咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是1241-1250 订阅
排序:
Agile Sensor Tasking for CoIST using Natural Language Knowledge Representation and Reasoning
Agile Sensor Tasking for CoIST using Natural Language Knowle...
收藏 引用
5th conference on Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR as part of the SPIE Defense and security Sensing Symposium
作者: Braines, Dave de Mel, Geeth Gwilliams, Chris Parizas, Christos Pizzocaro, Diego Bergamaschi, Flavio Preece, Alun IBM United Kingdom Ltd Emerging Technol Serv Hursley Pk Winchester Hants England IBM Corp TJ Waston REs Ctr Yorktown Hts NY USA Cardiff Univ Sch Informat & Comp Sci Cardiff CF10 3AX S Glam Wales
We describe a system architecture aimed at supporting Intelligence, Surveillance, and Reconnaissance (ISR) activities in a Company Intelligence Support Team (CoIST) using natural language-based knowledge representatio... 详细信息
来源: 评论
Towards wireless neural electrodes: System-integration for stimulating and recording of nerve signals
Towards wireless neural electrodes: System-integration for s...
收藏 引用
Electronics System-Integration Technology conference, ESTC
作者: Melinda Varga Katharina Schulz Armin Taschwer Klaus-Jürgen Wolter Department of Electrical Engineering and Information Technology University of Technology Dresden Germany HSG-IMIT- Institut für Mikro- und Informationstechnik der Hahn-Schickard- Gesellschaft e.V Germany
In this paper we present the developed components and the electronic packaging design for a miniaturized, wireless neural electrode. Particularly, the whole system consists of a hook-up electrode for contacting the ne... 详细信息
来源: 评论
Systematic audit of third-party android phones  14
Systematic audit of third-party android phones
收藏 引用
proceedings of the 4th acm conference on data and application security and privacy
作者: Michael Mitchell Guanyu Tian Zhi Wang Florida State University Tallahassee FL USA
Android has become the leading smartphone platform with hundreds of devices from various manufacturers available on the market today. All these phones closely resemble each other with similar hardware and software fea... 详细信息
来源: 评论
VDrive A cost-effective storage solution, using volunteer computing with emphasis on security/privacy, availability, and latency
VDrive A cost-effective storage solution, using volunteer co...
收藏 引用
5th International conference on Information and Communication Technologies (ICICT)
作者: Shamsi, Jawwad Siddiqui, Aarij Hassan, Rabbia Sattar, Rida Siddiqui, Safi Natl Univ Comp & Emerging Sci Dept Comp Sci Karachi Pakistan
VDrive works on the baseline model of Storage-as-a-Service (SaaS), with an infrastructure built on volunteer computing. the project gives a model for storing user data as decentralized packets on nodes on the network.... 详细信息
来源: 评论
privacy POLICY COMPOSITION OF privacy-AWARE RBAC MODEL FOR COMPOSITE WEB SERVICES
PRIVACY POLICY COMPOSITION OF PRIVACY-AWARE RBAC MODEL FOR C...
收藏 引用
5th IEEE International conference on Broadband Network & Multimedia Technology (IC-BNMT)
作者: Yan, Danfeng Tian, Yuan Beijing Univ Posts & Telecommun Beijing 100876 Peoples R China
privacy has been acknowledged to be a critical requirement for composite services. In the previous research, we have introduced a privacy-preserving access model, but have no chance to detail the specifying of privacy... 详细信息
来源: 评论
A Protect Solution for data security in Mobile Cloud Storage
A Protect Solution for Data Security in Mobile Cloud Storage
收藏 引用
5th International conference on Machine Vision (ICMV) - Algorithms, Pattern Recognition and Basic Technologies
作者: Yu, Xiaojun Wen, Qiaoyan Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. this risk exists not only in cloud storage syste... 详细信息
来源: 评论
Design of a security framework on mapreduce
Design of a security framework on mapreduce
收藏 引用
5th IEEE International conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Guo, Zhen Zhu, Xudong Guo, Lijun Kang, Si School of Information Science and Technology Hainan University Haikou China State Key Laboratory of Integrated Service Networks Xidian University Xi'an China College of Information and Control Engineering Xi'an University of Architecture and Technology Xi'an China School of Telecommunications Engineering Xidian University Xi'an China
To deploy Map-Reduce as a data processing service over cloud computing, we must provide necessary security mechanisms to protect customers confidential data processed. In this paper, we present Map-Reduce based framew... 详细信息
来源: 评论
privacy-preserving cooperative downloading for value-added services in VANETs
Privacy-preserving cooperative downloading for value-added s...
收藏 引用
5th IEEE International conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Zhang, Wujun Jiang, Shunrong Zhu, Xiaoyan Wang, Yumin National Key Laboratory of Integrated Services Networks Xidian University China
Value-added services have been promising applications in Vehicular Ad Hoc Networks (VANETs) in recent years. In VANETs, Road Side Units (RSUs) cannot cover all areas, causing intermittent connectivity. As a result, ho... 详细信息
来源: 评论
Who do you sync you are? Smartphone fingerprinting via application behaviour  13
Who do you sync you are? Smartphone fingerprinting via appli...
收藏 引用
6th acm conference on security and privacy in Wireless and Mobile Networks, WiSec 2013
作者: Stöber, Tim Frank, Mario Schmitt, Jens Martinovic, Ivan TU Kaiserslautern Germany UC Berkley Germany University of Oxford United Kingdom
the overall network traffic patterns generated by today's smartphones result from the typically large and diverse set of installed applications. In addition to the traffic generated by the user, most applications ... 详细信息
来源: 评论
A secure cloud storage system from threshold encryption
A secure cloud storage system from threshold encryption
收藏 引用
5th IEEE International conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Yao, Chuan Xu, Li Huang, Xinyi Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou China
the confidentiality of data is one of the most important issues in cloud storage system. We address the privacy issue of decentralized cloud storage system using threshold cryptography. the major challenge of designin... 详细信息
来源: 评论