咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是351-360 订阅
排序:
Don't fool yourself with Forward privacy, Your queries STILL belong to us!  21
Don't fool yourself with Forward Privacy, Your queries STILL...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Salmani, Khosro Barker, Ken Mt Royal Univ Calgary AB Canada Univ Calgary Calgary AB Canada
Dynamic Searchable Symmetric Encryption (DSSE) enables a user to perform encrypted search queries on encrypted data stored on a server. Recently, a notion of Forward privacy (FP) was introduced to guarantee that a new... 详细信息
来源: 评论
application of Blockchain and Internet of things (IoT) for Ensuring privacy and security of Health Records and Medical Services  5
Application of Blockchain and Internet of Things (IoT) for E...
收藏 引用
5th International conference on Contemporary Computing and Informatics, IC3I 2022
作者: Makka, Shanthi Sreenivasulu, K. Rawat, B.S. Saxena, Komal Rajasulochana, S. Shukla, Surendra Kumar Department of Computer Science & Engineering Vardhaman College of Engineering Telangana Hyderabad India Department of Biotechnology KLEF Deemed University Andhra Pradesh Guntur India Uttaranchal University Uttarakhand Dehradun India AIIT Amity University Uttar Pradesh Noida India Department of Information Technology SNS College of Technology Tamil Nadu Coimbatore India Department of Computer Science & Engineering Graphic Era Deemed to be University Uttarakhand Dehradun India
the research's introduction primarily focuses on the advantages of putting in place a data security framework to protect all health information. the medical associations should employ IoT and a wifi system to crea... 详细信息
来源: 评论
privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption  22
Privacy-Preserving Deep Sequential Model with Matrix Homomor...
收藏 引用
17th acm ASIA conference on Computer and Communications security 2022 (acm ASIACCS)
作者: Jang, Jaehee Lee, Younho Kim, Andrey Na, Byunggook Yhee, Donggeon Lee, Byounghan Cheon, Jung Hee Yoon, Sungroh Seoul Natl Univ Dept Elect & Comp Engn Seoul South Korea Seoul Natl Univ Sci & Technol Dept Ind Engn ITM Div Seoul South Korea Samsung Adv Inst Technol Seoul South Korea Seoul Natl Univ Dept Math Sci Seoul South Korea Seoul Natl Univ Sci & Technol Dept Elect & Informat Engn Seoul South Korea Seoul Natl Univ Dept ECE Interdisciplinary Program AI AIIS ASRI & INMC Seoul South Korea
Making deep neural networks available as a service introduces privacy problems, for which homomorphic encryption of both model and user data potentially offers the solution at the highest privacy level. However, the d... 详细信息
来源: 评论
Research on algorithm of finger vein recognition technology for scene demand application  5
Research on algorithm of finger vein recognition technology ...
收藏 引用
2023 5th International conference on Information Science, Electrical, and Automation Engineering, ISEAE 2023
作者: Zhou, Zhou Guo, En Yang, Lintao Zhu, Shengkai Shandong Xiehe University China
With the rapid development of information technology, biometrics has been widely used in various fields of *** them, finger vein recognition technology, as a new technology in the field of biometrics, has been widely ... 详细信息
来源: 评论
Implementation of CBDC System for the Customised Development of Finance Service System  5
Implementation of CBDC System for the Customised Development...
收藏 引用
5th IEEE International conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Mehra, Devansh Vamsi, A. Sri Kavin, Prabhu Srm Institute of Science and Technology School of Computing College of Engineering and Technology Faculty of Engineering and Technology Department of Data Science and Business Systems Chennai India
CBDC-as-a-problem looks like a mania of interest from central banks and financial institutions all over the world. It may describe CBDC technology and CBDC technology development, the positive aspects of CBDC and its ... 详细信息
来源: 评论
the Block Chain Technology to protect data Access using Intelligent Contracts Mechanism security Framework for 5G Networks  5
The Block Chain Technology to protect Data Access using Inte...
收藏 引用
5th International conference on Contemporary Computing and Informatics, IC3I 2022
作者: Yadav, Ranjeet Ritambhara Vaigandla, Karthik Kumar Ghantasala, G S Pradeep Singh, Rajesh Gangodkar, Durgaprasad UT Administration of Dadra and Nagar Electronics and Communication Engineering Government Polytechnic Daman Varkund Nani Daman Haveli & Daman and Diu India Jaipur Engineering College and Research Centre Department of Electronics and Communication Engineering Rajasthan Jaipur India Balaji Institute of Technology and Science Department of Electronics and Communication Engineering Telangana Warangal India Chitkara University Institute of Engineering and Technology Department of Computer Science and Engineering Chitkara University Punjab India Uttaranchal Institute of Technology Uttaranchal University Uttarakhand Dehradun India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India
the introduction of the study primarily emphasises the significance of utilising block chain technologies with the possibility of privacy and security benefits from the 5G Network. One may state that the study's p... 详细信息
来源: 评论
4th International conference on Big data and security, ICBDS 2022
4th International Conference on Big Data and Security, ICBDS...
收藏 引用
4th International conference on Big data and security, ICBDS 2022
the proceedings contain 54 papers. the special focus in this conference is on Big data and security. the topics include: Research on the Evolution of New Energy Industry Financing Ecosystem Under the Background of Big...
来源: 评论
Public Financing through Decentralised application  5
Public Financing Through Decentralised Application
收藏 引用
5th International conference on Inventive Research in Computing applications, ICIRCA 2023
作者: Darshan, Prashant Tripathi, Shivanshu Dixit, Shreyansh Latha, S. Muthu, P. Samiappan, Dhanalakshmi Srm Institute of Science and Technology Department of Electronics & Communication Engineering Tamil Nadu Kattankulathur603203 India Srm Institute of Science and Technology Department of Biomedical Engineering Tamil Nadu Kattankulathur603203 India
Blockchain technology can change how people's data is viewed as all transactions are logged with the timing and hash keys, thus making them irreversible. Smart contracts automate the transactions. thereby, boostin... 详细信息
来源: 评论
Mobile security Edge Computing application Using Blockchain Technology  5
Mobile Security Edge Computing Application Using Blockchain ...
收藏 引用
5th IEEE International conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Sood, Saksham Chitkara University Institute of Engineering and Technology Chitkara University Centre for Interdisciplinary Research in Business and Technology Punjab India
this research explores the synergistic utilization of LiDAR technology with the Robot Operating System (ROS) for transformative applications in both efficient building construction floor measurement and the operation ... 详细信息
来源: 评论
A Chronic Disease Medication data Sharing Model Based on Blockchain  22
A Chronic Disease Medication Data Sharing Model Based on Blo...
收藏 引用
5th International conference on Computer Science and Software Engineering, CSSE 2022
作者: Si, Xiameng Liu, Boyu Zhao, Bobai School of Information Management Beijing Information Science & Technology University Beijing Haidian China
Chronic Disease Medication data (CDMD) includes a great number of valuable patients' information collected from smart pillboxes. CDMD sharing in the Chronic Disease Medication Compliance Management System is helpf... 详细信息
来源: 评论