咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是1321-1330 订阅
排序:
Project management/society benefits - Spatial data integrated into geographic information system
Project management/society benefits - Spatial data integrate...
收藏 引用
International conference on Recent Advances in Space Technologies (RAST)
作者: Sefer Kurnaz Saida E. Salahova Sabina N. Hasanova Rustam B. Rustamov Sevinj R. Rustamova Maral H. Zeynalova Turkish Air Force Academy Aeronautics and Space Technologies Institute Istanbul Turkey Institute of Physics Azerbaijan National Academy of Sciences Baku Azerbaijan ENCOTEC-Engineering &Consulting Technologies Baku Azerbaijan Baku Azerbaijan ENCOTEC/Civil Construction and Architectural University Baku Azerbaijan Institute of Botany Azerbaijan National Academy of Sciences Baku Azerbaijan
On November 4, 2003, the Board of the International Finance Corporation (IFC), the private sector arm of the World Bank Group, approved lending to the Baku-Tbilisi-Ceyhan (BTC) oil pipeline and the Azeri-Chirag-Deepwa... 详细信息
来源: 评论
proceedings of the 5th International Symposium on Information, Computer and Communications security, ASIACCS 2010
Proceedings of the 5th International Symposium on Informatio...
收藏 引用
5th acm Symposium on Information, Computer and Communication security, ASIACCS 2010
the proceedings contain 37 papers. the topics discussed include: data protection in outsourcing scenarios: issues and directions;a lattice-based approach to mashup security;towards publishing recommendation data with ...
来源: 评论
A privacy Recommendation Wizard for Users of Social Networking Sites  10
A Privacy Recommendation Wizard for Users of Social Networki...
收藏 引用
17th acm conference on Computer and Communications security (CCS)
作者: Fang, Lujun Kim, Heedo LeFevre, Kristen Tami, Aaron Univ Michigan Elect Engn & Comp Sci 2260 Hayward Ave Ann Arbor MI 48109 USA
privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quite difficult for average users. this de... 详细信息
来源: 评论
Controlling data disclosure in computational PIR protocols  10
Controlling data disclosure in computational PIR protocols
收藏 引用
5th acm Symposium on Information, Computer and Communication security, ASIACCS 2010
作者: Shang, Ning Ghinita, Gabriel Zhou, Yongbin Bertino, Elisa Purdue University West Lafayette IN United States Institute of Software Chinese Academy of Sciences Beijing China
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data element retrieved. Several PIR protocol... 详细信息
来源: 评论
Model-Driven application-Level Encryption for the privacy of E-Health data
Model-Driven Application-Level Encryption for the Privacy of...
收藏 引用
5th International conference on Availability, Reliability and security
作者: Ding, Yun Klein, Karsten InterComponentWare AG R&D Basis Technol Walldorf Germany
We propose a novel model-driven application-level encryption solution to protect the privacy and confidentiality of health data in response to the growing public concern about the privacy of health data. Domain expert... 详细信息
来源: 评论
Collusion-resistant privacy-preserving data mining
Collusion-resistant privacy-preserving data mining
收藏 引用
16th acm SIGKDD International conference on Knowledge Discovery and data Mining, KDD-2010
作者: Yang, Bin Nakagawa, Hiroshi Sato, Issei Sakuma, Jun Graduate School of Information Science and Technology University of Tokyo Japan Information Technology Center University of Tokyo Japan Department of Computer Science University of Tsukuba Japan
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protection of private and personal informatio... 详细信息
来源: 评论
Design and auditing of Cloud computing security
Design and auditing of Cloud computing security
收藏 引用
2010 5th International conference on Information and Automation for Sustainability, ICIAfS 2010
作者: Gowrigolla, Bhagyaraj Sivaji, Sathyalakshmi Masillamani, M. Roberts Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science India
Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of config... 详细信息
来源: 评论
the privacy of tracing traitors
The privacy of tracing traitors
收藏 引用
10th Annual acm Workshop on Digital Rights Management, DRM '10, Co-located with CCS'10
作者: Naor, Moni Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot 76100 Israel
In this talk I will explore a connection between traitor tracing schemes and the problem of sanitizing data to remove personal information while allowing statistically meaningful information to be released. It is base... 详细信息
来源: 评论
Visualizing Past Personal data Disclosures
Visualizing Past Personal Data Disclosures
收藏 引用
5th International conference on Availability, Reliability and security
作者: Kolter, Jan Netter, Michael Pernul, Guenther Univ Regensburg Dept Informat Syst D-93040 Regensburg Germany
Today's rich service offer in the World Wide Web increasingly requires the disclosure of personal user data. Service providers' appetite for personal user data, however, is accompanied by growing privacy impli... 详细信息
来源: 评论
Provable security for the fuzzy fingerprint vault
Provable security for the fuzzy fingerprint vault
收藏 引用
5th International conference on Internet Monitoring and Protection, ICIMP 2010
作者: Merkle, Johannes Niesing, Matthias Schwaiger, Michael Ihmor, Heinrich Korte, Ulrike Secunet Security Networks AG D-45128 Essen Germany Bundesamt für Sicherheit in der Informationstechnik D-53175 Bonn Germany
We investigate the security of privacy enhancing techniques for biometric applications. the fuzzy vault of Jules and Sudan is a technique that allows error tolerant authentication, while preserving the privacy of the ... 详细信息
来源: 评论