咨询与建议

限定检索结果

文献类型

  • 39 篇 会议
  • 7 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 29 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 7 篇 信息与通信工程
    • 6 篇 网络空间安全
    • 4 篇 环境科学与工程(可...
    • 3 篇 电气工程
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
    • 2 篇 轻工技术与工程
    • 2 篇 生物工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 6 篇 理学
    • 3 篇 数学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...

主题

  • 6 篇 cryptography
  • 5 篇 mobile communica...
  • 5 篇 privacy
  • 4 篇 access control
  • 4 篇 ecosystems
  • 4 篇 security
  • 3 篇 context
  • 3 篇 malware
  • 3 篇 mobile handsets
  • 2 篇 data privacy
  • 2 篇 roads
  • 2 篇 medical services
  • 2 篇 databases
  • 2 篇 mathematical mod...
  • 1 篇 smds
  • 1 篇 global positioni...
  • 1 篇 tls
  • 1 篇 data security
  • 1 篇 reinforcement le...
  • 1 篇 registers

机构

  • 5 篇 distributed comp...
  • 3 篇 distributed comp...
  • 3 篇 distributed comp...
  • 2 篇 huazhong univers...
  • 2 篇 distributed comp...
  • 2 篇 distributed comp...
  • 2 篇 faculty of elect...
  • 2 篇 cluster and grid...
  • 2 篇 department of ee...
  • 2 篇 distributed comp...
  • 2 篇 hubei key labora...
  • 2 篇 distributed comp...
  • 2 篇 distributed comp...
  • 2 篇 institute of cyb...
  • 2 篇 national enginee...
  • 2 篇 digital security...
  • 1 篇 distributed comp...
  • 1 篇 biomolecular mas...
  • 1 篇 distributed comp...
  • 1 篇 distributed comp...

作者

  • 23 篇 smith matthew
  • 16 篇 matthew smith
  • 11 篇 harbach marian
  • 8 篇 fahl sascha
  • 8 篇 henne benjamin
  • 6 篇 michael brenner
  • 6 篇 szongott christi...
  • 6 篇 muders thomas
  • 5 篇 marian harbach
  • 5 篇 brenner michael
  • 5 篇 benjamin henne
  • 4 篇 christian szongo...
  • 3 篇 perl henning
  • 3 篇 henning perl
  • 2 篇 thomas muders
  • 2 篇 luo bo
  • 2 篇 liang kaitai
  • 2 篇 sascha fahl
  • 2 篇 varadharajan v
  • 2 篇 susilo willy

语言

  • 47 篇 英文
检索条件"机构=Distributed Computing and Security Group"
47 条 记 录,以下是11-20 订阅
排序:
Efficient abstraction selection in reinforcement learning
Efficient abstraction selection in reinforcement learning
收藏 引用
10th Symposium on Abstraction, Reformulation, and Approximation, SARA 2013
作者: Van Seijen, Harm Whiteson, Shimon Kester, Leon Department of Computing Science University of Alberta Edmonton Canada Informatics Institute University of Amsterdam Amsterdam Netherlands Distributed Sensor Systems Group TNO Defence Security and Safety The Hague Netherlands
This paper introduces a novel approach for abstraction selection in reinforcement learning problems modelled as factored Markov decision processes (MDPs), for which a state is described via a set of state components. ... 详细信息
来源: 评论
Selective cloaking: Need-to-know for location-based apps
Selective cloaking: Need-to-know for location-based apps
收藏 引用
Annual Conference on Privacy, security and Trust, PST
作者: Benjamin Henne Christian Kater Matthew Smith Michael Brenner Distributed Computing & Security Group Leibniz Universität Hannover Germany
Currently location privacy settings of mobile operating systems are limited to the option of enabling or disabling the use of location completely or on a per-app basis. When location use is allowed, users always revea... 详细信息
来源: 评论
WAHC 2013: Workshop on Applied Homomorphic Cryptography
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2013年 7862 LNCS卷 VIII页
作者: Brenner, Michael Smith, Matthew Leibniz Universität Hannover Distributed Computing and Security Group Schloßwender Straße 5 30159 Hanover Germany
来源: 评论
TrustSplit: Usable confidentiality for social network messaging  12
TrustSplit: Usable confidentiality for social network messag...
收藏 引用
23rd ACM Conference on Hypertext and Social Media, HT'12
作者: Fahl, Sascha Harbach, Marian Muders, Thomas Smith, Matthew Leibniz University of Hannover Distributed Computing and Security Group Hannover Germany
It is well known that online social networking sites (OSNs) such as Facebook pose risks to their users' privacy. OSNs store vast amounts of users' private data and activities and therefore subject the user to ... 详细信息
来源: 评论
All our messages are belong to us: Usable confidentiality in social networks
All our messages are belong to us: Usable confidentiality in...
收藏 引用
21st Annual Conference on World Wide Web, WWW'12
作者: Harbach, Marian Fahl, Sascha Muders, Thomas Smith, Matthew Distributed Computing and Security Group Leibniz University of Hannover Hannover Germany
Current online social networking (OSN) sites pose severe risks to their users' privacy. Facebook in particular is capturing more and more of a user's past activities, sometimes starting from the day of birth. ... 详细信息
来源: 评论
Practical applications of homomorphic encryption
Practical applications of homomorphic encryption
收藏 引用
International Conference on security and Cryptography, SECRYPT 2012
作者: Brenner, Michael Perl, Henning Smith, Matthew Distributed Computing Security Group Leibniz Universitt Hannover Hannover Germany
Homomorphic cryptography has been one of the most interesting topics of mathematics and computer security since Gentry presented the first construction of a fully homomorphic encryption (FHE) scheme in 2009. Since the... 详细信息
来源: 评论
How practical is homomorphically encrypted program execution? An implementation and performance evaluation
How practical is homomorphically encrypted program execution...
收藏 引用
11th IEEE International Conference on Trust, security and Privacy in computing and Communications, TrustCom-2012
作者: Brenner, Michael Perl, Henning Smith, Matthew Distributed Computing Security Group Leibniz Universität Hannover Germany
Homomorphic cryptography has received a lot of attention due to potentially ground breaking advances in cryptography. However it is also surrounded by a lot of hyperbole such as "ground breaking advances", &... 详细信息
来源: 评论
Mobile evil twin malnets - The worst of both worlds
Mobile evil twin malnets - The worst of both worlds
收藏 引用
11th International Conference on Cryptology and Network security, CANS 2012
作者: Szongott, Christian Henne, Benjamin Smith, Matthew Distributed Computing and Security Group Gottfried Wilhelm Leibniz University of Hannover Germany
The mobile computing world is undergoing major changes both in the capability as well as in the proliferation of mobile devices. While, up to now, mobile malware has played a relatively small role compared to the behe... 详细信息
来源: 评论
Evaluating the threat of epidemic mobile malware
Evaluating the threat of epidemic mobile malware
收藏 引用
2012 IEEE 8th International Conference on Wireless and Mobile computing, Networking and Communications, WiMob 2012
作者: Szongott, Christian Henne, Benjamin Smith, Matthew Distributed Computing and Security Group Gottfried Wilhelm Leibniz University of Hannover Germany
While mobile malware has played a relatively small role compared to the behemoth of desktop malware, the changes both in the capability as well as in the proliferation of the mobile devices will steadily increase the ... 详细信息
来源: 评论
Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions
Towards privacy-preserving access control with hidden polici...
收藏 引用
2012 10th Annual International Conference on Privacy, security and Trust, PST 2012
作者: Harbach, Marian Fahl, Sascha Brenner, Michael Muders, Thomas Smith, Matthew Distributed Computing and Security Group Leibniz University Hannover Schloßwender Str. 5 30159 Hannover Germany
The growing adoption of cloud technology in sensitive application domains, such as medicine, gives rise to new problems in maintaining the privacy of the involved parties during authorisation. In such domains, an hone... 详细信息
来源: 评论