咨询与建议

限定检索结果

文献类型

  • 578 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 579 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 453 篇 工学
    • 438 篇 计算机科学与技术...
    • 150 篇 软件工程
    • 113 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 27 篇 电气工程
    • 14 篇 控制科学与工程
    • 10 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
  • 117 篇 理学
    • 107 篇 数学
    • 9 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 4 篇 物理学
  • 39 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 61 篇 privacy
  • 46 篇 security
  • 28 篇 data privacy
  • 22 篇 machine learning
  • 21 篇 access control
  • 21 篇 differential pri...
  • 13 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 blockchain
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 cryptography
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 data mining
  • 7 篇 web security
  • 7 篇 network security

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 574 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"任意字段=Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy"
579 条 记 录,以下是311-320 订阅
排序:
Practical UC-Secure Delegatable Credentials with Attributes and Their application to Blockchain  17
Practical UC-Secure Delegatable Credentials with Attributes ...
收藏 引用
24th acm-SIGSAC conference on Computer and Communications security (acm CCS)
作者: Camenisch, Jan Drijvers, Manu Dubovitskaya, Maria IBM Res Zurich Zurich Switzerland Swiss Fed Inst Technol Zurich Switzerland
Certification of keys and attributes is in practice typically realized by a hierarchy of issuers. Revealing the full chain of issuers for certificate verification, however, can be a privacy issue since it can leak sen... 详细信息
来源: 评论
Research Issues and Approaches for Connected and Automated Vehicles  17
Research Issues and Approaches for Connected and Automated V...
收藏 引用
7th acm conference on data and application security and privacy (CODASPY)
作者: Shin, Kang G. Univ Michigan Ann Arbor Ann Arbor MI 48109 USA
Driverless and/or environment-friendly cars have recently received a great deal of attention from media and almost all industry and government sectors due mainly to their great potential impacts on safety, economy, an... 详细信息
来源: 评论
POSTER: TTPP Method for Validation of k-anonymity on Wi-Fi Association Log data  10
POSTER: TTPP Method for Validation of k-anonymity on Wi-Fi A...
收藏 引用
10th acm conference on security and privacy in Wireless and Mobile Networks (WiSec)
作者: Fukuzaki, Akinobu Koide, Noriaki Sonehara, Noboru Natl Inst Informat Chiyoda Ku 2-1-2-2008 Hitotsubashi Tokyo Japan Tsuda Univ Shibuya Ku 1-18-24 Sendagaya Tokyo Japan
Using data about individuals without revealing sensitive information about them is important. In recently years, a new privacy protection concept is called k-anonymity has been introduced. On the other hand, applicati... 详细信息
来源: 评论
A Secure, privacy-Preserving IoT Middleware Using Intel SGX  17
A Secure, Privacy-Preserving IoT Middleware Using Intel SGX
收藏 引用
7th International conference on the Internet of Things
作者: Gremaud, Pascal Durand, Arnaud Pasquier, Jacques Univ Fribourg Fribourg Switzerland
With Internet of Things (IoT) middleware solutions moving towards cloud computing, the problems of trust in cloud platforms and data privacy need to be solved. The emergence of Trusted Execution Environments (TEEs) op... 详细信息
来源: 评论
Statistical security Incident Forensics against data Falsification in Smart Grid Advanced Metering Infrastructure  17
Statistical Security Incident Forensics against Data Falsifi...
收藏 引用
7th acm conference on data and application security and privacy (CODASPY)
作者: Bhattacharjee, Shameek Thakur, Aditya Silvestri, Simone Das, Sajal K. Missouri Univ Sci & Technol Dept Comp Sci Rolla MO 65409 USA Missouri Univ Sci & Technol Dept Elect Engn Rolla MO 65409 USA
Compromised smart meters reporting false power consumption data in Advanced Metering Infrastructure (AMI) may have drastic consequences on a smart grid's operations. Most existing works only deal with electricity ... 详细信息
来源: 评论
Synthesis of Probabilistic privacy Enforcement  17
Synthesis of Probabilistic Privacy Enforcement
收藏 引用
24th acm-SIGSAC conference on Computer and Communications security (acm CCS)
作者: Kucera, Martin Tsankov, Petar Gehr, Timon Guarnieri, Marco Vechev, Martin Swiss Fed Inst Technol Zurich Switzerland
Existing probabilistic privacy enforcement approaches permit the execution of a program that processes sensitive data only if the information it leaks is within the bounds specified by a given policy. Thus, to extract... 详细信息
来源: 评论
Functional Encryption with Oblivious Helper  17
Functional Encryption with Oblivious Helper
收藏 引用
acm Asia conference on Computer and Communications security (ASIA CCS)
作者: Dupont, Pierre-Alain Pointcheval, David PSL Res Univ ENS CNRS DGAINRIA Paris France PSL Res Univ ENS CNRS INRIA Paris France
Functional encryption is a nice tool that bridges the gap between usability and privacy when providing access to huge databases: while being encrypted, aggregated information is available with a fine-tuned control by ... 详细信息
来源: 评论
Model-Driven Software Engineering in Practice: privacy-Enhanced Filtering of Network Traffic  2017
Model-Driven Software Engineering in Practice: Privacy-Enhan...
收藏 引用
11th Joint Meeting of European Software Engineering conference (ESEC) / acm SIGSOFT Symposium on the Foundations of Software Engineering (FSE)
作者: van Dijk, Roel Creeten, Christophe van der Ham, Jeroen van den Bos, Jeroen Netherlands Forens Inst The Hague Netherlands Delft Univ Technol Delft Netherlands Natl Cyber Secur Ctr The Hague Netherlands Zuyd Univ Appl Sci Heerlen Netherlands
Network traffic data contains a wealth of information for use in security analysis and application development. Unfortunately, it also usually contains confidential or otherwise sensitive information, prohibiting shar... 详细信息
来源: 评论
10th International Workshop on Artificial Intelligence and security (AISec 2017)  17
10th International Workshop on Artificial Intelligence and S...
收藏 引用
24th acm-SIGSAC conference on Computer and Communications security (acm CCS)
作者: Biggio, Battista Freeman, David Miller, Brad Sinha, Arunesh Univ Cagliari Cagliari Italy Facebook Inc Menlo Pk CA USA Google Inc Mountain View CA USA Univ Michigan Ann Arbor MI 48109 USA
Artificial Intelligence (AI) and Machine Learning (ML) provide a set of useful analytic and decision-making techniques that are being leveraged by an ever-growing community of practitioners, including many whose appli... 详细信息
来源: 评论
A privacy assessment of social media aggregators  9
A privacy assessment of social media aggregators
收藏 引用
9th IEEE/acm International conference on Advances in Social Networks Analysis and Mining, ASONAM 2017
作者: Misra, Gaurav Such, Jose M. Gill, Lauren Security Lancaster Research Center Lancaster University Lancaster United Kingdom Department of Informatics King’s College London London United Kingdom School of Computing and Communications Lancaster University Lancaster United Kingdom
Social Media Aggregator (SMA) applications present a platform enabling users to manage multiple Social Networking Sites (SNS) in one convenient application, which results in a unique concentration of data from several... 详细信息
来源: 评论