咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是121-130 订阅
排序:
Enhancing Cloud Computing data security in Attribute-based Encryption Schemes using Cryptographic Algorithm  5
Enhancing Cloud Computing Data Security in Attribute-based E...
收藏 引用
5th International conference on Image Processing and Capsule Networks, ICIPCN 2024
作者: Yuvarani, R. Mahaveerakannan, R. Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamilnadu Chennai602105 India
Attribute-Based Encryption (ABE) is a powerful cryptographic technology used in cloud computing and data security. It allows data owners to control access to encrypted data based on specific characteristics rather tha... 详细信息
来源: 评论
Multi-Modality Mobile datasets for Behavioral Biometrics Research data/Toolset paper  23
Multi-Modality Mobile Datasets for Behavioral Biometrics Res...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Ray-Dowling, Aratrika Wahab, Ahmed Anu Hou, Daqing Schuckers, Stephanie Clarkson Univ Dept Elect & Comp Engn Potsdam NY 13676 USA
the ubiquity of mobile devices nowadays necessitates securing the apps and user information stored therein. However, existing one-time entry-point authentication mechanisms and enhanced security mechanisms such as Mul... 详细信息
来源: 评论
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on third-Party Clouds  23
A Tenant-based Two-stage Approach to Auditing the Integrity ...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Oqaily, Momen Majumdar, Suryadipta Wang, Lingyu Kabir, Mohammad Ekramul Jarraya, Yosr Asadujjaman, A. S. M. Pourzandi, Makan Debbabi, Mourad Concordia Univ CIISE Montreal PQ Canada Ericsson Secur Res Montreal PQ Canada
there is a growing trend of hosting chains of Virtual Network Functions (VNFs) on third-party clouds for more cost-effective deployment. However, the multi-actor nature of such a deployment may allow a mismatch to sil... 详细信息
来源: 评论
threshold spatial keyword ciphertext retrieval with enhanced privacy  24
Threshold spatial keyword ciphertext retrieval with enhanced...
收藏 引用
5th International conference on Computer Science and Management Technology, ICCSMT 2024
作者: Wei, Yuanli Chen, Zhenya Yang, Ming Wang, Xin Wu, Xiaoming Shandong Jinan China
With the rapid development of geolocation technology and the explosive growth of data volumes, massive spatial data has been migrated to cloud storage and processing, which effectively alleviates the pressure on local... 详细信息
来源: 评论
security and Efficient Proven data Procure with privacy in Cloud based storage  5
Security and Efficient Proven Data Procure with Privacy in C...
收藏 引用
5th International conference on Inventive Research in Computing applications, ICIRCA 2023
作者: Santhi, K. Reddy, P Jayachandra Tirupati India
In Cloud computing, computing services are distributed over the internet to provide more rapid innovation, resilient resources and cost reduction. this method allows lower maintenance and cuts down storage costs for t... 详细信息
来源: 评论
Unmasking the Potential of Usable security and privacy Technologies in Empowering African Digital Landscapes  4
Unmasking the Potential of Usable Security and Privacy Techn...
收藏 引用
4th African conference on Human Computer Interaction (AfriCHI) - Beyond Limits
作者: Gamundani, Attlee M. Namibia Univ Sci & Technol Cybersecur Dept Fac Comp & Informat Windhoek Namibia
this paper comprehensively explores the intersection of Human-Computer Interaction (HCI), usable security, and privacy technologies within the context of the rapidly digitising African continent. Recognising the incre... 详细信息
来源: 评论
2023 5th Blockchain and Internet of things conference, BIOTC 2023
2023 5th Blockchain and Internet of Things Conference, BIOTC...
收藏 引用
2023 5th Blockchain and Internet of things conference, BIOTC 2023
the proceedings contain 11 papers. the topics discussed include: blockchain capabilities in supply chain management: a literature review;implementing multisignature on a blockchain-based land administration system: se...
来源: 评论
Towards Fast and Scalable Private Inference  23
Towards Fast and Scalable Private Inference
收藏 引用
20th acm International conference on Computing Frontiers (CF)
作者: Mo, Jianqiao Garimella, Karthik Neda, Negar Ebel, Austin Reagen, Brandon NYU New York NY 10012 USA
privacy and security have rapidly emerged as first order design constraints. Users now demand more protection over who can see their data (confidentiality) as well as how it is used (control). Here, existing cryptogra... 详细信息
来源: 评论
Slope Selection Regressive Probabilistic Rabin Trapdoor Signcryption based Secure data Transaction in Fog Computing  5
Slope Selection Regressive Probabilistic Rabin Trapdoor Sign...
收藏 引用
5th International conference on Smart Electronics and Communication, ICOSEC 2024
作者: Rajkumaran, T. Shanmugam, T.K. Gobi Arts&Science College Department of Computer Science Tamil Nadu Gobichettipalayam India
the Internet of things (IoT) has become an integral part of numerous applications, connecting devices to facilitate efficient communication. However, the collection and storage of sensitive information in third-party ... 详细信息
来源: 评论
EEITE 2024 - proceedings of 2024 5th International conference in Electronic Engineering, Information Technology and Education
EEITE 2024 - Proceedings of 2024 5th International Conferenc...
收藏 引用
5th International conference in Electronic Engineering, Information Technology and Education, EEITE 2024
the proceedings contain 52 papers. the topics discussed include: evaluating the performance of a MIMO channel under tree shadowing for low-altitude UAVs;eco-design applied to FDM 3D printing technology;a tethered unma...
来源: 评论