咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1411-1420 订阅
排序:
Addressing security in medical sensor networks
Addressing security in medical sensor networks
收藏 引用
5th International conference on Mobile Systems, applications and Services
作者: Malasri, Kriangsiri Wang, Lan Department of Computer Science University of Memphis Memphis TN 38152-3240
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of Patients) to address these challenges. ... 详细信息
来源: 评论
privacy-preserving set union
收藏 引用
5th International conference on Applied Cryptography and Network security
作者: Frikken, Keith Miami Univ Dept Comp Sci & Syst Anal Oxford OH 45056 USA
Recently there has been a significant amount of work on privacy-preserving set operations, including: set intersection [14,6,21,9], testing set disjointness [17], multi-set operations [18], and set union [16,1,18]. In... 详细信息
来源: 评论
privacy protection in dynamic systems based on RFID tags
Privacy protection in dynamic systems based on RFID tags
收藏 引用
5th IEEE International conference on Pervasive Computing and Communications
作者: Cichon, Jacek Klonowski, Marek Kutylowski, Miroslaw Wroclaw Univ Technol Inst Math & Comp Sci Ul Wybrzeze Wyspianskiego PL-50370 Wroclaw Poland
We propose a solution for privacy problems regarding use of electronic identification tags such as RFID's. In our scheme the ID tag changes at random driven by its internal circuitry during each activation. the ch... 详细信息
来源: 评论
the privacy framework: Protecting clickstream data
The privacy framework: Protecting clickstream data
收藏 引用
5th IASTED International conference on Law and Technology, LawTech 2007
作者: Wong, Rebecca Garrie, Daniel B. Senior Lecturer in Law Nottingham Law School Nottingham Trent University Burton Street Nottingham NG1 4BU United Kingdom Editor-in-Chief Journal of Technology Risk Management 4580 Klahanie Dr SE Suite 161 Issaquah WA 98029 United States
Clickstream data is an issue that cannot be ignored by non-EEA data controllers, data Protection Authorities, Legislators and the Judiciary. this paper discusses the notion of clickstream data in the context of the Eu... 详细信息
来源: 评论
ACSW Frontiers 2007: 5th Australasian Symposium on Grid Computing and e-Research, AusGrid 2007, the 5th Australasian Information security Workshop (privacy Enhancing Technologies), AISW 2007, and the Australasian Workshop on Health Knowledge Management and Discovery, HKMD 2007
ACSW Frontiers 2007: 5th Australasian Symposium on Grid Comp...
收藏 引用
5th Australasian Symposium on Grid Computing and e-Research, AusGrid 2007, and the 5th Australasian Information security Workshop (privacy Enhancing Technologies), AISW 2007, and the Australasian Workshop on HKMD 2007
this proceedings contains 30 papers. this proceedings contains the papers that focused on creating interest in e-Research (or e-Science) and grid computing that is rapidly growing, driven by real-world applications of...
来源: 评论
Generic probability density function reconstruction for randomization in privacy-preserving data mining  1
收藏 引用
5th International conference on Machine Learning and data Mining in Pattern Recognition
作者: Tan, Vincent Yan Fu Ng, See-Kiong MIT 77 Massachusetts Ave Cambridge MA 02139 USA Inst Infocomm Res I2R Singapore 119613 Singapore
data perturbation with random noise signals has been shown to be useful for data hiding in privacy-preserving data mining. Perturbation methods based on additive randomization allows accurate estimation of the Probabi... 详细信息
来源: 评论
An application of the naccache-stern knapsack cryptosystem to biometric authentication
An application of the naccache-stern knapsack cryptosystem t...
收藏 引用
5th IEEE Workshop on Automatic Identification Advanced Technologies
作者: Bringer, Julien Chabanne, Herve Tang, Qiang Sagem Défense Sécurité Département d'Informatique École Normale Supérieure 75230 Paris Cedex 05 45 Rue d'Ulm France
We focus on privacy, concerns while dealing with biometrics authentication. Our aim is that no biometrics should be leaked during the authentication and that its storage should be secure. Namely, we want to be able to... 详细信息
来源: 评论
A three layered model to implement data privacy policies
A three layered model to implement data privacy policies
收藏 引用
5th International Workshop on security in Information Systems - WOSIS 2007;In Conjunction with ICEIS 2007
作者: Canfora, Gerardo Visaggio, Corrado Aaron Research Centre on Software Technology University of Sannio Viale Traiano 1 Benevento Italy
Many business services for private companies and citizens are increasingly accomplished trough the web and mobile devices. As such a scenario is characterized by high dynamism and untrustworthiness, existing technolog... 详细信息
来源: 评论
Increasing security in the Physical layer of wireless communication
Increasing security in the Physical layer of wireless commun...
收藏 引用
5th Australian Information security Management conference
作者: Golygowski, Luke School of Computer and Information Science Edith Cowan University Australia
this paper introduces a concept of increasing securing in the Physical layer (PHY) of wireless communication. It gives a short description of current status of wireless standards and their security. Despite the existe... 详细信息
来源: 评论
the need for an investigation into possible security threats associated with SQL based EMR software
The need for an investigation into possible security threats...
收藏 引用
5th Australian Information security Management conference
作者: Heinke, Lee School of Computer and Information Science Edith Cowan University Mount Lawley WA Australia
An increasing amount of E-health software packages are being bundled with Standard Query Language (SQL) databases as a means of storing Electronic Medical Records (EMR's). these databases allow medical practitione... 详细信息
来源: 评论