kurukshetra Univ Fac Comp Sci & Engn UIET Kurukshetra 132119 Haryana India Kurukshetra Univ UIET Kurukshetra 132119 Haryana India
online social networking has extended the boundaries of social communication. Now everybody can share their personal stuffs, feelings and relations even on internet too. Although it provides an ease of communication b... 详细信息
来源: 评论
Secure Sharing of Mobile Device data using Public Cloud  5
Secure Sharing of Mobile Device Data using Public Cloud
收藏 引用
5th International conference on Confluence - the Next Generation Information Technology Summit (Confluence)
作者: Alam, Md Mozammil Hati, Sourav De, Debashis Chattopadhyay, Samiran West Bengal Univ Technol Dept Comp Sci & Engn Kolkata 700064 India Jadavpur Univ Dept Informat Technol Kolkata 700098 India
Mobile devices contain both personal as well as business data. data security is a challenging issue in the era of mobile cloud computing. these data needed to be protected from semi-trusted public cloud storage. In th... 详细信息
来源: 评论
A Coherent Dynamic Remote Integrity Check on Cloud data Utilizing Homomorphic Cryptosystem  5
A Coherent Dynamic Remote Integrity Check on Cloud Data Util...
收藏 引用
5th International conference on Confluence - the Next Generation Information Technology Summit (Confluence)
作者: Wadhwa, Divya Dabas, Poonam Kurukshetra Univ Univ Inst Engn & Technol Dept Comp Sci & Engn Kurukshetra 132119 Haryana India
checking remote data integrity in climacteric cloud computing infrastructure is a valuable matter of concern. As the idea of cloud computing entered into a wide implementation today, data access becomes a major securi... 详细信息
来源: 评论
Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing  5
Feasibility of Implementing Multi-factor Authentication Sche...
收藏 引用
5th International conference on Intelligent Systems, Modelling and Simulation (ISMS)
作者: Alizadeh, Mojtaba Hassan, Wan Haslina Khodadadi, Touraj Univ Teknol Malaysia Malaysian Japan Int Inst Technol Kuala Lumpur 54100 Federal Territo Malaysia
Mobile cloud computing is a new computing technology, which provides on-demand resources. Nowadays, this computing paradigm is becoming one the most interesting technology for IT enterprises. the idea of computing and... 详细信息
来源: 评论
Anonymization Algorithm for security and Confidentiality of Health data Set across Social Network  5
Anonymization Algorithm for Security and Confidentiality of ...
收藏 引用
5th International conference on Information and Communication Technology Convergence (ICTC)
作者: Bruce, Ndibanje Lee, Hoon Jae Dongseo Univ Grad Sch Dept Ubiquitous IT Busan 617716 South Korea Dongseo Univ Div Compuer & Engn Busan 617716 South Korea
In this paper we propose a social network anonymization algorithm for security and confidentiality of health data set transmitted and shared across a social network. the growing need to address privacy concerns when s... 详细信息
来源: 评论