咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1471-1480 订阅
排序:
data hiding capacity analysis for real images based on stochastic non-stationary geometrical models
Data hiding capacity analysis for real images based on stoch...
收藏 引用
5th conference on security and Watermarking of Multimedia Contents
作者: Voloshynovskiy, S Koval, O Deguillaume, F Pun, T Univ Geneva CUI CH-1211 Geneva 4 Switzerland
In this paper we consider the problem of capacity analysis in the framework of information-theoretic model of data hiding. Capacity is determined by the stochastic model of the host image, by the distortion constraint... 详细信息
来源: 评论
Area optimized architecture and VLSI implementation of RC5 encryption algorithm
Area optimized architecture and VLSI implementation of RC5 e...
收藏 引用
IEEE International conference on Electronics, Circuits and Systems (ICECS)
作者: N. Sklavos C. Machas O. Koufopavlou Electrical and Computer Engineering Department University of Patras Patras Greece
the rapid growth of the amount of transmitted data over wireless networks has triggered special needs for security. Today, wireless communications protocols have dedicated layers to ensure security in the transmission... 详细信息
来源: 评论
Secured video conferencing desktop client for telemedicine
Secured video conferencing desktop client for telemedicine
收藏 引用
International conference on e-health Networking, applications and Services (HealthCom)
作者: B. Tulu Samir Chatterjee Tarun Abhichandani H. Li Network Convergence Laboratory School of Information Science Claremont Graduate University Claremont CA USA
As a result of growing interest in telemedicine during the last decade, we have seen the development and deployment of several video conferencing telemedicine applications during recent years. Deployment of these appl... 详细信息
来源: 评论
5th International Andrei Ershov Memorial conference, PSI 2003
收藏 引用
5th International Andrei Ershov Memorial conference on Perspectives of System Informatics, PSI 2003
the proceedings contain 55 papers. the special focus in this conference is on Programming Issues and Software Engineering. the topics include: A grand challenge for computing research;linear types for cashflow reengin...
来源: 评论
A provably secure additive and multiplicative privacy homomorphism  5th
收藏 引用
5th International Information security conference (ISC)
作者: Domingo-Ferrer, J Univ Rovira & Virgili Dept Comp Engn & Maths E-43007 Tarragona Spain
privacy homomorphisms (PHs) are encryption transformations mapping a set of operations on cleartext to another set of operations on ciphertext. If addition is one of the ciphertext operations, then it has been shown t... 详细信息
来源: 评论
An anonymous loan system based on group signature scheme  5th
收藏 引用
5th International Information security conference (ISC)
作者: Shigetomi, R Otsuka, A Ogawa, T Imai, H Tsuda Coll Grad Sch Math & Comp Sci Tokyo 1878577 Japan Univ Tokyo Inst Ind Sci Meguro Ku Tokyo 1538505 Japan
Recently, paper based transactions are being replaced by digitized transactions in a rapid pace. these kinds of digitized data are useful compared to paper based data in the sense of the flexibility of the data. Loan ... 详细信息
来源: 评论
Role-based access control for E-commerce sea-of-data applications  5th
收藏 引用
5th International Information security conference (ISC)
作者: Navarro, G Robles, S Borrell, J Univ Autonoma Barcelona Dept Comp Sci Bellaterra 08193 Spain
Sea-of-data (SoD) applications (those that need to process huge quantities of distributed data) present specific restrictions, which make mobile agent systems one of the most feasible technologies to implement them. O... 详细信息
来源: 评论
Oblivious counter and majority protocol  5th
收藏 引用
5th International Information security conference (ISC)
作者: Kikuchi, H Tokai Univ Dept Informat Media Technol Hiratsuka Kanagawa 2591292 Japan
the paper presents a new protocol for counting 1-bit secrets without revealing if the bit is 1 or 0 in publicly verifiable way. Other than the conventional multi-party protocols that involve enormous number of rounds ... 详细信息
来源: 评论
5th International conference on Information security, ISC 2002
收藏 引用
5th International conference on Information security, ISC 2002
the proceedings contain 38 papers. the special focus in this conference is on Intrusion Detection, Tamper Resistance, Cryptographic Algorithm, Attack Implementation and Trust Management. the topics include: Real-time ...
来源: 评论
A protected division algorithm  5
A protected division algorithm
收藏 引用
5th Smart Card Research and Advanced application conference
作者: Joye, M Villegas, K Gemplus Card International Card Security Group France
Side-channel analysis is a powerful tool for retrieving secrets embedded in cryptographic devices such as smart cards. Although several practical solutions have been proposed to prevent the leakage of sensitive data, ... 详细信息
来源: 评论