咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是871-880 订阅
排序:
Blockchain for Internet of things: Architecture, Consensus Advancements, Challenges and application Areas  5
Blockchain for Internet of Things: Architecture, Consensus A...
收藏 引用
5th International conference on Computing, Communication Control and Automation (ICCUBEA)
作者: Biswal, Aakash Bhushan, Bharat GGSIP Univ Dept Comp Sci & Engn HMRITM New Delhi India
the main purpose behind Internet of things (IoT) is to extract extensive economic as well as other benefits and to alter day to day life of human being. but along with so many benefits IoT has a major disadvantage tha... 详细信息
来源: 评论
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer  19
MimosaFTL: Adding Secure and Practical Ransomware Defense St...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Wang, Peiying Jia, Shijie Chen, Bo Xia, Luning Liu, Peng Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Michigan Technol Univ Dept Comp Sci Houghton MI 49931 USA Penn State Univ University Pk PA 16802 USA Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing Peoples R China
Ransomware attacks have become prevalent nowadays due to sudden flourish of cryptocurrencies. Most existing defense strategies for ransomware, however, are vulnerable to privileged ransomware who can compromise the op... 详细信息
来源: 评论
A general framework for privacy-preserving computation on cloud environments  19
A general framework for privacy-preserving computation on cl...
收藏 引用
12th IEEE/acm International conference on Utility and Cloud Computing, UCC 2019
作者: Basilakis, Jim Javadi, Bahman School of Computing Eng. and Math. Western Sydney University Sydney Australia
While privacy and security concerns dominate public cloud services, Homomorphic Encryption (HE) is seen as an emerging solution that can potentially assure secure processing of sensitive data by third-party cloud vend... 详细信息
来源: 评论
Detection and Prevention of Profile Cloning in Online Social Networks  5
Detection and Prevention of Profile Cloning in Online Social...
收藏 引用
5th IEEE International conference on Signal Processing, Computing and Control (ISPCC)
作者: Kumar, Naresh Dabas, Poonam Komal Kurukshetra Univ Univ Inst Engn & Technol UIET Dept Comp Sci & Engn Kurukshetra 136119 Haryana India Kurukshetra Univ Univ Inst Engn & Technol Comp Sci Dept Kurukshetra Haryana India
In today's world, online social networking sites are becoming quite popular. they influence the way people communicate with each other. Social Sites like Facebook, Twitter, LinkedIn, and Google have tens or hundre... 详细信息
来源: 评论
acm International conference Proceeding Series
ACM International Conference Proceeding Series
收藏 引用
5th International conference on e-Society, e-Learning and e-Technologies, ICSLT 2019
the proceedings contain 22 papers. the topics discussed include: feasible requirements model based on the holistic problem-solving approach and best practices to achieve the success of an Erp implementation;transferri...
来源: 评论
An RSA based authentication system for smart IoT environment  21
An RSA based authentication system for smart IoT environment
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Mumtaz, Majid Akram, Junaid Ping, Luo Key Laboratory for Information Systems Security Ministry of Education School of Software Tsinghua University Beijing100084 China
Authentication is the fundamental security service used in almost all remote applications. All such sensitive applications over an open network need authentication mechanism that should be delivered in a trusted way. ... 详细信息
来源: 评论
An anonymous conditional privacy-preserving authentication scheme for VANETs  21
An anonymous conditional privacy-preserving authentication s...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Li, Xincheng Liu, Yali Yin, Xinchun College of Information Engineering Yangzhou University Yangzhou China College of Computer Science and Technology Jiangsu Normal University Xuzhou China
Vehicular ad hoc networks (VANETs) have been growing rapidly because it can improve traffic safety and efficiency in transportation. In VANETs, messages are broadcast in wireless environment, which is vulnerable to be... 详细信息
来源: 评论
GEOSECURE-O: A MEthOD FOR SECURE DISTANCE CALCULATION FOR TRAVEL MODE DETECTION USING OUTSOURCED GPS TRAJECTORY data  5
GEOSECURE-O: A METHOD FOR SECURE DISTANCE CALCULATION FOR TR...
收藏 引用
5th IEEE International conference on Multimedia Big data (BigMM)
作者: Patil, Vikram Parikh, Shivam B. Atrey, Pradeep K. SUNY Albany Albany Lab Privacy & Secur Coll Engn & Appl Sci Albany NY 12222 USA
Detecting the mode of transportation using multimedia sensory data, such as GPS trajectory data, is an important research problem arising out in many application domains that use location-based services (LBS). Due to ... 详细信息
来源: 评论
Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification  5
Extracting Vehicle Sensor Signals from CAN Logs for Driver R...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Lestyan, Szilvia Acs, Gergely Biczok, Gergely Szalay, Zsolt Budapest Univ Technol & Econ Dept Networked Syst & Serv CrySyS Lab Budapest Hungary Budapest Univ Technol & Econ Dept Automot Technol Budapest Hungary
data is the new oil for the car industry. Cars generate data about how they are used and who's behind the wheel which gives rise to a novel way of profiling individuals. Several prior works have successfully demon... 详细信息
来源: 评论
A recent survey on challenges in security and privacy in internet of things  19
A recent survey on challenges in security and privacy in int...
收藏 引用
5th International conference on Engineering and MIS, ICEMIS 2019
作者: Aljawarneh, Shadi Radhakrishna, Vangipuram Kumar, Gunupudi Rajesh Department of Software Engineering Jordan University of Science and Technology Irbid22110 Jordan Department of Information Technology VNR Vignana Jyothi Institute of Engineering and Technology Hyderabad India
Computing environment in IoT (Internet of things) is surrounded with huge amounts of heterogeneous data fulfilling many services in everyone's daily life. Since, communication process in IoT takes place using diff... 详细信息
来源: 评论