咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1431-1440 订阅
排序:
security in sensor networks: Industry trends, present and future research directions
Security in sensor networks: Industry trends, present and fu...
收藏 引用
5th International conference on Informational Processing in Sensor Networks
作者: Perrig, Adrian Carnegie Mellon Univ Pittsburgh PA 15213 USA
security is of critical importance for the successful deployment of sensor networks, since it can ensure properties such as data integrity, secrecy, and availability. We have the unique opportunity to ensure security ... 详细信息
来源: 评论
Visualization for privacy compliance
Visualization for privacy compliance
收藏 引用
3rd International Workshop on Visualization for Computer security, VizSEC'06. Co-located with the 13th acm conference on Computer and Communications security, CCS'06
作者: Yee, George National Research Council Canada Building M-50 1200 Montreal Road Ottawa Ont. K1A 0R6 Canada
the growth of the Internet has been accompanied by the growth of e-services (e.g. e-commerce, e-health). this proliferation of e-services has put large quantities of consumer private information in the hands of the se... 详细信息
来源: 评论
Protecting private data in an outsourcing environment
Protecting private data in an outsourcing environment
收藏 引用
5th IASTED International conference on Communications, Internet, and Information Technology
作者: Zhang, Yuan Enbody, Richard J. Michigan State Univ Dept Comp Sci & Engn E Lansing MI 48824 USA
Outsourcing, as a popular business model, helps enterprises cut operating costs, but at the same time it also puts the enterprise's sensitive data in danger. How to ensure that private data is safe when it is dist... 详细信息
来源: 评论
5th Australasian data Mining conference, AusDM 2006
5th Australasian Data Mining Conference, AusDM 2006
收藏 引用
5th Australasian data Mining conference, AusDM 2006
this proceedings contains 25 papers. data mining and analytics today have advanced rapidly from the early days of pattern finding in commercial databases. they are now a core part of business intelligence and inform d...
来源: 评论
A GrC-based approach to social network data protection
A GrC-based approach to social network data protection
收藏 引用
5th International conference on Rough Sets and Current Trends in Computing
作者: Wang, Da-Wei Liau, Churn-Jung Hsu, Tsan-Sheng Acad Sinica Inst Informat Sci Taipei 115 Taiwan
Social network analysis is an important methodology in sociological research. Although social network data is very useful to researchers and policy makers, releasing it to the public may cause an invasion of privacy. ... 详细信息
来源: 评论
Quality of protection: Measuring the unmeasurable?
Quality of protection: Measuring the unmeasurable?
收藏 引用
2nd acm Workshop on Quality of Protection, QoP'06. Co-located with the 13th acm conference on Computer and Communications security, CCS'06
作者: McHugh, John Canada Research Chair in Privacy and Security Faculty of Computer Science Dalhousie University Halifax NS B3H 1W5 Canada
security is an abstraction. Even the technique used by Justice Stewart to define hard core pornography1 does not appear to be applicable as we are unable to discern those characteristics of a system that would lead us... 详细信息
来源: 评论
Cheating immune (2, n)-threshold visual secret sharing
收藏 引用
5th International conference on security and Cryptography for Networks
作者: De Prisco, Roberto De Santis, Alfredo Univ Salerno Dipartimento Informat & Applicaz I-84081 Baronissi SA Italy
Cheating in secret sharing has been considered in several papers. Recently cheating in visual cryptography has been considered in [10], where (2, n)-threshold visual cryptography schemes are provided. In this paper we... 详细信息
来源: 评论
9th International conference on security and privacy in Communication Networks, SecureComm 2013
收藏 引用
5th International Workshop of Finite-State Methods and Natural Language Processing, FSMNLP 2005
the proceedings contain 26 papers. the special focus in this conference is on security and privacy in Communication Networks. the topics include: Secure and verifiable top-k query in two-tiered sensor networks;a bidir...
来源: 评论
Proof-carrying proxy certificates
收藏 引用
5th International conference on security and Cryptography for Networks
作者: Bagga, Walid Crosta, Stefano Molva, Refik Corp Commun Inst Eurecom F-06904 Sophia Antipolis France
the term proxy certificate is used to describe a certificate that is issued by an end user for the purpose of delegating responsibility to another user so that the latter can perform certain actions on behalf of the f... 详细信息
来源: 评论
proceedings: 5th IEEE/ACIS International conference on Computer and Information Science (ICIS 2006) in conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (COMSAR 2006)
Proceedings: 5th IEEE/ACIS International Conference on Compu...
收藏 引用
5th IEEE/ACIS International conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, COMSAR 2006
the proceedings contain 79 papers. the topics discussed include: a grid scheduling algorithm for bag-of-tasks applications using multiple queues with duplication;model the MPI performance for non-contiguous data;optim... 详细信息
来源: 评论