咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1331-1340 订阅
排序:
5th IFIP WG 9.2 conference on privacy and Identity Management for Life, 2009
5th IFIP WG 9.2 Conference on Privacy and Identity Managemen...
收藏 引用
5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, 2009
the proceedings contain 25 papers. the special focus in this conference is on privacy and Identity Management for Life. the topics include: Delegation for privacy management from womb to tomb - a European perspective;...
来源: 评论
An approach for protecting privacy on social networks
An approach for protecting privacy on social networks
收藏 引用
International conference on Systems and Networks Communications
作者: Yüksel, Asim Sinan Yüksel, Mehmet Erkan Zaim, Abdül Halim Computer Science Department School of Informatics and Computing Indiana University Bloomington IN United States Computer Engineering Department Faculty of Engineering Istanbul University Istanbul Turkey
Social networking has become a part of our life. We redundantly share our personal information with people in social networks and Internet. these networks allow users to share just about everything: data, photos, vide... 详细信息
来源: 评论
Public key cryptography-based security scheme for wireless sensor networks in healthcare  10
Public key cryptography-based security scheme for wireless s...
收藏 引用
4th International conference on Uniquitous Information Management and Communication, ICUIMC'10
作者: Le, Xuan Hung Sankar, Ravi Khalid, Murad Lee, Sungyoung University of South Florida 4202 E Fowler Ave Tampa FL 33620 United States Kyung Hee University Seocheon-dong Giheung-gu Yongin-si Gyeonggi-do 449-701 Korea Republic of
the application of wireless sensor networks (WSNs) in healthcare is one of the most important and rapidly growing areas. One of the most critical security concerns is patients' privacy. Since patients are monitore... 详细信息
来源: 评论
11th acm/IFIP/USENIX International Middleware conference, Middleware 2010
11th ACM/IFIP/USENIX International Middleware Conference, Mi...
收藏 引用
11th acm/IFIP/USENIX International Middleware conference, Middleware 2010
the proceedings contain 19 papers. the special focus in this conference is on Cloud computing, data management, Publish-Subscribe and Multicast Systems, Social and location-aware middleware, Reliability and legacy, Tr...
来源: 评论
Survey on Legal data Protection Norms Relevant to Automated Network Infrastructure Analysis
Survey on Legal Data Protection Norms Relevant to Automated ...
收藏 引用
8th International Network conference (INC)
作者: Ritter, Ingo Kappes, Martin Wedde, Peter Gad, Ruediger Renner, Andreas Univ Appl Sci Frankfurt Main Frankfurt Germany
In order to conduct an automated network infrastructure discovery yielding a complete description of the network and its components as possible, it is necessary to analyze data flows and services provided in the netwo... 详细信息
来源: 评论
A Reconfigurable and Scalable Architecture for security Coprocessor
A Reconfigurable and Scalable Architecture for Security Copr...
收藏 引用
5th IEEE conference on Industrial Electronics and applications
作者: Li, Chao Zhou, Jun Jiang, Yuan Chen, Canfeng Xu, Yongjun Luo, Zuying Chinese Acad Sci Inst Comp Technol Beijing Peoples R China Beijing Normal Univ Beijing Peoples R China Beihang Univ Beijing Peoples R China Nokia Res Ctr Beijing Peoples R China
security coprocessor can offer special and customized security guarantee for computing and communication system. In most of the application fields, the coprocessor should be small-area, low-power, low-cost and high-av... 详细信息
来源: 评论
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Syst...
收藏 引用
5th International conference on Availability, Reliability and security
作者: Loehr, Hans Sadeghi, Ahmad-Reza Winandy, Marcel Ruhr Univ Bochum Horst Gortz Inst IT Secur Bochum Germany
Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. this includes system state integrity and the secure lin... 详细信息
来源: 评论
Patient-centric secure-and-privacy-preserving Service-Oriented Architecture for health information integration and exchange
Patient-centric secure-and-privacy-preserving Service-Orient...
收藏 引用
5th International conference on Semantic Technologies for Intelligence, Defense, and security, STIDS 2010
作者: Awad, Mahmoud Kerschberg, Larry Center for Health Information Technology George Mason University United States
In this paper, we propose a secure and privacy-preserving Service Oriented Architecture (SOA) for health information integration and exchange in which patients are "part owners" of their medical records, hav... 详细信息
来源: 评论
Untrained multiple classifier system for designing security scanner for web applications
Untrained multiple classifier system for designing security ...
收藏 引用
2010 5th International conference on Information and Automation for Sustainability, ICIAfS 2010
作者: Sztajer, Szymon Wozniak, Michal Departmet of Systems and Computer Networks Wroclaw University of Technology Wybrzeze Wyspianskiego 27 50-370 Wroclaw Poland
the Multiple Classifier Systems are nowadays one of the most promising directions in pattern recognition. there are many methods of decision making based on classifier groups. the most popular are those methods that h... 详细信息
来源: 评论
Choosing Authentication Techniques in e-Procurement System in Serbia
Choosing Authentication Techniques in e-Procurement System i...
收藏 引用
5th International conference on Availability, Reliability and security
作者: Milovanovic, Milos Bogicevic, Marija Lazovic, Miroslav Simic, Dejan Starcevic, Dusan
E-Government can provide a citizen with better and/or more convenient services as opposed to the traditional government services. application of electronic approach in completing an e-Procurement process opens up a lo... 详细信息
来源: 评论