咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是461-470 订阅
排序:
A Proxy Re-encryption Scheme of Medical data Sharing Based on Consortium Blockchain  1
收藏 引用
5th CCF China Blockchain conference (CBCC)
作者: Li, Juxia Zhang, Xing Chu, Zhiguang Liaoning Univ Technol Jinzhou 121001 Liaoning Peoples R China
In order to solve the problem of sharing medical data among different hospitals, this paper proposes a multi-party secure sharing scheme of medical information based on a consortium blockchain. Based on proxy re-encry... 详细信息
来源: 评论
application of Artificial Neural Network to predict phosphoric acid slurry viscosity  5
Application of Artificial Neural Network to predict phosphor...
收藏 引用
5th International conference on Networking, Information Systems and security, NISS 2022
作者: Bichri, Ahmed Saaidi, Afaf Abderafi, Souad Mohammed v University in Rabat Mohammadia Engineering School Rabat Morocco
At the level of the attack unit of the phosphoric acid production process, the control and monitoring of the dynamic viscosity of phosphoric acid slurry is crucial to understand its rheological behavior. this informat... 详细信息
来源: 评论
application of Block-Chain Algorithm Based on Binary Elliptic Curve Cryptography in Human Resource Big data Encryption Research  24
Application of Block-Chain Algorithm Based on Binary Ellipti...
收藏 引用
proceedings of the 2024 5th International conference on Big data Economy and Information Management
作者: Yuming Sun, Guangdong University of Science and Technology Dongguan, China Zhihui Wang, Guangdong University of Science and Technology Dongguan, China Guangdong University of Science and Technology Dongguan Guangdong China
In order to improve the speed of big data encryption and ensure the security of big data of human resources, the practical application of block-chain algorithm based on binary elliptic curve cryptography in big data e... 详细信息
来源: 评论
Assessing the Alignment of Social Robots with Trustworthy AI Design Guidelines: A Preliminary Research Study  21
Assessing the Alignment of Social Robots with Trustworthy AI...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Chattopadhyay, Ankur Ali, Abdikadar thaxton, Danielle Northern Kentucky Univ Comp Sci Dept Highland Hts KY 41099 USA
the last few years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). this global movement has l... 详细信息
来源: 评论
Smart data Analysis and data Governance  21
Smart Data Analysis and Data Governance
收藏 引用
5th International conference on Computer Science and application Engineering, CSAE 2021
作者: Feng, Yunzhong Feng, Xiaohua Hebei Normal University Shijiazhuang China University of Bedfordshire Bedfordshire United Kingdom
data governance is still an outstanding issue currently, especially in big data cases. there is a planned big event in 2022 at Chongli. A Smart Chongli has up and running. In order to run the event properly, informati... 详细信息
来源: 评论
application of data Hiding Method Based on Triplet Difference in QR Code Images
Application of Data Hiding Method Based on Triplet Differenc...
收藏 引用
Consumer Electronics and Computer Engineering (ICCECE), 2021 IEEE International conference on
作者: Dan He School of Artificial Intelligence Dongguan City University Dongguan Guangdong China
Ensuring the privacy and security of sensitive information is paramount in the digital age. Quick response (QR) codes, known for their high data density and robust error correction capabilities, have become widely use... 详细信息
来源: 评论
the Conflict and Countermeasures of privacy Protection in Criminal Electronic Forensics  5
The Conflict and Countermeasures of Privacy Protection in Cr...
收藏 引用
5th International conference on Trends in Electronics and Informatics, ICOEI 2021
作者: Wu, Yubao Nanjing Forest Police College Department of Information Technology Jiangsu Nanjing210023 China
With the advent and popularization of computers, network technology, digital technology and smart phones since the 20th century. Electronic data plays an increasingly important role in judicial proof activities all ov... 详细信息
来源: 评论
AI in My Life: AI, Ethics & privacy Workshops for 15-16-Year-Olds  21
AI in My Life: AI, Ethics & Privacy Workshops for 15-16-Year...
收藏 引用
13th acm Web Science conference (WebSci)
作者: Bendechache, Malika Tal, Irina Wall, P. J. Grehan, Laura Clarke, Emma O'Driscoll, Aidan Van der Haegen, Laurence Leong, Brenda Kearns, Anne Brennan, Rob Dublin City Univ ADAPT Lero Ctr Dublin Ireland Dublin City Univ Lero Ctr Dublin Ireland Dublin City Univ DCU Access Dublin Ireland Future Privacy Forum Washington DC USA
AI in My Life' project will engage 500 Dublin teenagers from disadvantaged backgrounds in a 15-week (20-hour) co-created, interactive workshop series encouraging them to reflect on their experiences in a world sha... 详细信息
来源: 评论
Secured data Movement Using data Ring Fencing
Secured Data Movement Using Data Ring Fencing
收藏 引用
IEEE International conference on Trust, privacy and security in Intelligent Systems and applications (TPS-ISA)
作者: Aditya Nangia Saksham Bhupal Mukesh Mohania Chinmay Kundu IIIT Delhi India KIIT University Bhubaneswar India
the exponential increase in data volume, the growing pervasiveness of digital technologies, and frequent data breaches have given rise to a broad range of privacy concerns. these concerns stem from the fact that data ...
来源: 评论
SoK: privacy-Enhancing Technologies in Finance  5
SoK: Privacy-Enhancing Technologies in Finance
收藏 引用
5th conference on Advances in Financial Technologies, AFT 2023
作者: Baum, Carsten Chiang, James Hsin-Yu David, Bernardo Frederiksen, Tore Kasper Technical University of Denmark Lyngby Denmark Aarhus University Denmark IT University of Copenhagen Denmark Zama Paris France
Recent years have seen the emergence of practical advanced cryptographic tools that not only protect data privacy and authenticity, but also allow for jointly processing data from different institutions without sacrif... 详细信息
来源: 评论