咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是741-750 订阅
排序:
Implementation for new approach for privacy-preserving over encrypted cloud data  5
Implementation for new approach for privacy-preserving over ...
收藏 引用
5th International conference on Communication and Electronics Systems, ICCES 2020
作者: Nigwal, Roshni Osari, Ranjeet Sharma, Pratyush India
As the human society is living in an incredibly organized condition, where tremendous measures of information are put away in remote, yet not of need confided in servers. there are many security issues worried to get ... 详细信息
来源: 评论
privacy-preserving Metrics for an mHealth App in the Context of Neuropsychological Studies  13
Privacy-preserving Metrics for an mHealth App in the Context...
收藏 引用
13th International Joint conference on Biomedical Engineering Systems and Technologies
作者: Gabel, Alexander Ertas, Funda Pleger, Michael Schiering, Ina Mueller, Sandra Verena Ostfalia Univ Appl Sci Fac Comp Sci Salzdahlumerstr 46-48 Wolfenbuttel Germany Ostfalia Univ Appl Sci Fac Social Work Salzdahlumerstr 46-48 Wolfenbuttel Germany
the potential of smart devices as smartphones, smart watches and wearables in healthcare and rehabilitation, so-called mHealth applications, is considerable. It is especially interesting, that these devices accompany ... 详细信息
来源: 评论
Research and application of SM9 in the Ubiquitous Electric IoT  5
Research and Application of SM9 in the Ubiquitous Electric I...
收藏 引用
IEEE 5th Information Technology and Mechatronics Engineering conference (ITOEC)
作者: Liao, Huimin Wang, Dong Wang, Junsheng Li, lili Wang, Huinan State Grid Elect Commerce Co Ltd Beijing 100053 Peoples R China State Grid Xiongan Financial Technol Grp Co Ltd Beijing 100053 Peoples R China State Grid Blockchain Technol Beijing Co Ltd Beijing 100053 Peoples R China State Grid Shanxi Elect Power Co Taiyuan 030002 Peoples R China
With the continuous advancement of the reform of the power system, relying on new technologies such as big data, cloud computing, artificial intelligence, the IoT, and blockchain, the construction of the ubiquitous el... 详细信息
来源: 评论
data security in Cloud Environment Using Light Weight Secret Key  5
Data Security in Cloud Environment Using Light Weight Secret...
收藏 引用
5th IEEE International conference on Computing Communication and Automation, ICCCA 2020
作者: Choudhary, Sandeep Singh, Nanhay Ambedkar Institute of Advanced Communication Technologies and Research Dept. of Computer Science and Engg. Delhi India
RSA is one of the popular technique used by cloud service provider to guarantee the security and privacy of user data. In this technique, large prime factors are required to generate public key and private key before ... 详细信息
来源: 评论
A Study on privacy Issues in Internet of things (IoT)
A Study on Privacy Issues in Internet of Things (IoT)
收藏 引用
Cryptography, security and privacy (CSP), IEEE International conference on
作者: Naqliyah Zainuddin Maslina Daud Sabariah Ahmad Mayasarah Maslizan Syafiqa Anneisa Leng Abdullah Info. Security Mgmt CyberSecurity Malaysia Cyberjaya Malaysia Cyber Security Proactive CyberSecurity Malaysia Cyberjaya Malaysia
Internet of things (IoT) is an interconnected wireless network where smart nodes (IoT devices) interact with each other in order to exchange data through the communicating medium. loT have rapidly increased in popular... 详细信息
来源: 评论
application of data Augmentation in Lane Line Detection
Application of Data Augmentation in Lane Line Detection
收藏 引用
5th International conference on Computing, Communication and security (ICCCS)
作者: Liu, Qian Wu, Xiaoyu Qiao, Dan Commun Univ China Inst Informat & Commun Beijing Peoples R China
With the continuous development of deep learning technology and the deepening of neural network research, more and more traditional problems have begun to seek new solutions by constructing deep neural networks, and b... 详细信息
来源: 评论
Can AI be for Good in the Midst of Cyber Attacks and privacy Violations?: A Position Paper  10
Can AI be for Good in the Midst of Cyber Attacks and Privacy...
收藏 引用
10th acm conference on data and application security and privacy, CODASPY 2020
作者: thuraisingham, Bhavani M. University of Texas at Dallas Richardson TX United States
Artificial Intelligence (AI) is affecting every aspect of our lives from healthcare to finance to driving to managing the home. Sophisticated machine learning techniques with a focus on deep learning are being applied... 详细信息
来源: 评论
StateConsisIV: A privacy-preserving integrity verification method for cloud components based on a novel state consistency feature  5
StateConsisIV: A privacy-preserving integrity verification m...
收藏 引用
5th IEEE International conference on data Science in Cyberspace, DSC 2020
作者: Fan, Peiru Wang, Chonghua Li, Jun Zhao, Bo Ji, Zhaoxu China Industrial Control Systems Cyber Emergency Response Team Beijing China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering WuHan China
Plain proofs (e.g., raw logs, report, etc.) are significant and effective for integrity verification. In our analysis and comparison of existing work, we found most of them did not employ any protection mechanisms on ... 详细信息
来源: 评论
BRAIN-IoT: Paving the Way for Next-Generation Internet of things  5
BRAIN-IoT: Paving the Way for Next-Generation Internet of Th...
收藏 引用
5th International conference on Internet of things, Big data and security (IoTBDS)
作者: Ferrera, Enrico Tao, Xu Conzon, Davide Pombo, Victor Sonora Cantero, Miquel Ward, Tim Bosi, Ilaria Sandretto, Mirko LINKS Fdn Leading Innovat & Knowledge Soc Turin Italy Improving Metr La Coruna Spain Robotnik Automat SLL Valencia Spain Paremus Ltd Wokingham England
Nowadays, the adoption of the Internet of things is drastically increasing in different domains and is contributing to the fast digitalization of several different critical sectors. In the near future, next generation... 详细信息
来源: 评论
privacy Preserving AKMA in 5G  19
Privacy Preserving AKMA in 5G
收藏 引用
5th acm Workshop on security Standardisation Research Workshop (SSR)
作者: Khan, Mohsin Ginzboorg, Philip Niemi, Valtteri Univ Helsinki Helsinki Finland Helsinki Inst Informat Technol Helsinki Finland Huawei Technol Helsinki Finland Aalto Univ Helsinki Finland
3GPP is currently studying AKMA (Authentication and Key Agreement for applications): a mobile network service intended to support authentication and key management based on 3GPP credentials in 5G system, for third-par... 详细信息
来源: 评论