咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1451-1460 订阅
排序:
A novel security protocol enhancement on distributed multicasting for video on demand
A novel security protocol enhancement on distributed multica...
收藏 引用
5th International Network conference, INC 2005
作者: Fouliras, P.E. Katos, V.A. Department of Applied Informatics University of Macedonia Thessaloniki Greece Department of Computer Science University of Portsmouth Portsmouth United Kingdom
In this paper, we propose a new security protocol enhancement for LEMP, which is a novel application-layer protocol, specifically designed for data streaming applications with large client sets, offering distributed m... 详细信息
来源: 评论
Performance analysis of WonGoo system
Performance analysis of WonGoo system
收藏 引用
5th International conference on Computer and Information Technology
作者: Lu, TB Fang, BX Sun, YZ Cheng, XQ Chinese Acad Sci Software Div Comp Technol Inst Beijing 100080 Peoples R China
privacy and anonymity on the Internet are gaining increasing attention from both the scientific and the large Internet user community. WonGoo is a peer-to-peer scalable anonymous communication system that provides str... 详细信息
来源: 评论
privacy-preserving frequent pattern mining across private databases
Privacy-preserving frequent pattern mining across private da...
收藏 引用
5th IEEE International conference on data Mining, ICDM 2005
作者: Fu, Ada Wai-Chee Wong, Raymond Chi-Wing Wang, Ke Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Department of Computer Science Simon Fraser University Canada
privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining techniques are applied to a large collect... 详细信息
来源: 评论
E-literacy in Pacific Asia
E-literacy in Pacific Asia
收藏 引用
5th International conference on Electronic Business, ICEB 2005
作者: Lim, Nena Ferguson, Colin Department of Accounting and Business Information Systems University of Melbourne Melbourne VIC 3010 Australia
Hesitant about Internet security has been a major obstacle to consumers' acceptance of electronic commerce. the objective of this paper is to assess how consumers in Pacific Asia perceive Internet security and how... 详细信息
来源: 评论
Effective and efficient distributed model-based clustering
Effective and efficient distributed model-based clustering
收藏 引用
5th IEEE International conference on data Mining
作者: Kriegel, HP Kröger, P Pryakhin, A Schubert, M Univ Munich Inst Comp Sci Munich Germany
In many companies data is distributed among several sites, i.e. each site generates its own data and manages its own data repository. Analyzing and mining these distributed sources requires distributed data mining tec... 详细信息
来源: 评论
Deployment-based security for grid applications
收藏 引用
5th International conference on Computational Science (ICCS 2005)
作者: Attali, I Caromel, D Contes, A Univ Nice Sophia Antipolis INRIA Sophia Antipolis CNRS F-06902 Sophia Antipolis France
Increasing complexity of distributed applications and commodity of resources through grids are making harder the task of deploying those applications. there is a clear need for a versatile deployment of distributed ap... 详细信息
来源: 评论
Information security guidelines for healthcare institutions
Information security guidelines for healthcare institutions
收藏 引用
5th International conference on Electronic Business, ICEB 2005
作者: Chen, Chao-Ming Institute of Healthcare Information Management National Chung Cheng University Taiwan 168 University Rd. Min-Hsiung Chia-Yi Taiwan
In recent years, the form of medical records already slowly changed from paper form to electronic form. the new information science and technology makes the transmission of information easier and convenient. On the ot... 详细信息
来源: 评论
privacy and security in library RFID issues, practices, and architectures
Privacy and security in library RFID issues, practices, and ...
收藏 引用
proceedings of the 11th acm conference on Computer and Communications security, CCS 2004
作者: Molnar, David Wagner, David
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID;... 详细信息
来源: 评论
Chips in banknotes for a banknote electronic signature
Chips in banknotes for a banknote electronic signature
收藏 引用
5th conference on Optical security and Counterfeit Deterrence Techniques
作者: Perron, M Grimal, JM Beauchet, F Dell'Ova, F Banque France Banknote Mfg Div F-63407 Chamalieres France
A lot of information can be found in the media about the possibility of using micro-chips in banknotes. this mostly comes from chip manufacturers whose technology is becoming mature for thisapplication. A lot of paten... 详细信息
来源: 评论
5th International conference on Practical Aspects of Knowledge Management, PAKM 2004
收藏 引用
5th International conference on Practical Aspects of Knowledge Management, PAKM 2004
the proceedings contain 48 papers. the special focus in this conference is on Practical Aspects of Knowledge Management. the topics include: Integrating knowledge conversions and business process modeling;a JXTA-based...
来源: 评论