咨询与建议

限定检索结果

文献类型

  • 39 篇 会议
  • 7 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 29 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 8 篇 信息与通信工程
    • 7 篇 网络空间安全
    • 4 篇 环境科学与工程(可...
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 轻工技术与工程
    • 2 篇 生物工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 6 篇 理学
    • 3 篇 数学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...

主题

  • 6 篇 cryptography
  • 5 篇 mobile communica...
  • 5 篇 privacy
  • 4 篇 access control
  • 4 篇 ecosystems
  • 4 篇 security
  • 3 篇 context
  • 3 篇 malware
  • 3 篇 mobile handsets
  • 2 篇 data privacy
  • 2 篇 roads
  • 2 篇 medical services
  • 2 篇 databases
  • 2 篇 mathematical mod...
  • 1 篇 smds
  • 1 篇 global positioni...
  • 1 篇 contribution eva...
  • 1 篇 tls
  • 1 篇 data security
  • 1 篇 reinforcement le...

机构

  • 5 篇 distributed comp...
  • 3 篇 distributed comp...
  • 3 篇 distributed comp...
  • 2 篇 huazhong univers...
  • 2 篇 distributed comp...
  • 2 篇 distributed comp...
  • 2 篇 faculty of elect...
  • 2 篇 cluster and grid...
  • 2 篇 department of ee...
  • 2 篇 distributed comp...
  • 2 篇 hubei key labora...
  • 2 篇 distributed comp...
  • 2 篇 distributed comp...
  • 2 篇 institute of cyb...
  • 2 篇 national enginee...
  • 2 篇 digital security...
  • 1 篇 distributed comp...
  • 1 篇 biomolecular mas...
  • 1 篇 qilu university ...
  • 1 篇 distributed comp...

作者

  • 23 篇 smith matthew
  • 16 篇 matthew smith
  • 11 篇 harbach marian
  • 8 篇 fahl sascha
  • 8 篇 henne benjamin
  • 6 篇 michael brenner
  • 6 篇 szongott christi...
  • 6 篇 muders thomas
  • 5 篇 marian harbach
  • 5 篇 brenner michael
  • 5 篇 benjamin henne
  • 4 篇 christian szongo...
  • 3 篇 perl henning
  • 3 篇 henning perl
  • 2 篇 thomas muders
  • 2 篇 luo bo
  • 2 篇 liang kaitai
  • 2 篇 sascha fahl
  • 2 篇 varadharajan v
  • 2 篇 susilo willy

语言

  • 47 篇 英文
检索条件"机构=Distributed Computing and Security Group"
47 条 记 录,以下是1-10 订阅
排序:
TrustSplit: Usable confidentiality for social network messaging  12
TrustSplit: Usable confidentiality for social network messag...
收藏 引用
23rd ACM Conference on Hypertext and Social Media, HT'12
作者: Fahl, Sascha Harbach, Marian Muders, Thomas Smith, Matthew Leibniz University of Hannover Distributed Computing and Security Group Hannover Germany
It is well known that online social networking sites (OSNs) such as Facebook pose risks to their users' privacy. OSNs store vast amounts of users' private data and activities and therefore subject the user to ... 详细信息
来源: 评论
All our messages are belong to us: Usable confidentiality in social networks
All our messages are belong to us: Usable confidentiality in...
收藏 引用
21st Annual Conference on World Wide Web, WWW'12
作者: Harbach, Marian Fahl, Sascha Muders, Thomas Smith, Matthew Distributed Computing and Security Group Leibniz University of Hannover Hannover Germany
Current online social networking (OSN) sites pose severe risks to their users' privacy. Facebook in particular is capturing more and more of a user's past activities, sometimes starting from the day of birth. ... 详细信息
来源: 评论
Practical applications of homomorphic encryption
Practical applications of homomorphic encryption
收藏 引用
International Conference on security and Cryptography, SECRYPT 2012
作者: Brenner, Michael Perl, Henning Smith, Matthew Distributed Computing Security Group Leibniz Universitt Hannover Hannover Germany
Homomorphic cryptography has been one of the most interesting topics of mathematics and computer security since Gentry presented the first construction of a fully homomorphic encryption (FHE) scheme in 2009. Since the... 详细信息
来源: 评论
Rethinking SSL development in an appified world  13
Rethinking SSL development in an appified world
收藏 引用
2013 ACM SIGSAC Conference on Computer and Communications security, CCS 2013
作者: Fahl, Sascha Harbach, Marian Perl, Henning Koetter, Markus Smith, Matthew Distributed Computing and Security Group Leibniz University Hannover Hannover Germany
The Secure Sockets Layer (SSL) is widely used to secure data transfers on the Internet. Previous studies have shown that the state of non-browser SSL code is catastrophic across a large variety of desktop applications... 详细信息
来源: 评论
Hey, you, get off of my clipboard: On how usability trumps security in android password managers
Hey, you, get off of my clipboard: On how usability trumps s...
收藏 引用
17th International Conference on Financial Cryptography and Data security, FC 2013
作者: Fahl, Sascha Harbach, Marian Oltrogge, Marten Muders, Thomas Smith, Matthew Distributed Computing and Security Group Leibniz University of Hannover Hannover Germany
Password managers aim to help users manage their ever increasing number of passwords for online authentication. Since users only have to memorise one master secret to unlock an encrypted password database or key chain... 详细信息
来源: 评论
How practical is homomorphically encrypted program execution? An implementation and performance evaluation
How practical is homomorphically encrypted program execution...
收藏 引用
11th IEEE International Conference on Trust, security and Privacy in computing and Communications, TrustCom-2012
作者: Brenner, Michael Perl, Henning Smith, Matthew Distributed Computing Security Group Leibniz Universität Hannover Germany
Homomorphic cryptography has received a lot of attention due to potentially ground breaking advances in cryptography. However it is also surrounded by a lot of hyperbole such as "ground breaking advances", &... 详细信息
来源: 评论
Mobile evil twin malnets - The worst of both worlds
Mobile evil twin malnets - The worst of both worlds
收藏 引用
11th International Conference on Cryptology and Network security, CANS 2012
作者: Szongott, Christian Henne, Benjamin Smith, Matthew Distributed Computing and Security Group Gottfried Wilhelm Leibniz University of Hannover Germany
The mobile computing world is undergoing major changes both in the capability as well as in the proliferation of mobile devices. While, up to now, mobile malware has played a relatively small role compared to the behe... 详细信息
来源: 评论
Towards a mobile security & privacy simulator
Towards a mobile security & privacy simulator
收藏 引用
2nd IEEE International Conference on Open Systems, ICOS 2011
作者: Henne, Benjamin Szongott, Christian Smith, Matthew Distributed Computing and Security Group Leibniz Universität Hannover Hannover Germany
The proliferation and capabilities of mobile, networked devices is increasing rapidly and with this trend new threats to security and privacy are emerging at an alarming rate. The new threats are difficult to study an... 详细信息
来源: 评论
Evaluating the threat of epidemic mobile malware
Evaluating the threat of epidemic mobile malware
收藏 引用
2012 IEEE 8th International Conference on Wireless and Mobile computing, Networking and Communications, WiMob 2012
作者: Szongott, Christian Henne, Benjamin Smith, Matthew Distributed Computing and Security Group Gottfried Wilhelm Leibniz University of Hannover Germany
While mobile malware has played a relatively small role compared to the behemoth of desktop malware, the changes both in the capability as well as in the proliferation of the mobile devices will steadily increase the ... 详细信息
来源: 评论
SnapMe if you can: Privacy threats of other peoples' geo-tagged media and what we can do about it  13
SnapMe if you can: Privacy threats of other peoples' geo-tag...
收藏 引用
6th ACM Conference on security and Privacy in Wireless and Mobile Networks, WiSec 2013
作者: Henne, Benjamin Szongott, Christian Smith, Matthew Distributed Computing and Security Group Leibniz Universität Hannover Hannover Germany
The amount of media uploaded to the Web is still rapidly expanding. The ease-of-use of modern smartphones in combination with the proliferation of high-speed mobile networks facilitates a culture of spontaneous and of... 详细信息
来源: 评论