咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1391-1400 订阅
排序:
User-controllable learning of security and privacy policies
User-controllable learning of security and privacy policies
收藏 引用
1st acm Workshop on AISec, AISec'08, Co-located with the 15th acm Computer and Communications security conference, CCS'08
作者: Kelley, Patrick Gage Drielsma, Paul Hankes Sadeh, Norman Cranor, Lorrie Faith School of Computer Science Carnegie Mellon University 5000 Forbes Ave. Pittsburgh PA 15213 United States
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have successfully been used to refine models of... 详细信息
来源: 评论
Introducing privacy in a hospital information system
Introducing privacy in a hospital information system
收藏 引用
30th International conference on Software Engineering, ICSE 2008 - 4th International Workshop on Software Engineering for Secure Systems, SESS'08
作者: Braghin, Stefano Coen-Porisini, Alberto Colombo, Pietro Sicari, Sabrina Trombetta, Alberto Dipartimento di Informatica e Comunicazione Università degli Studi dell'Insubria via Mazzini 5 21100 Varese Italy
security and privacy issues in healthcare data management play a fundamental role in the widespread adoption of medical information systems. As a consequence, it is very important to define the right means for express... 详细信息
来源: 评论
Design of Network Management Platform and security Framework for WSN
Design of Network Management Platform and Security Framework...
收藏 引用
4th International conference on Signal Image Technology and Internet Bases Systems
作者: Lee, Byunggil Bae, Seungjo Han, Dongwon Elect & Telecommun Res Inst Taejon South Korea
Wireless sensor networks are rapidly emerging as an important area in ubiquitous computing industry. they are very tiny devices with limited energy, memory, transmission range, and computation power. So, wireless sens... 详细信息
来源: 评论
Towards successive privacy protection in Sensor Networks
Towards successive privacy protection in Sensor Networks
收藏 引用
5th International conference on Embedded and Ubiquitous Computing
作者: Zhao, Baokang Wang, Dan Shao, Zili Cao, Jiannong Chan, Keith C. C. Su, Jinshu Yang, Yanqin Hong Kong Polytech Univ Dept Comp Kowloon Hong Kong Peoples R China Hong Kong Polytech Univ Dept Comp Kowloon Hong Kong Peoples R China Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai Peoples R China
With the emerging embedding of the sensor networks into the pervasive environment, our capabilities on location information gathering and processing have been greatly improved. Although this information is very useful... 详细信息
来源: 评论
A Shared Steganographic File System with Error Correction
A Shared Steganographic File System with Error Correction
收藏 引用
5th International conference on Modeling Decisions for Artificial Intelligence
作者: Doiningo-Ferrer, Josep Bras-Amoros, Maria Univ Rovira & Virgili UNESCO Chair Data Privacy Dept Comp Engn & Math E-43007 Tarragona Catalonia Spain
Steganographic file systems are file systems where the location and even the existence of files are unknown to the users not having stored them. If the file system can be written to by several users, a user may inadve... 详细信息
来源: 评论
Modeling Decisions for Artificial Intelligence - 5th International conference, MDAI 2008, proceedings
Modeling Decisions for Artificial Intelligence - 5th Interna...
收藏 引用
5th International conference on Modeling Decisions for Artificial Intelligence, MDAI 2008
the proceedings contain 21 papers. the topics discussed include: toward elucidating language functions in the brain;privacy-preserving similarity evaluation and application to remote biometrics authentication;suitabil...
来源: 评论
Trust, privacy and security in Digital Business  2008
收藏 引用
丛书名: Lecture Notes in Computer Science
2008年
作者: Steven M. Furnell Sokratis Katsikas Antonio Lioy
this book constitutes the refereed proceedings of the 5th International conference on Trust and privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. the 18... 详细信息
来源: 评论
Assertions signcryption scheme in decentralized autonomous trust environments
收藏 引用
5th International conference on Autonomic and Trusted Computing
作者: Zhang, Mingwu Yang, Bo Zhu, Shenglin Zhang, Wenzheng S China Agr Univ Coll Informat Dept Comp Sci & Engn Guangzhou 510642 Guangdong Peoples R China National Lab Modern Commun Chengdu 610041 Peoples R China
Trust management is a crucial approach to authenticate user and protect resource in distributed systems. Trust between two unknown parties in different autonomous domain is established based on the parties properties,... 详细信息
来源: 评论
application of Improved Algorithm of data Reduction to Knowledge Discovery of Information security Management
Application of Improved Algorithm of Data Reduction to Knowl...
收藏 引用
5th International conference on Fuzzy Systems and Knowledge Discovery
作者: Hao Xiaoling Li Ming Shanghai Univ Finance & Econ Shanghai 200433 Peoples R China Tongji Univ Shanghai 200092 Peoples R China
Rough set theory has been a powerful methodology in data mining and knowledge discovery, extracting and minimizing rules from decision tables. there are mainly two kinds of ways for knowledge discovery: the one is to ... 详细信息
来源: 评论
A Novel Self-Renewal Hash Chain and Its Implementation
A Novel Self-Renewal Hash Chain and Its Implementation
收藏 引用
5th International conference on Embedded and Ubiquitous Computing
作者: Zhang, Haojun Li, Xiaoxue Ren, Rui Henan Univ Technol Zhengzhou 450001 Henan Peoples R China Agr Bank China Henan Branch Henan 450001 Peoples R China
Hash Chains are widely used for entity authentication or data-origin authentication. However, finite length of a hash chain limits its implementations. A new kind of hash chain, called Self-Renewable Hash Chain (SRHC)... 详细信息
来源: 评论