咨询与建议

限定检索结果

文献类型

  • 1,075 篇 会议
  • 8 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 908 篇 工学
    • 862 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 281 篇 信息与通信工程
    • 79 篇 电气工程
    • 55 篇 网络空间安全
    • 47 篇 控制科学与工程
    • 30 篇 安全科学与工程
    • 14 篇 生物工程
    • 13 篇 建筑学
    • 12 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 交通运输工程
    • 9 篇 动力工程及工程热...
    • 8 篇 土木工程
    • 8 篇 生物医学工程(可授...
  • 178 篇 理学
    • 153 篇 数学
    • 17 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 8 篇 系统科学
    • 6 篇 物理学
    • 5 篇 化学
  • 88 篇 管理学
    • 47 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 28 篇 法学
    • 20 篇 社会学
    • 8 篇 法学
  • 14 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 9 篇 公共卫生与预防医...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 119 篇 privacy
  • 81 篇 security
  • 51 篇 data privacy
  • 45 篇 differential pri...
  • 34 篇 machine learning
  • 26 篇 access control
  • 25 篇 sensitive data
  • 23 篇 cryptography
  • 22 篇 internet of thin...
  • 21 篇 blockchain
  • 19 篇 federated learni...
  • 17 篇 deep learning
  • 16 篇 network security
  • 15 篇 authentication
  • 14 篇 mobile security
  • 13 篇 homomorphic encr...
  • 13 篇 cloud computing
  • 12 篇 iot
  • 12 篇 android
  • 11 篇 privacy-preservi...

机构

  • 11 篇 cispa helmholtz ...
  • 11 篇 purdue univ w la...
  • 8 篇 zhejiang univ pe...
  • 8 篇 carnegie mellon ...
  • 7 篇 north carolina s...
  • 6 篇 univ texas dalla...
  • 6 篇 rhein westfal th...
  • 6 篇 imperial coll lo...
  • 5 篇 stevens inst tec...
  • 5 篇 fraunhofer aisec...
  • 5 篇 hong kong univ s...
  • 5 篇 singapore manage...
  • 5 篇 natl univ singap...
  • 5 篇 stanford univ st...
  • 4 篇 georgia inst tec...
  • 4 篇 purdue universit...
  • 4 篇 ecole polytech f...
  • 4 篇 purdue universit...
  • 4 篇 tech univ darmst...
  • 4 篇 univ calif santa...

作者

  • 15 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 8 篇 backes michael
  • 7 篇 conti mauro
  • 7 篇 enck william
  • 6 篇 gupta maanak
  • 6 篇 ren kui
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 zhang yang
  • 6 篇 kantarcioglu mur...
  • 5 篇 wang lingyu
  • 5 篇 yu ting
  • 5 篇 gunter carl a.
  • 5 篇 liu peng
  • 4 篇 machanavajjhala ...
  • 4 篇 lee adam j.
  • 4 篇 sion radu
  • 4 篇 carbunar bogdan
  • 4 篇 wagner david

语言

  • 1,066 篇 英文
  • 21 篇 其他
  • 2 篇 中文
检索条件"任意字段=Proceedings of the first ACM conference on Data and application security and privacy"
1089 条 记 录,以下是31-40 订阅
排序:
Mutual TLS in Practice: A Deep Dive into Certificate Configurations and privacy Issues  24
Mutual TLS in Practice: A Deep Dive into Certificate Configu...
收藏 引用
acm Internet Measurement conference (IMC)
作者: Dong, Hongying Zhang, Yizhe Lee, Hyeonmin Du, Kevin Tu, Guancheng Sun, Yixin Univ Virginia Charlottesville VA 22904 USA
Transport Layer security (TLS) is widely recognized as the essential protocol for securing Internet communications. While numerous studies have focused on investigating server certificates used in TLS connections, our... 详细信息
来源: 评论
(In)visible privacy Indicator: security Analysis of privacy Indicator on Android Devices  19
(In)visible Privacy Indicator: Security Analysis of Privacy ...
收藏 引用
19th acm Asia conference on Computer and Communications security (acm AsiaCCS)
作者: Choe, Yurak Yu, Hyungseok Kim, Taeho Lee, Shinjae Lee, Hojoon Kim, Hyoungshick Sungkyunkwan Univ Suwon Gyeonggi Do South Korea Samsung Elect Suwon Gyeonggi Do South Korea
In Android 12, Google introduced a new security feature called the privacy indicator to protect users from spyware. The privacy indicator visually alerts users by displaying a green circle in the notification bar when... 详细信息
来源: 评论
DroidDefender: An Image-based Android Antimalware Proof-of-Concept  24
DroidDefender: An Image-based Android Antimalware Proof-of-C...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Ciaramella, Giovanni Martinelli, Fabio Mercaldo, Francesco Santone, Antonella IMT Sch Adv Studies Lucca Lucca Italy CNR IIT Lucca Italy CNR IIT Pisa Italy Univ Molise Campobasso Italy CNR IIT Campobasso Italy
Malware analysis researchers are currently focused on the design and development of innovative approaches to detect zero-day malware, with particular regard to mobile environments. It is widely recognized that existin... 详细信息
来源: 评论
application of Secure data Storage and Transmission in Cloud Computing Based on Blockchain Technology  24
Application of Secure Data Storage and Transmission in Cloud...
收藏 引用
2024 International conference on Intelligent Education and Computer Technology, IECT 2024
作者: Zhang, Yadong Zheng, Yujuan Yin, Chen Shi, Chunju School of Information Engineering Shandong Vocational University of Foreign Affairs Shandong Weihai China Information Center Shandong Drug and Food Vocational College Shandong Weihai China
How to solve data security and privacy protection in cloud computing is a very difficult issue, and data security is currently being paid more and more attention to. This article applies blockchain to cloud computing ... 详细信息
来源: 评论
A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks  24
A Unified Time Series Analytics based Intrusion Detection Fr...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Maliha, Maisha Bhattacharjee, Shameek Western Michigan Univ Kalamazoo MI 49008 USA
Modern smart vehicles have a Controller Area Network (CAN) that supports intra-vehicle communication between intelligent Electronic Control Units (ECUs). The CAN is known to be vulnerable to various cyber attacks. In ... 详细信息
来源: 评论
IdDecoder: A Face Embedding Inversion Tool and its privacy and security Implications on Facial Recognition Systems  23
IdDecoder: A Face Embedding Inversion Tool and its Privacy a...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Minh-Ha Le Carlsson, Niklas Linkoping Univ Linkoping Sweden
Most state-of-the-art facial recognition systems (FRS:s) use face embeddings. In this paper, we present the IdDecoder framework, capable of effectively synthesizing realistic-neutralized face images from face embeddin... 详细信息
来源: 评论
SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand  23
SCAtt-man: Side-Channel-Based Remote Attestation for Embedde...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Surminski, Sebastian Niesler, Christian Linsner, Sebastian Davi, Lucas Reuter, Christian Univ Duisburg Essen Essen Germany Tech Univ Darmstadt Darmstadt Germany
From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely th... 详细信息
来源: 评论
All Your IoT Devices Are Belong to Us: securityWeaknesses in IoT Management Platforms  23
All Your IoT Devices Are Belong to Us: SecurityWeaknesses in...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Tejaswi, Bhaskar Mannan, Mohammad Youssef, Amr Concordia Univ Montreal PQ Canada
IoT devices have become an integral part of our day to day activities, and are also being deployed to fulfil a number of industrial, enterprise and agricultural use cases. To efficiently manage and operate these devic... 详细信息
来源: 评论
ELSEIR: A privacy-Preserving Large-Scale Image Retrieval Framework for Outsourced data Sharing  24
ELSEIR: A Privacy-Preserving Large-Scale Image Retrieval Fra...
收藏 引用
4th Annual International conference on Multimedia Retrieval (ICMR)
作者: Tang, Zixin Fan, Haihui Gu, Xiaoyan Li, Yang Li, Bo Wang, Xin Chinese Acad Sci Univ Chinese Acad Sci Inst Informat Engn Sch Cyber SecurKey Lab Cyberspace Secur Def Beijing Peoples R China Chinese Acad Sci Inst Informat Engn Key Lab Cyberspace Secur Def Beijing Peoples R China China Mobile Informat Technol Ctr Shenzhen Peoples R China
privacy-preserving content-based image retrieval aims to safeguard the security of outsourced private images while maintaining their searchability. However, existing schemes encounter challenges in striking a balance ... 详细信息
来源: 评论
GROTE: Group Testing for privacy-Preserving Face Identification  23
GROTE: Group Testing for Privacy-Preserving Face Identificat...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Ibarrondo, Alberto Chabanne, Herve Despiegel, Vincent Onen, Melek Idemia Paris France EURECOM Sophia Antipolis France
This paper proposes a novel method to perform privacy-preserving face identification based on the notion of group testing, and applies it to a solution using the Cheon-Kim-Kim-Song (CKKS) homomorphic encryption scheme... 详细信息
来源: 评论