咨询与建议

限定检索结果

文献类型

  • 559 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 434 篇 工学
    • 422 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 104 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 114 篇 理学
    • 105 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 22 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 14 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 555 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"
560 条 记 录,以下是41-50 订阅
排序:
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software security Bugs  24
CrashTalk: Automated Generation of Precise, Human Readable, ...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: James, Kedrian Valakuzhy, Kevin Snow, Kevin Monrose, Fabian Univ N Carolina Chapel Hill NC 27515 USA Georgia Inst Technol Atlanta GA 30332 USA Zeropoint Dynam Chapel Hill NC USA
Understanding the cause, consequences, and severity of a security bug are critical facets of the overall bug triaging and remediation process. Unfortunately, diagnosing failures is often a laborious process that requi... 详细信息
来源: 评论
Velocity-Aware Geo-Indistinguishability  23
Velocity-Aware Geo-Indistinguishability
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Mendes, Ricardo Cunha, Mariana Vilela, Joao P. Univ Coimbra CISUC Coimbra Portugal Univ Coimbra Dept Informat Coimbra Portugal Univ Porto Fac Ciencias CISUC CRACS INESCTEC Rua Campo Alegre S-N P-4169007 Porto Portugal Univ Porto Fac Ciencias Dept Ciencia Comp Rua Campo Alegre S-N P-4169007 Porto Portugal
Location privacy-Preserving Mechanisms (LPPMs) have been proposed to mitigate the risks of privacy disclosure yielded from location sharing. However, due to the nature of this type of data, spatio-temporal correlation... 详细信息
来源: 评论
Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity application Virtualization Platforms in Android  24
Risky Cohabitation: Understanding and Addressing Over-privil...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Hsiao, Shou-Ching Li, Shih-Wei Hsiao, Hsu-Chun Natl Taiwan Univ Taipei Taiwan Acad Sinica Taipei Taiwan
The Android system protects its users' privacy via app permissions, which govern apps' access to sensitive data and resources. However, recent research has reported that, during app virtualization, the current... 详细信息
来源: 评论
Derecho: privacy Pools with Proof-Carrying Disclosures  24
Derecho: Privacy Pools with Proof-Carrying Disclosures
收藏 引用
31st conference on Computer and Communications security
作者: Beal, Josh Ben Fisch Yale Univ New Haven CT 06511 USA
A privacy pool enables clients to deposit units of a cryptocurrency into a shared pool where ownership of deposited currency is tracked via a system of cryptographically hidden records. Clients may later withdraw from... 详细信息
来源: 评论
privacy-Preserving Fully Online Matching with Deadlines  23
Privacy-Preserving Fully Online Matching with Deadlines
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Klinger, Andreas Meyer, Ulrike Rhein Westfal TH Aachen Aachen Germany
In classical secure multi-party computation (SMPC) it is assumed that a fixed and a priori known set of parties wants to securely evaluate a function of their private inputs. This assumption implies that online proble... 详细信息
来源: 评论
Re-pseudonymization Strategies for Smart Meter data Are Not Robust to Deep Learning Profiling Attacks  24
Re-pseudonymization Strategies for Smart Meter Data Are Not ...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Cretu, Ana-Maria Rusu, Miruna de Montjoye, Yves-Alexandre Ecole Polytech Fed Lausanne Lausanne Switzerland Imperial Coll London London England
Smart meters, devices measuring the electricity and gas consumption of a household, are currently being deployed at a fast rate throughout the world. The data they collect are extremely useful, including in the fight ... 详细信息
来源: 评论
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing  24
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing
收藏 引用
17th acm conference on security and privacy in Wireless and Mobile Networks (WiSec)
作者: He, Yaqi Zeng, Kai Jiao, Long Mark, Brian L. Khasawneh, Khaled N. George Mason Univ Wireless Cyber Ctr Fairfax VA 22030 USA Univ Massachusetts Dartmouth Dept Comp Informat Sci Dartmouth NS Canada
Wireless device pairing is a critical security mechanism to bootstrap the secure communication between two devices without a pre-shared secret. It has been widely used in many Internet of Things (IoT) applications, su... 详细信息
来源: 评论
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation  23
Anonymous System for Fully Distributed and Robust Secure Mul...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Klinger, Andreas Battermann, Felix Meyer, Ulrike Rhein Westfal TH Aachen Aachen Germany
In secure multi-party computation (SMPC), it is considered that multiple parties that are known to each other evaluate a function over their private inputs in a secure fashion. The participating parties do not learn a... 详细信息
来源: 评论
Federated Learning for privacy Preserving Intelligent Healthcare application to Breast Cancer Detection  25
Federated Learning for Privacy Preserving Intelligent Health...
收藏 引用
26th International conference on Distributed Computing and Networking, ICDCN 2025
作者: Amritanjali Gupta, Ragav Birla Institute of Technology Mesra Ranchi Ranchi India Sri Mata Vaishno Devi University Jammu Katra India
Health data used in building intelligent medical care systems contain sensitive personal information of the patients. Distributed storage, processing and sharing of data poses threats to the data privacy and security.... 详细信息
来源: 评论
Comparative privacy Analysis of Mobile Browsers  23
Comparative Privacy Analysis of Mobile Browsers
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Zafar, Ahsan Das, Anupam North Carolina State Univ Raleigh NC 27695 USA
Online trackers are invasive as they track our digital footprints, many of which are sensitive in nature, and when aggregated over time, they can help infer intricate details about our lifestyles and habits. Although ... 详细信息
来源: 评论