咨询与建议

限定检索结果

文献类型

  • 3 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 1 篇 信息与通信工程
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...

主题

  • 1 篇 public key crypt...
  • 1 篇 game theory
  • 1 篇 network security
  • 1 篇 location based s...

机构

  • 1 篇 dept. of maths s...
  • 1 篇 vanderbilt unive...
  • 1 篇 centre for compu...
  • 1 篇 shanghai key lab...
  • 1 篇 department of ma...
  • 1 篇 unesco chair in ...
  • 1 篇 unesco in data p...
  • 1 篇 utd data securit...
  • 1 篇 key lab. of aero...
  • 1 篇 key lab. of aero...
  • 1 篇 universitat rovi...
  • 1 篇 wuhan university...
  • 1 篇 xi'an university...

作者

  • 3 篇 domingo-ferrer j...
  • 2 篇 zhang lei
  • 2 篇 qin bo
  • 2 篇 wu qianhong
  • 1 篇 qianhong wu
  • 1 篇 vorobeychik yevg...
  • 1 篇 susilo willy
  • 1 篇 yi mu
  • 1 篇 bo qin
  • 1 篇 kantarcioglu mur...

语言

  • 4 篇 英文
检索条件"机构=UTD Data Security and Privacy Lab."
4 条 记 录,以下是1-10 订阅
排序:
Adversarial machine learning
收藏 引用
Synthesis Lectures on Artificial Intelligence and Machine Learning 2018年 第3期12卷 1-169页
作者: Vorobeychik, Yevgeniy Kantarcioglu, Murat Vanderbilt University Department of Computer Science Computer Engineering and Biomedical Informatics United States UTD Data Security and Privacy Lab. University of Texas Dallas United States
The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks i... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Hierarchical certificateless signatures
Hierarchical certificateless signatures
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Zhang, Lei Wu, Qianhong Domingo-Ferrer, Josep Qin, Bo UNESCO in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain Wuhan University School of Computer Key Lab. of Aerospace Information Security and Trusted Computing China Xi'an University of Technology School of Science Department of Maths China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
Asymmetric group key agreement
Asymmetric group key agreement
收藏 引用
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009
作者: Qianhong, Wu Yi, Mu Susilo, Willy Bo, Qin Domingo-Ferrer, Josep Universitat Rovira i Virgili Dept. of Comp. Eng. and Maths UNESCO Department of Data Privacy Tarragona Catalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing School of Computer Wuhan University China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Dept. of Maths School of Science Xi'an University of Technology China
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m... 详细信息
来源: 评论