咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1441-1450 订阅
排序:
Improved pairing protocol for Bluetooth
收藏 引用
5th International conference on Ad-Hoc, Mobile, and Wireless Networks
作者: Singelee, Dave Preneel, Bart Katholieke Univ Leuven ESAT COSIC Louvain Belgium
the Bluetooth wireless technology realizes a low-cost short-range wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture. In this paper, we focus on the key agreement... 详细信息
来源: 评论
Static analysis of anomalies and security vulnerabilities in executable files  44
Static analysis of anomalies and security vulnerabilities in...
收藏 引用
44th Annual acm Southeast conference, acmSE 2006
作者: Tevis, Jay-Evan J. Hamilton Jr., John A. Department of Computer Science Western Illinois University Macomb IL 61455 Department of Computer Science Auburn University Auburn AL 36849
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about executable files? Can these files also be ... 详细信息
来源: 评论
security for the storage network merging NAS and SAN
Security for the storage network merging NAS and SAN
收藏 引用
5th International conference on Machine Learning and Cybernetics
作者: Han, De-Zhi Huang, Jian-Zhong Jinan Univ Dept Comp Sci Guangzhou 510632 Guangdong Peoples R China
With the development of the networked storage and its application, the SNMNS (storage network merging NAS and SAN) came into being, which has such advantages as high performance, low cost, good connectivity and so on.... 详细信息
来源: 评论
data access techniques for location-based services  06
Data access techniques for location-based services
收藏 引用
7th International conference on Mobile data Management, 2006. MDM 2006
作者: Jianliang, Xu Baihua, Zheng Lee, Wang-Chien Hong Kong Baptist University Singapore Management University Pennsylvania State University
Location based service (LBS) is emerging as a killer application in mobile data services thanks to the rapid development in wireless communication and location positioning technologies. Users with location-aware wirel... 详细信息
来源: 评论
Spontaneous collaboration via browsing of semantic data on mobile devices
Spontaneous collaboration via browsing of semantic data on m...
收藏 引用
Semantic Desktop and Social Semantic Collaboration Workshop, SemDesk 2006 - Located at the 5th International Semantic Web conference, ISWC 2006
作者: Lassila, Ora Khushraj, Deepali Swick, Ralph R. Nokia Research Center Cambridge MA United States Massachusetts Institute of Technology Cambridge MA United States
In this paper we present a tool for browsing "semantically connected" data that the user has collected (or subscribed to) from multiple sources. By allowing customized views of the data, our tool can be seen... 详细信息
来源: 评论
A new flexible multi-agent approach to intrusion detection for Grid
A new flexible multi-agent approach to intrusion detection f...
收藏 引用
5th International conference on Machine Learning and Cybernetics
作者: Zhu, Pei-You Gao, Ji Jiang, Bo-Ou Song, Hui Zhejiang Univ Comp Sci & Engn Coll Hangzhou 310027 Zhejiang Peoples R China 51 Inst China Elect Technol Grp Corp Shenyang 201802 Peoples R China Shenyang Inst Aeronaut Engn Dynam Coll Shenyang 110034 Peoples R China
Grid is a new technology which implements flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources. Unlike in conventional network systems, the services and ... 详细信息
来源: 评论
applications of secure electronic voting to automated privacy-preserving troubleshooting  05
Applications of secure electronic voting to automated privac...
收藏 引用
CCS 2005 - 12th acm conference on Computer and Communications security
作者: Huang, Qiang Jao, David Wang, Helen J. Princeton University United States Microsoft Research
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. this application poses interesting challen... 详细信息
来源: 评论
Controlling FD and MVD inferences in MLS
Controlling FD and MVD inferences in MLS
收藏 引用
5th International conference on Computer and Information Technology
作者: Yan, HP Liu, B Yang, XM Wang, W Shi, B Yang, GX Fudan Univ Dept Comp & Informat Technol Shanghai 200433 Peoples R China
In today information society, privacy protection has become a very important concern. In this paper we research the inference problems due to functional dependencies (FD) and multi-valued dependencies (MVD) in multile... 详细信息
来源: 评论
Practical application of biometrics for security, privacy and convenience within the UK education environment
Practical application of biometrics for security, privacy an...
收藏 引用
5th European conference on e-Government, ECEG 2005
作者: Fhloinn, Aine Ni Inhouse Training Dublin 6 Ireland
this paper reports on identification needs within a UK secondary school environment. the motivation behind the final biometric enabled system choice is discussed and a system design is presented. How the system will o... 详细信息
来源: 评论
Generation of synthetic data sets for evaluating the accuracy of knowledge discovery systems
Generation of synthetic data sets for evaluating the accurac...
收藏 引用
KDD-2005: 11th acm SIGKDD International conference on Knowledge Discovery and data Mining
作者: Jeske, Daniel R. Samadi, Behrokh Lin, Pengyue J. Ye, Lan Cox, Sean Xiao, Rui Younglove, Ted Ly, Minh Holt, Douglas Rich, Ryan University of California Department of Statistics Riverside CA 92521 Lucent Technologies Bell Laboratories Holmdel NJ 07733 University of California Riverside CA
Information Discovery and Analysis Systems (IDAS) are designed to correlate multiple sources of data and use data mining techniques to identify potential significant events. application domains for IDAS are numerous a... 详细信息
来源: 评论