咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是851-860 订阅
排序:
SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation  19
SKA-CaNPT: Secure Key Agreement using Cancelable and Noninve...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Eskandarian, Laleh Akdogan, Dilara Karaoglan Altop, Duygu Levi, Albert Sabanci Univ Fac Engn & Nat Sci Istanbul Turkey
Nowadays, many of the security-providing applications use biometrics-based authentication. However, since each person's biometrics is unique and non-replaceable, once it is compromised, it will be compromised fore... 详细信息
来源: 评论
Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An application of the Meta Attack Language  5th
Probabilistic Modeling and Simulation of Vehicular Cyber Att...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Katsikeas, Sotirios Johnson, Pontus Hacks, Simon Lagerstrom, Robert KTH Royal Inst Technol Dept Network & Syst Engn Stockholm Sweden Rhein Westfal TH Aachen Res Grp Software Construct Aachen Germany
Attack simulations are a feasible means to assess the cyber security of systems. the simulations trace the steps taken by an attacker to compromise sensitive system assets. Moreover, they allow to estimate the time co... 详细信息
来源: 评论
Maia: A Language for Mandatory Integrity Controls of Structured data  5th
Maia: A Language for Mandatory Integrity Controls of Structu...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Al-Mawee, Wassnaa Bonamy, Paul J. Carr, Steve Mayo, Jean Western Michigan Univ Dept Comp Sci 1903 W Michigan Ave Kalamazoo MI 49008 USA Washington State Univ Dept Comp Sci 14204 NE Salmon Creek Ave Vancouver WA 98686 USA Michigan Technol Univ Dept Comp Sci 1400 Townsend Dr Hougton MI 49931 USA
the integrity of systems files is necessary for the secure functioning of an operating system. Integrity is not generally discussed in terms of complete computer systems. Instead, integrity issues tend to be either ti... 详细信息
来源: 评论
State of the Sandbox: Investigating macOS application security  18
State of the Sandbox: Investigating macOS Application Securi...
收藏 引用
2019 Workshop on privacy in the Electronic Society
作者: Blochberger, Maximilian Rieck, Jakob Burkert, Christian Mueller, Tobias Federrath, Hannes Univ Hamburg Hamburg Germany
Sandboxing is a way to deliberately restrict applications accessing resources that they do not need to function properly. Sandboxing is intended to limit the effect of potential exploits and to mitigate overreach to p... 详细信息
来源: 评论
Research On 3d Interactive Model Selection And Customization Of ceramic Products Based On Big data Cloud Service Platform  5
Research On 3d Interactive Model Selection And Customization...
收藏 引用
5th IEEE Int Conf on Big data security on Cloud (Bigdatasecurity) / 5th IEEE Int Conf on High Performance and Smart Computing (IEEE HPSC) / 4th IEEE Int Conf on Intelligent data and security (IEEE IDS)
作者: Hu, Kaihua Hua, Huang Zhang, Yujing Jingdezhen Ceram Inst Sch Informat Engn Jingdezhen Peoples R China Jingdezhen Ceram Inst Coll Technol & Art Sch Informat Engn Jingdezhen Peoples R China
In the new economic era led by big data, enterprises face many consumers with various product requirements. It is important for enterprises to timely meet these personalized product needs to improve their market compe... 详细信息
来源: 评论
Practical security and privacy threat Analysis in the Automotive Domain: Long Term Support Scenario for Over-the-Air Updates  5
Practical Security and Privacy Threat Analysis in the Automo...
收藏 引用
5th International conference on Vehicle Technology and Intelligent Transport Systems (VEHITS)
作者: Vasenev, Alexandr Stahl, Florian Hamazaryan, Hayk Ma, Zhendong Shan, Lijun Kemmerich, Joerg Loiseaux, Claire ESI TNO Eindhoven Netherlands AVL Software & Funct Regensburg Germany ZF Friedrichshafen AG Friedrichshafen Germany AVL Graz Austria Internet Trust Paris France
Keeping a vehicle secure implies provide of a long-term support, where over-the-air updates (OTA) play an essential role. Clear understanding of OTA threats is essential to counter them efficiently. Existing research ... 详细信息
来源: 评论
APDPk-means: A new differential privacy clustering algorithm based on arithmetic progression privacy budget allocation  21
APDPk-means: A new differential privacy clustering algorithm...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Fan, Zexuan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security AND Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
How to protect users' private data during network data mining has become a hot issue in the fields of big data and network information security. Most current researches on differential privacy k-means clustering a... 详细信息
来源: 评论
A study on Blockchain enabled applications and its security Issues  5
A study on Blockchain enabled Applications and its Security ...
收藏 引用
IEEE 5th International conference for Convergence in Technology (I2CT)
作者: Pai, Nilima D. Mondal, Shaheen NMIMS Mukesh Patel Sch Technol Management & Engn Mumbai Maharashtra India
Blockchain technology was first established because of its use in cryptocurrencies, but its applications are not limited just to this field. We have explored other fields like Finance, Auditing, Digital identity, Digi... 详细信息
来源: 评论
Zero-sum Distinguishers for Round-reduced GIMLI Permutation  5th
Zero-sum Distinguishers for Round-reduced GIMLI Permutation
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Cai, Jiahao Wei, Zihao Zhang, Yingjie Sun, Siwei Hu, Lei Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
GIMLI is a 384-bit permutation proposed by Bernstein et al. at CHES 2017. It is designed with the goal of achieving both high security and high performance across a wide range of hardware and software platforms. Since... 详细信息
来源: 评论
SecHadoop: A privacy preserving hadoop  19
SecHadoop: A privacy preserving hadoop
收藏 引用
12th IEEE/acm International conference on Utility and Cloud Computing, UCC 2019
作者: Shyamasundar, Rudrapatna K. Satheesan, Swatish Mittal, Deepali Chaudhary, Aakash Department of Computer Science and Engineering Indian Institute of Technology Bombay Mumbai Maharashtra400076 India
With the generation of vast amounts of data, there has been a tremendous need for processing the same in an economical way. MapReduce paradigm provides an economical processing of huge datasets in an effective way. Ha... 详细信息
来源: 评论