咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是201-210 订阅
排序:
Blockchain-Based WeChat Small Program Platform: A New Type of data security and Management Solution  5th
Blockchain-Based WeChat Small Program Platform: A New Type o...
收藏 引用
5th International conference on Big data and security (ICBDS)
作者: Yin, Zetong Zhang, Yeyang Fan, Dajuan Li, Yifan Dou, Yuxin Wang, Yikun Xu, Wanni Shi, Yanfeng Univ Oulu Oulu 90014 Finland Nanjing Inst Technol Sch Comp Engn Nanjing 211167 Peoples R China Hohai Univ Sch Internet Things Engn Changzhou 213022 Jiangsu Peoples R China
With the rapid progress of science and technology, WeChat small program has become an indispensable part of users' daily life, providing a variety of convenient online services. Blockchain technology has received ... 详细信息
来源: 评论
data privacy Protection Method of Smart IOT Platform Based on Differential privacy  5
Data Privacy Protection Method of Smart IOT Platform Based o...
收藏 引用
5th International conference on Information Technologies and Electrical Engineering, ICITEE 2022
作者: Zhu, Wenjun Li, Yan Wang, Wensheng Zhu, Jinhong Wei, Yue Beijing China-power Information Technology Co.ltd. China
In recent years, with 5G and other key technology breakthroughs, IoT technology is accelerating penetration into various industries, and the era of Internet of Everything is coming. However, while the industry is prom... 详细信息
来源: 评论
5G and IoT Cloud Integration for Enhancing Connectivity and data Management  5
5G and IoT Cloud Integration for Enhancing Connectivity and ...
收藏 引用
5th International conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Paladugu, Abhigna Manikanta Merugu, Raja Vikram Gangavarapu, Sai Gopal Krishna Meka, Leela Vamsi Krishna Kavitha, S. Kavitha, M. Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Greenfields Vaddeswaram Guntur Guntur522302 India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh Guntur522302 India
this research analyzed the result of super-fast 5G networks on the IoT and explores how the cloud can enhance the performance and execution of smart devices in conjunction with 5G. the arrival of 5G, akin to a next-le... 详细信息
来源: 评论
Enhanced database Encryption System  5
Enhanced Database Encryption System
收藏 引用
5th IEEE International conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Kumar, Piyush Hanif, Laraib Srinivas, L.N.B. Srm Institute of Science and Technology College of Engineering and Technology Department of Networking and Communications Kattankulatur India
this study, in particular, highlights the critical nature of Impacts of the Enhanced database Encryption. System within contemporary enterprises. It places significant focus on critical goals, such as data consolidati... 详细信息
来源: 评论
privacy-Preserving Maximum Matching on General Graphs and its application to Enable privacy-Preserving Kidney Exchange  22
Privacy-Preserving Maximum Matching on General Graphs and it...
收藏 引用
acm conference on data and application security and privacy (CODASPY)
作者: Breuer, Malte Meyer, Ulrike Wetzel, Susanne Rhein Westfal TH Aachen Aachen Germany Stevens Inst Technol Hoboken NJ 07030 USA
To this day, there are still some countries where the exchange of kidneys between multiple incompatible patient-donor pairs is restricted by law. Typically, legal regulations in this context are put in place to prohib... 详细信息
来源: 评论
proceedings of the 12th International Workshop on Hardware and Architectural Support for security and privacy, HASP 2023
Proceedings of the 12th International Workshop on Hardware a...
收藏 引用
12th International Workshop on Hardware and Architectural Support for security and privacy, HASP 2023, held in conjunction with the 56th International Symposium on Microarchitecture, MICRO 2023
the proceedings contain 11 papers. the topics discussed include: SEIF: augmented symbolic execution for information flow verification;EntryBleed: a universal KASLR bypass against KPTI on Linux;Triton: software-defined...
来源: 评论
SPBVPST : Towards Scalable and Private Blockchain Architectures by Integrating Verifiable Computation, privacy-Preserving Sharding, and Trusted Execution Environments  5
SPBVPST : Towards Scalable and Private Blockchain Architectu...
收藏 引用
5th International conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Dehankar, Jiwan N. Sharma, Virendra Kumar Department of Computer Science & Engineering Bhagwant University Rajasthan Ajmer305004 India
the burgeoning importance of blockchain technology is hampered by significant challenges in scalability and privacy, limiting its broader application and efficacy in today's data-intensive landscapes. this paper a... 详细信息
来源: 评论
Blockchain for Supply Chain data security Sharing Consensus Algorithm Design  5
Blockchain for Supply Chain Data Security Sharing Consensus ...
收藏 引用
5th International conference on Natural Language Processing, ICNLP 2023
作者: Chen, Boyu Liu, Hongjie Yin, Lei Xi'an University of Posts and Telecommunications School of Computer Science Xi'an710121 China Xi'an University of Electronic Science and Technology School of Electro-Mechanical Engineering Xi'an710121 China
the centralized data storage mode adopted by the traditional supply chain management system has some problems, such as single point of failure, data privacy disclosure, opaque internal operation of the system and so o... 详细信息
来源: 评论
Green Internet of things (GIoT) Based Smart security Surveillance Cobot  5
Green Internet of Things (GIoT) Based Smart Security Surveil...
收藏 引用
5th International conference on Inventive Research in Computing applications, ICIRCA 2023
作者: Gochhait, Saikat Paliwal, Manisha Symbiosis Institute of Digital and Telecom Management Pune India Sri Balaji University Pune India
Developing a GIOT-enabled surveillance cobot is the objective of this study. the cobot transmits real-time video footage from a preset environment to a base control station via internet or Wi-Fi. In this methodology, ... 详细信息
来源: 评论
data security Algorithm for Public Decision Support System Based on Blockchain Technology  5
Data Security Algorithm for Public Decision Support System B...
收藏 引用
5th International conference on Industrial IoT, Big data and Supply Chain, IIoTBDSC 2024
作者: Yang, Tao Luo, Xiaoli College of Educational Science of Quanzhou Normal University China Zhujiang College Of South China Agricultural University China
It explores data security algorithms pertinent to public decision-making support systems using blockchain technology in solving core issues of the public decision-making process, such data security, openness, and effi... 详细信息
来源: 评论