咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是1301-1310 订阅
排序:
Analyzing inter-application communication in Android  11
Analyzing inter-application communication in Android
收藏 引用
proceedings of the 9th international conference on Mobile systems, applications, and services
作者: Chin, Erika Felt, Adrienne Porter Greenwood, Kate Wagner, David University of California Berkeley Berkeley CA United States
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provides a rich inter-application message pa... 详细信息
来源: 评论
Encryption based on variable chaotic key for wireless medical data transmission
Encryption based on variable chaotic key for wireless medica...
收藏 引用
2011 5th International conference on application of Information and Communication Technologies, AICT 2011
作者: Naeemabadi, Mohammadreza Zabihi, Morteza Chomachar, Nooshaz Amirahmadi Ordoubadi, Behnam Sadeghi Khalilzadeh, Mohammad Ali Ordoubadi, Mehrdad Sadeghi Young Researchers Club Majlesi Branch Islamic Azad University Isfahan Iran Biomedical Engineering Dept. Tampere University of Technology Tampere Finland Department of Information Technology Mashhad Branch Islamic Azad University Mashhad Iran Department of Biomedical Engineering Mashhad Branch Islamic Azad University Mashhad Iran Research Center of Biomedical Engineering Mashhad Branch Islamic Azad University Mashhad Iran Department of Cardiology Mashhad Branch Islamic Azad University Mashhad Iran Department of ACHD Rajaei Cardiovascular Medical and Research Center Tehran Iran
According to expanding the use of wireless communication technology in transmitting critical data the importance of privacy and security of data are irrevocable. Numerous data encryption algorithms are being done curr... 详细信息
来源: 评论
Private searching for single and conjunctive keywords on streaming data
Private searching for single and conjunctive keywords on str...
收藏 引用
10th Annual acm Workshop on privacy in the Electronic Society, WPES'11 - Co-located with 18th acm conference on Computer and Communications security, CCS 2011
作者: Yi, Xun Bertino, Elisa Victoria University Melbourne VIC 8001 Australia Purdue University West Lafayette IN 47907 United States
Current solutions for private searching on streaming data only support searching for "OR" of keywords or "AND" of two sets of keywords. In this paper, we extend the types of private queries to supp... 详细信息
来源: 评论
Comments on a secret-key-privacy-preserving authentication and key agreement scheme
Comments on a secret-key-privacy-preserving authentication a...
收藏 引用
5th International conference on Genetic and Evolutionary Computing, ICGEC2011
作者: Chang, Ya-Fen Lin, Jhih-Yi Yen, Yuo-Ju Department of Computer Science and Information Engineering National Taichung Institute of Technology Taichung 404 Taiwan
Lots applications need involved parties to share common session keys for specific requirements. For example, the shared key can be the seed to determine locations to hide secret data into an image. Wang et al. propose... 详细信息
来源: 评论
ToMaTo: A trustworthy code mashup development tool  11
ToMaTo: A trustworthy code mashup development tool
收藏 引用
5th International Workshop on Web APIs and Service Mashups, Mashups 2011
作者: Chang, Jian Venkatasubramanian, Krishna West, Andrew G. Kannan, Sampath Sokolsky, Oleg Kim, Myuhng Joo Lee, Insup Department of Computer and Information Science University of Pennsylvania United States Department of Information Security Seoul Women's University Korea Republic of
Recent years have seen the emergence of a new programming paradigm for Web applications that emphasizes the reuse of external content, the mashup. Although the mashup paradigm enables the creation of innovative Web ap... 详细信息
来源: 评论
Designing and Implementing a Middleware for data Dissemination in Wireless Sensor Networks  5
Designing and Implementing a Middleware for Data Disseminati...
收藏 引用
5th International conference on Sensor Technologies and applications (SENSORCOMM) / 1st International Workshop on Sensor Networks for Supply Chain Management (WSNSCM)
作者: Beaubrun, Ronald Llano-Ruiz, Jhon-Fredy Quintero, Alejandro Univ Laval Dept Comp Sci & Software Engn Quebec City PQ Canada Ecole Polytech Montreal Dept Comp & Software Engn Montreal PQ Canada
In this paper, we propose an approach for designing and implementing a middleware for data dissemination in Wireless Sensor Networks (WSNs). the designing aspect considers three perspectives: device, network and appli... 详细信息
来源: 评论
Group key exchange with non-linear trust
Group key exchange with non-linear trust
收藏 引用
2011 IEEE 5th International conference on Internet Multimedia Systems Architecture and application, IMSAA 2011
作者: Paul, Mithun Gorantla, M. Choudary Saxena, Ashutosh Security and Privacy Group Infosys Labs. Infosys Ltd. Hyderabad 500019 India
Group Key Exchange allows a set of parties to communicate over a public network and securely establish a secret session key. thus, it is a critical protocol for emerging network applications that require collaborated ... 详细信息
来源: 评论
A privacy preserved two-party equality testing protocol
A privacy preserved two-party equality testing protocol
收藏 引用
5th International conference on Genetic and Evolutionary Computing, ICGEC2011
作者: Ciou, Shih-Fong Tso, Raylin Department of Computer Science National Chengchi University Taiwan
Secure multiparty computation was firstly introduced by Yao in 1982. Two-party equality testing is a special case of secure multiparty computation. It enables two entities to compare the equality of their secret data ... 详细信息
来源: 评论
application of models in information security management
Application of models in information security management
收藏 引用
2011 5th International conference on Research Challenges in Information Science, RCIS 2011
作者: Milicevic, Danijel Goeken, Matthias IT-Governance-Practice-Network Frankfurt School of Finance and Management Frankfurt am Main Germany
the impact of information technology on business operations is widely recognized and its role in the emergence of new business models is well-known. In order to leverage the benefits of IT-supported business processes... 详细信息
来源: 评论
Behavior model for detecting data exfiltration in network environment
Behavior model for detecting data exfiltration in network en...
收藏 引用
2011 IEEE 5th International conference on Internet Multimedia Systems Architecture and application, IMSAA 2011
作者: Ramachandran, Rajamenakshi Neelakantan, Subramanian Bidyarthy, Ajay Shankar Electronics City Bangalore India Guwahati India
there is a growing concern across the globe about exfiltration of sensitive data over network. this coupled with the increase in other insider threats pose greater challenge. Present day perimeter security solutions s... 详细信息
来源: 评论