咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是381-390 订阅
排序:
Blockchain-based Authenticated Stego-Channels: A security Framework and Construction  5
Blockchain-based Authenticated Stego-Channels: A Security Fr...
收藏 引用
5th IEEE International conference on Blockchain (Blockchain)
作者: Kanth, Vikram Hale, Britta Naval Postgrad Sch Dept Elect & Comp Engn Monterey CA 93943 USA Naval Postgrad Sch Dept Comp Sci Monterey CA USA
While blockchain has been an innovative and disruptive technology across many different domains, one area in which is has proven to be particularly game changing is in steganography. Steganography offers data privacy ... 详细信息
来源: 评论
Resilience and security on Enterprise Networks: A Multi-Sector Study  5
Resilience and Security on Enterprise Networks: A Multi-Sect...
收藏 引用
5th International conference on Information Technology for Education and Development, ITED 2022
作者: Irughe, Donatus Uwadiae Nwankwo, Wilson Nwankwo, Chukwuemeka Pascal Uwadia, Francis Ignatius Ajuru University of Education Department of Computer Science Port Harcourt Nigeria Edo State University Department of Computer Science Uzairue Nigeria Delta State University of Science Technology Department of Cyber Security Ozoro Nigeria
the rate of cyber-attacks on enterprise network is increasing daily, accounting for losses in billions of dollars yearly. Professor Soren Morgan once asserted that if it were measured as a country, then the damages fr... 详细信息
来源: 评论
Quantum Obfuscation: Quantum Predicates with Entangled qubits  21
Quantum Obfuscation: Quantum Predicates with Entangled qubit...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Balachandran, Vivek Singapore Inst Technol Singapore Singapore
In this paper we discuss developing opaque predicates with the help of quantum entangled qubits. these opaque predicates obfuscate classical control flow in hybrid quantum-classical systems. the idea is to use a pair ... 详细信息
来源: 评论
Decentralized Reputation  21
Decentralized Reputation
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Dimitriou, Tassos Kuwait Univ Comp Engn Dept Kuwait Kuwait
In this work we develop a privacy-preserving reputation scheme for collaborative systems such as P2P networks in which peers can represent themselves with different pseudonyms when interacting with others. All these p... 详细信息
来源: 评论
A data security Control Method for Belt and Road Language Resource Libraries Based on Role-Based Access Control and Isolation Forest  24
A Data Security Control Method for Belt and Road Language Re...
收藏 引用
proceedings of the 2024 5th International conference on Big data Economy and Information Management
作者: Muchao Chen Yanjun Zhang Ping Zhang Guangdong Communication Polytechnic Guangzhou Guangdong China Jinan University Guangzhou Guangdong China
this paper addresses the issues of language resources and their data security challenges under the Belt and Road Initiative. By analyzing the current state of language resource development and the associated security ... 详细信息
来源: 评论
AI Crypto and security Workshop, AI-CryptoSec 2022, theory and application of Blockchain and NFT Workshop, TA-BC-NFT 2022, and Mathematical Science of Quantum Safety and its application Workshop, MathSci-Qsafe 2022 held in conjunction with 4th International conference on Science of Cyber security Workshops, SciSec 2022
AI Crypto and Security Workshop, AI-CryptoSec 2022, Theory a...
收藏 引用
AI Crypto and security Workshop, AI-CryptoSec 2022, theory and application of Blockchain and NFT Workshop, TA-BC-NFT 2022, and Mathematical Science of Quantum Safety and its application Workshop, MathSci-Qsafe 2022 held in conjunction with 4th International conference on Science of Cyber security Workshops, SciSec 2022
the proceedings contain 15 papers. the special focus in this conference is on AI Crypto and security. the topics include: Economic Perspective of Cybersecurity: Principles and Strategies;preface;image data Recoverabil...
来源: 评论
Secure Parallel Computation on Privately Partitioned data and applications  22
Secure Parallel Computation on Privately Partitioned Data an...
收藏 引用
28th acm SIGSAC conference on Computer and Communications security (CCS)
作者: Attrapadung, Nuttapong Morita, Hiraku Ohara, Kazuma Schuldt, Jacob C. N. Teruya, Tadanori Tozawa, Kazunari AIST Tokyo Japan Univ St Gallen St Gallen Switzerland Univ Tokyo Tokyo Japan
Parallel computation is an important aspect of multi-party computation, not only in terms of improving efficiency, but also in terms of providing privacy for computation involving conditional branching based on privat... 详细信息
来源: 评论
A Distributed data Fabric Architecture based on Metadate Knowledge Graph  5
A Distributed Data Fabric Architecture based on Metadate Kno...
收藏 引用
5th International conference on data Science and Information Technology, DSIT 2022
作者: Li, Xinchi Yang, Mingchuan Xia, Xiaoqing Zhang, Kaicheng Liu, Kang China Telecom Corporation Limited Research Institute Beijing China
Just like talent, capital and land, data is becoming one of the market-oriented elements and driving profound intelligent changes in traditional industries. data governance is a key process to improve the availability... 详细信息
来源: 评论
A Comparative Study of Access Control Models for Ubiquitous Computing Systems  5
A Comparative Study of Access Control Models for Ubiquitous ...
收藏 引用
5th International conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Renuse, Sayali Mahalle, Parikshit N. Shinde, Gitanjali Rahul Sable, Nilesh P. Department of Computer Engineering Vishwakarma Institute of Information Technology Maharashtra Pune India Department of Artificial intelligence and Data science Vishwakarma Institute of Information Technology Maharashtra Pune India Bansilal Ramnath Agarwal Charitable Trust's Vishwakarma Institute of Information Technology Maharashtra Pune India
the Internet of things (IoT) and Machine-to-Machine (M2M) communication have connected devices, enabling major advances in various fields. the priority now is secure and efficient management of these interconnected sy... 详细信息
来源: 评论
three-Dimensional data security Architecture of Agricultural Supply Chain Driven by Blockchain  5
Three-Dimensional Data Security Architecture of Agricultural...
收藏 引用
5th International conference on High Performance Big data and Intelligent Systems, HDIS 2023
作者: Chen, Xiao Zhang, Guofeng Zhao, Chuan Wang, Bingbing Feng, Bin Wang, Peng Li, Qiuling Li, Songhe Shen, Cong School of Economics and Management Taishan University Taian China School of Information Science and Technology Taishan University Taian China School of Information Science and Engineering Shandong Provincial Key Laboratory of Network-based Intelligent Computing University of Jinan Jinan China School of Information Science and Engineering University of Jinan Jinan China College of Physics and Electronic Engineering Taishan University Taian China
Agricultural supply chain systems mainly focus on technological applications, but do not pay enough attention to the privacy protection and data security guarantee of the entire supply chain entities. they face practi... 详细信息
来源: 评论