咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是771-780 订阅
排序:
the application of blockchain technology in the early warning and monitoring of infectious diseases  5
The application of blockchain technology in the early warnin...
收藏 引用
5th International conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)
作者: Tian Yu Yu Wan-jun Zhang Miao Zhang Min Tang Jun-yi Shanghai Inst Technol SIT Shanghai Peoples R China
In order to improve the efficiency of emergency management and decision-making and command of infectious diseases, infectious disease early warning technologies and systems can be used to monitor the trend of abnormal... 详细信息
来源: 评论
34th Annual IFIP WG11.3 conference on data and applications security and privacy, DBSec 2020
34th Annual IFIP WG11.3 Conference on Data and Applications ...
收藏 引用
34th Annual IFIP WG11.3 conference on data and applications security and privacy, DBSec 2020
the proceedings contain 22 papers. the special focus in this conference is on data and applications security and privacy. the topics include: Non-interactive private decision tree evaluation;privacy-preserving anomaly...
来源: 评论
An urban sensing architecture as essential infrastructure for future cities  21
An urban sensing architecture as essential infrastructure fo...
收藏 引用
proceedings of the 14th IEEE/acm International conference on Utility and Cloud Computing Companion
作者: Vijay Kumar George Oikonomou theo Tryfonas University of Bristol
Climate change and migration have become one of the most challenging problems for our civilization. In this context, city councils work hard to manage essential services for citizens such as waste collection, street l... 详细信息
来源: 评论
1st Asian Workshop on Usable security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International conference on Financial Cryptography and data security, FC 2020
1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1s...
收藏 引用
1st Asian Workshop on Usable security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International conference on Financial Cryptography and data security, FC 2020
the proceedings contain 42 papers. the special focus in this conference is on Usable security. the topics include: Securing cryptocurrency exchange: Building up standard from huge failures;user-centered risk communica...
来源: 评论
Designing a serious game: teaching developers to embed privacy into software systems  20
Designing a serious game: teaching developers to embed priva...
收藏 引用
proceedings of the 35th IEEE/acm International conference on Automated Software Engineering
作者: Nalin Asanka Gamagedara Arachchilage Mumtaz Abdul Hameed La Trobe University Australia Technovation Consulting & Training PVT
Software applications continue to challenge user privacy when users interact with them. privacy practices (e.g. data Minimisation (DM), privacy by Design (PbD) or General data Protection Regulation (GDPR)) and related... 详细信息
来源: 评论
A Robust medical data sharing application with a collaborative hypothesis and Elastic net regression model
A Robust medical data sharing application with a collaborati...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: J.N.S.S Janardhana Naidu E.N Ganesh Nagaraj Doddam Reddy Mahesh Sankaran Dept. of CSE Vels Institute of Science Technology and Advanced Studies (VISTAS)ChennaiIndia
Clinical data and records are the main data to help various customized applications like clinical proof, protection, digital data and criminal personality. Different blockchain and conventional methodology have been c... 详细信息
来源: 评论
Addressing privacy and security in Connected Health with Fog Computing  19
Addressing Privacy and Security in Connected Health with Fog...
收藏 引用
5th EAI International conference on Smart Objects and Technologies for Social Good (GOODTECHS)
作者: Dimitrievski, Ace Zdravevski, Eftim Lameski, Petre Trajkovik, Vladimir Ss Cyril & Methodius Univ Fac Comp Sci & Engn Skopje North Macedonia
One of the main pillars of connected health is the application of technology to provide healthcare services remotely. Electronic health records are integrated with remote patient monitoring systems using various senso... 详细信息
来源: 评论
An Analysis of Differential privacy Research in Location data  5
An Analysis of Differential Privacy Research in Location Dat...
收藏 引用
5th IEEE Int Conf on Big data security on Cloud (Bigdatasecurity) / 5th IEEE Int Conf on High Performance and Smart Computing (IEEE HPSC) / 4th IEEE Int Conf on Intelligent data and security (IEEE IDS)
作者: Errounda, Fatima Zahra Liu, Yan Concordia Univ Elect & Comp Engn Dept Montreal PQ Canada
Location data is becoming ubiquitous with the spread of smart devices, and social media geo-tagged feeds. However, sharing location data may lead to serious privacy risks that must not be overlooked. Differential priv... 详细信息
来源: 评论
application Prospect of Blockchain Technology in Power Field  5
Application Prospect of Blockchain Technology in Power Field
收藏 引用
IEEE 5th Information Technology and Mechatronics Engineering conference (ITOEC)
作者: Wang, Guohua Song, Xi Liu, Li Lanzhou Jiaotong Univ Sch Automat & Elect Engn Lanzhou 730070 Peoples R China Lanzhou Jiaotong Univ Sch Elect & Informat Engn Lanzhou 730070 Peoples R China State Grid Gansu Elect Power Co Lanzhou 730030 Peoples R China Lanzhou Guanyun Technol Dev Co Ltd Lanzhou 730070 Peoples R China
In the past two years, "blockchain" has been a hot topic, and various industries are looking for a "blockchain +" model that suits them. the International Renewable Energy Agency (IRENA) released a... 详细信息
来源: 评论
DECH: A Novel Attack Pattern of Cloud Environment and Its Countermeasures
DECH: A Novel Attack Pattern of Cloud Environment and Its Co...
收藏 引用
Cryptography, security and privacy (CSP), IEEE International conference on
作者: Haoyu Gao Leixiao Li Hao Lin Jianxiong Wan Dan Deng Jie Li College of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data Based Software Service Hohhot China
Cloud computing has become more and more vital in digital world as a basic technique of many services. As the foundation of cloud computing, the cloud platform hosts various cloud services running on it and providing ... 详细信息
来源: 评论