咨询与建议

限定检索结果

文献类型

  • 1,075 篇 会议
  • 8 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 908 篇 工学
    • 862 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 281 篇 信息与通信工程
    • 79 篇 电气工程
    • 55 篇 网络空间安全
    • 47 篇 控制科学与工程
    • 30 篇 安全科学与工程
    • 14 篇 生物工程
    • 13 篇 建筑学
    • 12 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 交通运输工程
    • 9 篇 动力工程及工程热...
    • 8 篇 土木工程
    • 8 篇 生物医学工程(可授...
  • 178 篇 理学
    • 153 篇 数学
    • 17 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 8 篇 系统科学
    • 6 篇 物理学
    • 5 篇 化学
  • 88 篇 管理学
    • 47 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 28 篇 法学
    • 20 篇 社会学
    • 8 篇 法学
  • 14 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 9 篇 公共卫生与预防医...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 119 篇 privacy
  • 81 篇 security
  • 51 篇 data privacy
  • 45 篇 differential pri...
  • 34 篇 machine learning
  • 26 篇 access control
  • 25 篇 sensitive data
  • 23 篇 cryptography
  • 22 篇 internet of thin...
  • 21 篇 blockchain
  • 19 篇 federated learni...
  • 17 篇 deep learning
  • 16 篇 network security
  • 15 篇 authentication
  • 14 篇 mobile security
  • 13 篇 homomorphic encr...
  • 13 篇 cloud computing
  • 12 篇 iot
  • 12 篇 android
  • 11 篇 privacy-preservi...

机构

  • 11 篇 cispa helmholtz ...
  • 11 篇 purdue univ w la...
  • 8 篇 zhejiang univ pe...
  • 8 篇 carnegie mellon ...
  • 7 篇 north carolina s...
  • 6 篇 univ texas dalla...
  • 6 篇 rhein westfal th...
  • 6 篇 imperial coll lo...
  • 5 篇 stevens inst tec...
  • 5 篇 fraunhofer aisec...
  • 5 篇 hong kong univ s...
  • 5 篇 singapore manage...
  • 5 篇 natl univ singap...
  • 5 篇 stanford univ st...
  • 4 篇 georgia inst tec...
  • 4 篇 purdue universit...
  • 4 篇 ecole polytech f...
  • 4 篇 purdue universit...
  • 4 篇 tech univ darmst...
  • 4 篇 univ calif santa...

作者

  • 15 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 8 篇 backes michael
  • 7 篇 conti mauro
  • 7 篇 enck william
  • 6 篇 gupta maanak
  • 6 篇 ren kui
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 zhang yang
  • 6 篇 kantarcioglu mur...
  • 5 篇 wang lingyu
  • 5 篇 yu ting
  • 5 篇 gunter carl a.
  • 5 篇 liu peng
  • 4 篇 machanavajjhala ...
  • 4 篇 lee adam j.
  • 4 篇 sion radu
  • 4 篇 carbunar bogdan
  • 4 篇 wagner david

语言

  • 1,066 篇 英文
  • 21 篇 其他
  • 2 篇 中文
检索条件"任意字段=Proceedings of the first ACM conference on Data and application security and privacy"
1089 条 记 录,以下是21-30 订阅
排序:
CoCoT: Collaborative Contact Tracing  24
CoCoT: Collaborative Contact Tracing
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Kann, Trevor Bauer, Lujo Cunningham, Robert K. Carnegie Mellon Univ Pittsburgh PA 15213 USA Univ Pittsburgh Pittsburgh PA USA
Contact tracing can limit the spread of infectious diseases by notifying people of potential exposure to disease. Manual contact tracing is resource-intensive, but much of it can be automated using mobile phones, whic... 详细信息
来源: 评论
Crypto'Graph: Leveraging privacy-Preserving Distributed Link Prediction for Robust Graph Learning  24
Crypto'Graph: Leveraging Privacy-Preserving Distributed Link...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Azogagh, Sofiane Birba, Zelma Aubin Gambs, Sebastien Killijian, Marc-Olivier Univ Quebec Montreal Montreal PQ Canada
Graphs are a widely used data structure for collecting and analyzing relational data. However, when the graph structure is distributed across several parties, its analysis is challenging. In particular, due to the sen... 详细信息
来源: 评论
Towards Accurate and Stronger Local Differential privacy for Federated Learning with Staircase Randomized Response  24
Towards Accurate and Stronger Local Differential Privacy for...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Varun, Matta Feng, Shuya Wang, Han Sural, Shamik Hong, Yuan Indian Inst Technol Kharagpur India Univ Connecticut Storrs CT USA Univ Kansas Lawrence KS USA
Federated Learning (FL), a privacy-preserving training approach, has proven to be effective, yet its vulnerability to attacks that extract information from model weights is widely recognized. To address such privacy c... 详细信息
来源: 评论
CCSM: Building Cross-Cluster security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters  24
CCSM: Building Cross-Cluster Security Models for Edge-Core E...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: GholipourChoubeh, Mahmood Kermabon-Bobinnec, Hugo Majumdar, Suryadipta Jarraya, Yosr Wang, Lingyu Nour, Boubakr Pourzandi, Makan Concordia Univ Montreal PQ Canada Ericsson Secur Res Montreal PQ Canada
With the emergence of 5G networks and their large scale applications such as IoT and autonomous vehicles, telecom operators are increasingly offloading the computation closer to customers (i.e., on the edge). Such edg... 详细信息
来源: 评论
An Overview of Threats Exploring the Confusion Between Top-Level Domains and File Type Extensions  24
An Overview of Threats Exploring the Confusion Between Top-L...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Sales, Anderson Torres, Nuno Pinto, Pedro Inst Politecn Viana do Castelo Viana Do Castelo Portugal INESC TEC Porto Portugal
Cyberattacks exploit deceptions involving the Domain Name Service (DNS) to direct users to fake websites, such as typosquatting attacks, which exploit natural typographical errors, and homograph attacks, where differe... 详细信息
来源: 评论
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem  24
Nothing Personal: Understanding the Spread and Use of Person...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Zaeifi, Mehrnoosh Kalantari, Faezeh Oest, Adam Sun, Zhibo Ahn, Gail-Joon Shoshitaishvili, Yan Bao, Tiffany Wang, Ruoyu Doupe, Adam Arizona State Univ Tempe AZ 85287 USA Drexel Univ Philadelphia PA USA
Online services leverage various authentication methods with differing usability and reliability trade-offs, such as password-based or multi-factor authentication (MFA). However, financial service providers face a uni... 详细信息
来源: 评论
security Policy Generation and Verification through Large Language Models: A proposal  24
Security Policy Generation and Verification through Large La...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Martinelli, Fabio Mercaldo, Francesco Petrillo, Luca Santone, Antonella CNR IIT Pisa Italy Univ Molise Campobasso Italy CNR IIT Campobasso Italy IMT Sch Adv Studies Lucca Lucca Italy CNR IIT Lucca Italy
The ability to manage and enforce security policies in a rapidly changing digital environment is vital. When enforcing and verifying policies on complex systems, it can be challenging for them to be understood by huma... 详细信息
来源: 评论
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores  24
Examining Cryptography and Randomness Failures in Open-Sourc...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: English, K. Virgil Bennett, Nathaniel Thorn, Seaver Butler, Kevin R. B. Enck, William Traynor, Patrick North Carolina State Univ Raleigh NC 27695 USA Univ Florida Gainesville FL USA
Industry is increasingly adopting private 5G networks to securely manage their wireless devices in retail, manufacturing, natural resources, and healthcare. As with most technology sectors, open-source software is wel... 详细信息
来源: 评论
Leveraging Storage Semantics to Enhance data security and privacy  24
Leveraging Storage Semantics to Enhance Data Security and Pr...
收藏 引用
31st conference on Computer and Communications security
作者: Zhu, Weidong Univ Florida Gainesville FL 32611 USA
data within a system travels through an I/O path from its generation in an application to its final storage on a device. Ensuring data security and privacy is a significant design concern, but heavily modulated storag... 详细信息
来源: 评论
Privkit: A Toolkit of privacy-Preserving Mechanisms for Heterogeneous data Types  24
Privkit: A Toolkit of Privacy-Preserving Mechanisms for Hete...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Cunha, Mariana Duarte, Guilherme Andrade, Ricardo Mendes, Ricardo Vilela, Joao P. Univ Porto CISUC CRACS INESC TEC Porto Portugal Univ Porto Dept Comp Sci Porto Portugal Univ Coimbra CISUC Coimbra Portugal Univ Coimbra Dept Informat Engn Coimbra Portugal
With the massive data collection from different devices, spanning from mobile devices to all sorts of IoT devices, protecting the privacy of users is a fundamental concern. In order to prevent unwanted disclosures, se... 详细信息
来源: 评论