咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1491-1500 订阅
排序:
5th European Workshop on the theory and application of Cryptographic Techniques, EUROCRYPT 1987
5th European Workshop on the Theory and Application of Crypt...
收藏 引用
5th European Workshop on the theory and application of Cryptographic Techniques, EUROCRYPT 1987
the proceedings contain 27 papers. the special focus in this conference is on theory and application of Cryptographic Techniques. the topics include: On privacy homomorphisms;an Improved Protocol for Demonstrating Pos...
来源: 评论
proceedings OF thE INTERNATIONAL conference ON COMPUTER COMMUNICATION, 5th, COMPUTER COMMUNICATIONS: INCREASING BENEFITS FOR SOCIETY, 1980.
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER COMM...
收藏 引用
Proc of the Int Conf on Comput Commun 5th, Comput Commun, Increasing Benefits for Soc
this conference proceedings contains 129 papers. Various aspects of computer communications are presented: computer networks, communication methods, computers, office message systems, public networks, satellite commun... 详细信息
来源: 评论
proceedings OF thE INTERNATIONAL conference ON COMPUTER COMMUNICATION, 5th, COMPUTER COMMUNICATIONS: INCREASING BENEFITS FOR SOCIETY, 1980.
Advances in Hydrogen Energy
收藏 引用
Advances in Hydrogen Energy 1980年
this conference proceedings contains 129 papers. Various aspects of computer communications are presented: computer networks, communication methods, computers, office message systems, public networks, satellite commun... 详细信息
来源: 评论
application of computer techniques to offshore operations in compliance with OCS Orders 5, 8 and 9  5
Application of computer techniques to offshore operations in...
收藏 引用
5th Annual Offshore Technology conference, OTC 1973
作者: Ruppel, James H. Cole, W.I. Exxon Co. United States
the design, installation, and maintenance of subsurface and surface safety systems for offshore production platforms require a comprehensive record-keeping program. OCS Orders issued by the U. S. Geological Survey for... 详细信息
来源: 评论
Experiences with a data set security system in a university environment  77
Experiences with a data set security system in a university ...
收藏 引用
5th Annual acm SIGUCCS conference on User Services, SIGUCCS 1977
作者: Springer, Gordon K. University of Missouri Math Sciences Building ColumbiaMO65201 United States
Recently a vast amount of publicity and concern has been given to the problems associated with security and privacy in computer systems. there has been legislation proposed and passed which attempts to provide safegua... 详细信息
来源: 评论
An overview of privacy and security requirements for data bases  15
An overview of privacy and security requirements for data ba...
收藏 引用
15th Annual Southeastern Regional acm conference, acm-SE 1977
作者: Dowell, J. Richard Price Waterhouse and Co. United States
Popular definitions of privacy and security have often been given as: privacy-the rights of individuals regarding the collection, storage, use and dissemination of personal information pertaining to them. security-the... 详细信息
来源: 评论
Lightweight Cryptography for security and privacy  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: Andrey Bogdanov
this book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for security and privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.
来源: 评论
Blockchain and Trustworthy Systems  1
收藏 引用
丛书名: Communications in Computer and Information Science
1000年
作者: Jiachi Chen Bin Wen Ting Chen
the two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China d... 详细信息
来源: 评论
security and privacy in Communication Networks  1
收藏 引用
丛书名: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
1000年
作者: Xiaodong Lin Ali Ghorbani Kui Ren Sencun Zhu Aiqing Zhang
this book constitutes the refereed proceedings of two workshops held at the 13th International conference on security and privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in Octo... 详细信息
来源: 评论
Financial Technology  1
Financial Technology
收藏 引用
丛书名: Communications in Computer and Information Science
1000年
作者: Ke-Wei Huang Qi Cao Ruidan Su
this book constitutes the proceedings of th5th International conference on Financial Technology, ICFT 2024, held in Singapore during September 23–25, 2024.the 17 full papers presented in this volume were ... 详细信息
来源: 评论