咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是961-970 订阅
排序:
A Linear Distinguisher and its application for Analyzing privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation  18
A Linear Distinguisher and its Application for Analyzing Pri...
收藏 引用
13th acm Asia conference on Information, Computer and Communications security (ASIACCS)
作者: Zhao, Liang Chen, Liqun Sichuan Univ Coll Cybersecur Chengdu Sichuan Peoples R China Univ Surrey Surrey Ctr Cyber Secur Guildford Surrey England
A distinguisher is employed by an adversary to explore the privacy property of a cryptographic primitive. If a cryptographic primitive is said to be private, there is no distinguisher algorithm that can be used by an ... 详细信息
来源: 评论
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?  18
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Brow...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Rodriguez, Juan D. Parra Posegga, Joachim Univ Passau Passau Germany
We introduce a new browser abuse scenario where an attacker uses local storage capabilities without the website's visitor knowledge to create a network of browsers for persistent storage and distribution of arbitr... 详细信息
来源: 评论
Secured privacy data using Multi Key Encryption in Cloud Storage  5
Secured Privacy Data using Multi Key Encryption in Cloud Sto...
收藏 引用
5th International conference on Emerging applications of Information Technology, EAIT 2018
作者: Muthi Reddy, P. Manjula, S.H. Venugopal, K.R. Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bengaluru560001 India
In the distributed systems security of data is a vital functionality, sharing of information in cloud storage is a provident technique. Nowadays, the main challenges is data security in cloud computing. To overcome th... 详细信息
来源: 评论
Avoiding Sensitive data Disclosure: Android System Design and Development data Leaks Detection thesis Master Degree Computer Engineering  1
收藏 引用
5th International conference on Software Engineering for Defence applications (SEDA)
作者: Pomona, Vincenzo Catania Univ Piazza Univ 2 I-95124 Catania CT Italy
the data leaks problem is a security key issue in the worldwide connection, communication and interoperability functions among the huge number of mobile devices, especially for apps where sensitive data are exchanged.... 详细信息
来源: 评论
proceedings - International conference on Software Engineering
Proceedings - International Conference on Software Engineeri...
收藏 引用
5th acm/IEEE 5th International conference on Mobile Software Engineering and Systems, MOBILESoft 2018, collocated with the 40th International conference on Software Engineering, ICSE 2018
the proceedings contain 38 papers. the topics discussed include: Ares: triggering payload of evasive android malware;Orlis: obfuscation-resilient library detection for Android;identifying architectural technical debt ...
来源: 评论
Lightweight Message Authentication for Constrained Devices  18
Lightweight Message Authentication for Constrained Devices
收藏 引用
11th acm conference on security and privacy in Wireless and Mobile Networks (WiSec)
作者: Dubrova, Elena Naslund, Mats Selander, Goran Lindqvist, Fredrik Royal Inst Technol Stockholm Sweden Ericsson AB Ericsson Res Stockholm Sweden
Message Authentication Codes (MACs) used in today's wireless communication standards may not be able to satisfy resource limitations of simpler 5G radio types and use cases such as machine type communications. As ... 详细信息
来源: 评论
Research on IoT application and security Risk Analysis for Smart Grid  5
Research on IoT Application and Security Risk Analysis for S...
收藏 引用
5th IEEE International conference on Cloud Computing and Intelligence Systems (CCIS)
作者: Jiang, Chengzhi Lu, Youtai CETC Res Inst 28 Nanjing 210007 Jiangsu Peoples R China
With the development of new equipment and new technologies in the fields of intelligent equipment and wireless communication, there has a more complex access environment, flexible access mode and a large number of int... 详细信息
来源: 评论
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference  18
A Domain is only as Good as its Buddies: Detecting Stealthy ...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Khalil, Issa M. Guan, Bei Nabeel, Mohamed Yu, Ting Qatar Comp Res Inst Doha Qatar
Inference based techniques are one of the major approaches to analyze DNS data and detect malicious domains. the key idea of inference techniques is to first define associations between domains based on features extra... 详细信息
来源: 评论
Towards efficient privacy-preserving similar sequence qeries on outsourced genomic databases  17
Towards efficient privacy-preserving similar sequence qeries...
收藏 引用
17th acm Workshop on privacy in the Electronic Society, WPES 2018, held in conjunction with the 25th acm conference on Computer and Communications security, CCS 2018
作者: Schneider, thomas Tkachenko, Oleksandr TU Darmstadt Germany
Nowadays, genomic sequencing has become affordable for many people. Since more people let analyze their genome, more genome data gets collected. the good side of this is that analyses on this data become possible. How... 详细信息
来源: 评论
Secure Storage with Replication and Transparent Deduplication  18
Secure Storage with Replication and Transparent Deduplicatio...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Leontiadis, Iraklis Curtmola, Reza Ecole Polytech Fed Lausanne Sch Comp & Commun Sci Lausanne Switzerland New Jersey Inst Technol Dept Comp Sci Newark NJ 07102 USA New Jersey Inst Technol Newark NJ 07102 USA
We seek to answer the following question: To what extent can we deduplicate replicated storage ? To answer this question, we design ReDup, a secure storage system that provides users with strong integrity, reliability... 详细信息
来源: 评论