咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是701-710 订阅
排序:
FridgeLock: Preventing data theft on Suspended Linux with Usable Memory Encryption  20
FridgeLock: Preventing Data Theft on Suspended Linux with Us...
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Franzen, Fabian Andreas, Manuel Huber, Manuel Tech Univ Munich Munich Germany Fraunhofer AISEC Garching Germany
To secure mobile devices, such as laptops and smartphones, against unauthorized physical data access, employing Full Disk Encryption (FDE) is a popular defense. this technique is effective if the device is always shut... 详细信息
来源: 评论
Big data: An opportunity and Challenge for M commerce  5
Big Data: An opportunity and Challenge for M commerce
收藏 引用
5th International conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC)
作者: Galhotra, Bhavna GGSIP Univ Jagan Inst Management Studies Informat Technol Dept Sect 5 Delhi India
With an evolution of 5G technologies there is a drastic change in the industries and usage of internet. After the pandemic has hit the world there is an emergence of data with the usage of online transactions, online ... 详细信息
来源: 评论
A survey of privacy leakage and security vulnerabilities in the internet of things  5
A survey of privacy leakage and security vulnerabilities in ...
收藏 引用
5th International conference on Communication and Electronics Systems, ICCES 2020
作者: Tyagi, Amit Kumar Goyal, Deepti School of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Chennai Tamilnadu600127 India Department of Computer Science and Engineering Lingaya's Vidyapeeth Faridabad Haryana121002 India
In this world, where everything around use is linked with technology, be it smart homes, smart cities, smart cars, etc. Internet of things (IoT) or Internet Connected things (ICT) are connected todays everywhere, with... 详细信息
来源: 评论
2nd Workshop on Coordination of Decentralized Finance, CoDecFin 2021, 1st Workshop on Decentralized Finance, DeFi 2021, 6th Workshop on Advances in Secure Electronic Voting, VOTING 2021, and 5th Workshop on Trusted Smart Contracts, WTSC 2021, held in conjunction with the 25th International conference on Financial Cryptography and data security, FC 2021
2nd Workshop on Coordination of Decentralized Finance, CoDec...
收藏 引用
2nd Workshop on Coordination of Decentralized Finance, CoDecFin 2021, 1st Workshop on Decentralized Finance, DeFi 2021, 6th Workshop on Advances in Secure Electronic Voting, VOTING 2021, and 5th Workshop on Trusted Smart Contracts, WTSC 2021, held in conjunction with the 25th International conference on Financial Cryptography and data security, FC 2021
the proceedings contain 43 papers. the special focus in this conference is on Coordination of Decentralized Finance. the topics include: On Stablecoin Price Processes and Arbitrage;red-Black Coins: Dai Without Liquida...
来源: 评论
PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model  20
PREDICT: Efficient Private Disease Susceptibility Testing in...
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Ugwuoke, Chibuike Erkin, Zekeriya Reinders, Marcel Lagendijk, Reginald L. Delft Univ Technol Delft Netherlands
Genome sequencing has rapidly advanced in the last decade, making it easier for anyone to obtain digital genomes at low costs from companies such as Helix, MyHeritage, and 23andMe. Companies now offer their services i... 详细信息
来源: 评论
the Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID Cards and Push Notifications  20
The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authe...
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Pernpruner, Marco Carbone, Roberto Ranise, Silvio Sciarretta, Giada Fdn Bruno Kessler Secur & Trust Res Unit Trento Italy
Everyday life is permeated by new technologies allowing people to perform almost any kind of operation from their smart devices. Although this is amazing from a convenience perspective, it may result in several securi... 详细信息
来源: 评论
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting  20
TrafficSliver: Fighting Website Fingerprinting Attacks with ...
收藏 引用
acm SIGSAC conference on Computer and Communications security (acm CCS)
作者: De la Cadena, Wladimir Mitseva, Asya Hiller, Jens Pennekamp, Jan Reuter, Sebastian Filter, Julian Engel, thomas Wehrle, Klaus Panchenko, Andriy Univ Luxembourg Esch Sur Alzette Luxembourg Brandenburg Tech Univ Cottbus Cottbus Germany Rhein Westfal TH Aachen Aachen Germany
Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns of data flows based on the size and direction of packets. By collecting traffic tr... 详细信息
来源: 评论
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network  20
SeCaS: Secure Capability Sharing Framework for IoT Devices i...
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Aktypi, Angeliki Kalkan, Kubra Rasmussen, Kasper B. Univ Oxford Dept Comp Sci Oxford England Ozyegin Univ Dept Comp Sci Istanbul Turkiye
the emergence of the internet of things (IoT) has resulted in the possession of a continuously increasing number of highly heterogeneous connected devices by the same owner. To make full use of the potential of a pers... 详细信息
来源: 评论
Discussion and Practice of Computer Network Information and Network security Protection Strategy  5
Discussion and Practice of Computer Network Information and ...
收藏 引用
5th International conference on Mechanical, Control and Computer Engineering (ICMCCE)
作者: Liu, Li Shandong Xiehe Univ Jinan 250109 Shandong Peoples R China
With the development of science and technology, especially the application of big data technology, the role of computer networks has become more and more significant. Computer network has a profound impact on people&#... 详细信息
来源: 评论
Efficient Mobile User Authentication Service with privacy Preservation and User Untraceability  5
Efficient Mobile User Authentication Service with Privacy Pr...
收藏 引用
5th International conference on Cloud Computing and Artificial Intelligence - Technologies and applications (CloudTech)
作者: Braeken, An Touhafi, Abdellah Vrije Univ Brussel VUB INDI Brussels Belgium
security questions and answers for authentication are a common approach to enable the user to reset forgotten passwords. Moreover, they are also sometimes used as alternative for the classical username-password system... 详细信息
来源: 评论