咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1401-1410 订阅
排序:
Distributed Computing and Internet Technology - 5th International conference, ICDCIT 2008, proceedings
收藏 引用
5th International conference on Distributed Computing and Internet Technology, ICDCIT 2008
the proceedings contain 20 papers. the topics discussed include: a denotational model for Web services choreography;automated testing of description logic reasoners;a domain-specific language for application-level che...
来源: 评论
application based meta tagging of network connections
Application based meta tagging of network connections
收藏 引用
5th International conference on Information Technology - New Generations
作者: Wallis, Mark Henskens, Frans Hannaford, Michael Univ Newcastle Distributed Comp Res Grp Newcastle NSW 2308 Australia
Modern operating systems offer a large array of features in their network subsystems that support fine-grained access control, monitoring and accounting. Such features allow a system administrator to account and filte... 详细信息
来源: 评论
Cooperative Design, Visualization, and Engineering - 5th International conference, CDVE 2008 Calvia, Mallorca, Spain
Cooperative Design, Visualization, and Engineering - 5th Int...
收藏 引用
5th International conference on Cooperative Design, Visualization, and Engineering, CDVE 2008
the proceedings contain 45 papers. the topics discussed include: synthetic environments for cooperative product design;cooperative design using Haptic interaction and 3D visualization;application of parallel programmi...
来源: 评论
Trust modeling for secure web application development
Trust modeling for secure web application development
收藏 引用
5th European and Mediterranean conference on Information Systems, EMCIS 2008
作者: Doroodchi, Mahmood Sharifnia, Mohammad B. Iranmehr, Azadeh Department of Mathematics and Computer Science Cardinal Stritch University United States Islamic Azad University Fasa Iran Shiraz University Iran
Trust is the main concern in securing web applications and it has to be implemented in every layer of application at the time of development. Building trust based on a proper model is an important step in designing a ... 详细信息
来源: 评论
Optimization of WAMDAS:: A web service-based wireless alarm monitoring and data acquisition system for pharmaceutical plants
Optimization of WAMDAS:: A web service-based wireless alarm ...
收藏 引用
5th International conference on Information Technology - New Generations
作者: Quispe-Holgado, Edith Rodriguez-Martinez, Manuel Garcia-Rodriguez, Edilberto Department of Electrical and Computer Engineering University of Puerto Rico at Mayagüez
We present a novel infrastructure which allows the Web Service-Based Wireless Alarm Monitoring and data Acquisition System for Pharmaceutical Plants (WAMDAS) to be a more portable, reliable, secure and robust wireless... 详细信息
来源: 评论
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
收藏 引用
5th International conference on Autonomic and Trusted Computing
作者: Yau, Wei-Chuen Heng, Swee-Huay Goi, Bok-Min Multimedia Univ CCIS Fac Engn Cyberjaya 63100 Selangor Darul Malaysia Multimedia Univ Fac Informat Sci & Technol CCIS Melaka Malaysia
the Public Key Encryption with Keyword Search Scheme (PEKS) was first proposed by Boneh et al. in 2004. this scheme solves the problem of searching on data that is encrypted using a public key setting. Recently, Back ... 详细信息
来源: 评论
Collaborative Design of Heterogeneous data Integration Communication, Gateway Based on the Embedded Platform
Collaborative Design of Heterogeneous Data Integration Commu...
收藏 引用
5th International conference on Embedded Software and Systems
作者: Zhang, Dejing Xing, Jianping Chen, Gang Qin, Kai Shandong Univ Sch Informat Sci & Engn Jinan Peoples R China Navigat Commun Co syst Engn Ctr Jinan Peoples R China Shandong Police Coll Jian Peoples R China
An embedded gateway serving for the communication between Ethernet and the heterogeneous multilayer interfaces is put forward in this paper. Based on the analysis of the common application requirements in multi-indust... 详细信息
来源: 评论
TIME: An Open Platform for Capturing, Processing and Delivering Transport-Related data
TIME: An Open Platform for Capturing, Processing and Deliver...
收藏 引用
Consumer Communications and Networking conference, CCNC IEEE
作者: Jean Bacon Alastair R. Beresford David Evans David Ingram Niki Trigoni Alexandre Guitton Antonios Skordylis Computer Laboratory University of Cambridge Cambridge UK Computing Laboratory Oxford University Oxford UK Computer Laboratory Oxford University Oxford UK
Road congestion and traffic-related pollution have a large, negative social and economic impact, and we believe many of these problems can be reduced through investment in monitoring, distribution and processing of tr... 详细信息
来源: 评论
An improved proof for RFID tags
An improved proof for RFID tags
收藏 引用
International conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON
作者: thiti Nuamcherm Piya Kovintavewat Charturong Tantibundhit Urachada Ketprom Chaichana Mitrpant Electrical and Computer Engineering Department Thammasat University Thailand RFID Technology and Application Research Unit Nakhon Pathom Rajabhat University Nakhon Pathom Thailand RFID Program National Electronics and Computer Technology Center Thailand
An RFID system consists of an RFID reader, a server connected to a database, and RFID tags attached to the objects needed to be identified. We are interested in the case where two tags are needed to be simultaneously ... 详细信息
来源: 评论
privacy-Preserving Remote Diagnostics
Privacy-Preserving Remote Diagnostics
收藏 引用
14th acm conference on Computer and Communication security
作者: Brickell, Justin Porter, Donald E. Shmatikov, Vitaly Witchel, Emmett Univ Texas Austin Austin TX 78712 USA
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. the protocol applies a branching diagnostic program with classific... 详细信息
来源: 评论