全部 |
  • 全部
  • 题名
  • 关键词
  • NSTL主题词
  • 摘要
  • 会议名称
  • 论文-出处
  • 论文-作者
  • 论文-机构
  • 论文-DOI
  • 会议-出版者
  • 会议-出版地
  • 会议-主编
  • 会议-主办单位
  • 会议-举办地
  • ISSN
  • EISSN
  • ISBN
  • EISBN
检索 搜索会议录 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Efficient Zero-Knowledge Argument for Bilinear Matrix Relation over the Residue Ring NSTL国家科技图书文献中心

Yuan Tian |  Yongda Pang -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 87~105 - 共19页

摘要:In private computing applications various data |  relations can be represented by or reduced to some matrix |  relations. In addition, the residue ring Z_m is one of the |  most widely used arithmetic systems in practice. One |  of the main challenges in constructing zero
关键词: Zero-Knowledge |  Bilinear matrix equation |  ∑-Protocol |  Residue ring |  Galois ring

2. Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration NSTL国家科技图书文献中心

Zi Jiao |  Fucai Zhou... -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 3~21 - 共19页

摘要:Manufacturing collaboration is dedicated to |  interconnecting formerly isolated factories under the drive of |  projects to enhance production efficiency. However, some |  data contains privacy concerns, and legal disputes |  among collaborating factories that are common. In this
关键词: Industrial collaboration |  Privacy preserving |  Searchable encryption |  Integrity |  Blockchain |  Proof

3. Cross-Chain Asset Trading Scheme Without Trusted Third-Party NSTL国家科技图书文献中心

Bo Li |  Yuling Chen... -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 39~51 - 共13页

摘要:The development of blockchain technology is |  influenced by user diversity and application scenarios | , resulting in limitations on the applicability of assets | . Although cloud computing is renowned for facilitating |  cross-chain token transfers, it lacks a robust trust
关键词: Cross-chain |  Relay chain |  Asset transactions

4. SSINsAuth: Fast Batch Handover Authentication Protocol in Space-Sea Integrated Networks NSTL国家科技图书文献中心

Jingwei Song |  Xuru Li... -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 141~159 - 共19页

摘要:Low Earth Orbit (LEO) satellite constellations |  are well-suited for space-sea integrated networks |  (SSINs) due to their low communication latency and |  worldwide coverage. These constellations serve as the |  first line of defense in ensuring the information
关键词: LEO satellite network |  Batch handover authentication |  Pedersen commitment |  Pre-authentication

5. In-Context Learning with Differentially Private Text Sanitization in Large Language Models NSTL国家科技图书文献中心

Jiluan Fan |  Pei-Gen Ye... -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 294~303 - 共10页

摘要:With the increasing popularity of cloud-based |  large language models, users often inadvertently input |  text containing personal information during |  interactions, leading to significant privacy concerns. To |  address this challenge, we propose an in-context
关键词: In-Context learning |  Differential privacy |  Large language model

6. Social Media User Geolocation Based on Large Language Models NSTL国家科技图书文献中心

Meng Zhang |  Xiangyang Luo... -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 304~312 - 共9页

摘要:In the digital age, social media platforms |  have amassed a wealth of user-generated content | , which contains valuable geographic information | . However, the irregularities and noise in user-generated |  text, have led to suboptimal performance in
关键词: Social media |  User-generated text |  Unsupervised user geolocation |  Large language model

7. Secure Key Exchange via Transparent Reverse Firewalls NSTL国家科技图书文献中心

Jiahao Liu |  Jinshu Su... -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 160~177 - 共18页

摘要:In this work, we study secure authenticated |  key exchange (AKE) protocols in a scenario where an |  adversary subverts the implementation of honest parties in |  an undetectable manner, thereby gaining access to |  confidential information. Mironov and Stephens-Davidowitz
关键词: Subversion resilience |  Authenticated key exchange |  Security model |  Partnering

8. Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intrusion Detection NSTL国家科技图书文献中心

Kazi Fatema |  Mehrin Anannya... -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 260~275 - 共16页

摘要:In the constantly evolving field of |  cybersecurity, safeguarding sensitive data from hazardous |  incidents is critical. Traditional intrusion detection |  systems (IDS) frequently rely on centralized data |  gathering and processing, which raises privacy and
关键词: Intrusion detection |  Deep learning |  Explainable AI |  Federated learning

9. An Efficient Threshold Ring Signature from G+G Identification Protocol NSTL国家科技图书文献中心

Chunhui Wu |  Siwei Jiang... -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 211~221 - 共11页

摘要:Threshold ring signature confirms that t |  signers are participating in the signature and keep them |  anonymous. It is a generalization of ring signature, and |  has many important applications such as whistle | -blower, e-voting and blockchain et al. In this paper
关键词: Lattice-based cryptography |  Threshold ring signature |  Gaussian convolution |  Fiat-Shamir heuristic |  Blockchain

10. UltraCommander: Ultrasonic Side Channel Attack via Browser Extensions NSTL国家科技图书文献中心

Yingli Duan |  Weizhi Meng... -  《Data Security and Privacy Protection,Part I》 -  International Conference on Data Security and Privacy Protection - 2025, - 195~210 - 共16页

摘要:Ultrasound, imperceptible to the human ear | , emerges as a potent carrier of information. Exploiting |  its covert nature, a growing number of both |  malicious entities and researchers delve into its |  potential privacy threats. Simultaneously, the surge in
关键词: Ultrasound |  Side-channel attack |  Chrome extension |  User privacy |  Audio output
检索条件出处:Data Security and Privacy Protection,Part I

NSTL主题词

  • NSTL学科导航