咨询与建议

限定检索结果

文献类型

  • 558 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 421 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 105 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 115 篇 理学
    • 106 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 60 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 21 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 14 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 554 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"
559 条 记 录,以下是161-170 订阅
排序:
Session details: Session 7: Encryption and privacy  22
Session details: Session 7: Encryption and Privacy
收藏 引用
proceedings of the Twelfth acm conference on data and application security and privacy
作者: Susanne Wetzel Stevens Institute of Technology
No abstract available.
来源: 评论
Session details: Session 2: privacy  22
Session details: Session 2: Privacy
收藏 引用
proceedings of the Twelfth acm conference on data and application security and privacy
作者: Maribel Fernandez King's College London
No abstract available.
来源: 评论
Defining security Limits in Biometrics  25
Defining Security Limits in Biometrics
收藏 引用
proceedings of the Fifteenth acm conference on data and application security and privacy
作者: Axel Durbet Paul-Marie Grollemund Pascal Lafourcade Kevin Thiry-Atighehchi CNRS Clermont Auvergne INP Mines Saint-Étienne LIMOS Université Clermont Auvergne Clermont-Ferrand France CNRS Clermont Auvergne INP Mines Saint-Étienne LMBP Université Clermont Auvergne Clermont-Ferrand France
Biometric systems are widely used for authentication and identification. The False Match Rate (FMR) quantifies the probability of matching a biometric template to a non-corresponding template and serves as an indicato... 详细信息
来源: 评论
Session details: Session 4: Access Control and privacy  22
Session details: Session 4: Access Control and Privacy
收藏 引用
proceedings of the Twelfth acm conference on data and application security and privacy
作者: Shamik Sural Indian Institute of Technology Kharagpur
No abstract available.
来源: 评论
Session details: Session 5: IoT security  22
Session details: Session 5: IoT Security
收藏 引用
proceedings of the Twelfth acm conference on data and application security and privacy
作者: Maanak Gupta Tennessee Tech
No abstract available.
来源: 评论
Session details: Session 3: Software security  22
Session details: Session 3: Software Security
收藏 引用
proceedings of the Twelfth acm conference on data and application security and privacy
作者: Indrakshi Ray Colorado State University
No abstract available.
来源: 评论
Session details: Session 6 Hardware and Device security/privacy  21
Session details: Session 6 Hardware and Device Security/Priv...
收藏 引用
proceedings of the eleventh acm conference on data and application security and privacy
作者: Ziming Zhao University at Buffalo
No abstract available.
来源: 评论
Session details: Session 6: Authentication and Device security  22
Session details: Session 6: Authentication and Device Securi...
收藏 引用
proceedings of the Twelfth acm conference on data and application security and privacy
作者: Sudip Mittal Mississippi State University
No abstract available.
来源: 评论
Session details: Session 1: Machine Learning and security  22
Session details: Session 1: Machine Learning and Security
收藏 引用
proceedings of the Twelfth acm conference on data and application security and privacy
作者: Ram Krishnan University of Texas at San Antonio
No abstract available.
来源: 评论
Session details: Session 3: privacy  21
Session details: Session 3: Privacy
收藏 引用
proceedings of the eleventh acm conference on data and application security and privacy
作者: Maribel Fernandez King's College London
No abstract available.
来源: 评论