咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是11-20 订阅
排序:
CCSM: Building Cross-Cluster security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters  24
CCSM: Building Cross-Cluster Security Models for Edge-Core E...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: GholipourChoubeh, Mahmood Kermabon-Bobinnec, Hugo Majumdar, Suryadipta Jarraya, Yosr Wang, Lingyu Nour, Boubakr Pourzandi, Makan Concordia Univ Montreal PQ Canada Ericsson Secur Res Montreal PQ Canada
With the emergence of 5G networks and their large scale applications such as IoT and autonomous vehicles, telecom operators are increasingly offloading the computation closer to customers (i.e., on the edge). Such edg... 详细信息
来源: 评论
Efficient privacy-Preserving Approximation of the Kidney Exchange Problem  19
Efficient Privacy-Preserving Approximation of the Kidney Exc...
收藏 引用
19th acm Asia conference on Computer and Communications security (acm AsiaCCS)
作者: Breuer, Malte Meyer, Ulrike Wetzel, Susanne Rhein Westfal TH Aachen Aachen Germany Stevens Inst Technol Hoboken NJ 07030 USA
the kidney exchange problem (KEP) seeks to find possible exchanges among pairs of patients and their incompatible kidney donors while meeting specific optimization criteria such as maximizing the overall number of pos... 详细信息
来源: 评论
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores  24
Examining Cryptography and Randomness Failures in Open-Sourc...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: English, K. Virgil Bennett, Nathaniel thorn, Seaver Butler, Kevin R. B. Enck, William Traynor, Patrick North Carolina State Univ Raleigh NC 27695 USA Univ Florida Gainesville FL USA
Industry is increasingly adopting private 5G networks to securely manage their wireless devices in retail, manufacturing, natural resources, and healthcare. As with most technology sectors, open-source software is wel... 详细信息
来源: 评论
privacy Preserving Biometric Authentication for Fingerprints and Beyond  24
Privacy Preserving Biometric Authentication for Fingerprints...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Blanton, Marina Murphy, Dennis Univ Buffalo Buffalo NY 14260 USA
Biometric authentication eliminates the need for users to remember secrets and serves as a convenient mechanism for user authentication. Traditional implementations of biometric-based authentication store sensitive us... 详细信息
来源: 评论
Exploiting Update Leakage in Searchable Symmetric Encryption  24
Exploiting Update Leakage in Searchable Symmetric Encryption
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Haltiwanger, Jacob Hoang, thang Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA
Dynamic Searchable Symmetric Encryption (DSSE) provides efficient techniques for securely searching and updating an encrypted database. However, efficient DSSE schemes leak some sensitive information to the server. Re... 详细信息
来源: 评论
Comprehensive Review for Big data-Based Sensitive Information Secure Sharing Using Blockchain Techniques  5
Comprehensive Review for Big Data-Based Sensitive Informatio...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Murukanantham, K. Uma Nandhini, D. Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India
Big data (BD) has attracted much attention from science and industry. Recent developments in BD have raised significant security issues and increased the risk of BD data privacy breaches. the novel reviews recent rese... 详细信息
来源: 评论
Communicate Less, Learn More: A Locally Differential Private Approach for Counting Triangles with Better Accuracy  24
Communicate Less, Learn More: A Locally Differential Private...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Saladi, Sasi Bhushan V. Sristy, Nagesh Bhattu Natl Inst Technol Comp Sci & Engn Tadepalligudem Andhra Pradesh India
Local differential privacy (LDP) offers strong privacy guarantees, but with reduced accuracy due to noise addition. More often than not, the accuracy of the statistical computations is improved at the cost of high com... 详细信息
来源: 评论
WikiPhish: A Diverse Wikipedia-Based dataset for Phishing Website Detection  24
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing We...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Loiseau, Gabriel Lefils, Valentin Meyer, Maxime Riquet, Damien Hornet Secur Hem France
Phishing remains a pervasive security threat, necessitating effective and universally comparable detection systems. the use of supervised machine learning models for phishing detection has been generalized in the lite... 详细信息
来源: 评论
Stop Stealing My data: Sanitizing Stego Channels in 3D Printing Design Files  24
Stop Stealing My Data: Sanitizing Stego Channels in 3D Print...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Dolgavin, Aleksandr Yampolskiy, Mark Yung, Moti Auburn Univ Auburn AL 36849 USA Google LLC Mountain View CA USA Columbia Univ New York NY USA
the increased adoption of additive manufacturing (AM) and the acceptance of AM outsourcing created an ecosystem in which the sending and receiving of digital designs by different actors became normal. It has recently ... 详细信息
来源: 评论
the Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits  24
The Avg-Act Swap and Plaintext Overflow Detection in Fully H...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Nam, Ihyun Stanford Univ Stanford CA 94305 USA
Fully homomorphic encryption is a cryptographic scheme that enables any function to be computed on encrypted data. Although homomorphic evaluation on deep circuits has many real-life applications, fully homomorphic en... 详细信息
来源: 评论