Privacy相关论文
The widespread use of mobile devices in digital community has promoted the variety of data collecting methods.However,th......
Tsinghua Science and Technology was started publication in 1996.It is an international academic journal sponsored by Tsi......
位置服务(Location Service)是由移动通信网络提供的一种增值业务,通过一组定位技术获得移动台的位置信息(如经纬度坐标数据),提供给......
A taxi company in shanghai has announced its plan to equip half of its fleet - about 6,000 taxis - with digital video rec......
We focus on security and privacy problems within a cloud database framework,exploiting the DataBase as a Service (DBaaS)......
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party com......
【Abstract】Reporting Snowden-related events is a tough test to the American media, for the coverage involves national im......
Enhanced Reconfigurable Intelligent Surface Assisted mmWave Communication: A Federated Learning Appr
...
In software-defined networking (SDN), controllers are sinks of information such as network topology collected from switc......
Wireless transmission is becoming increasing ubiquitous, but there is a big black hole in the security of this kind of n......
【前言】近日,记者电话采访了著名密码学家,上海交通大学电子信息与电气工程学院,计算机科学与工程系博士生导师来学嘉教授。来学......
2010年,社交网站受到数以亿计网民的追捧.在美国,社交网Facebook成为最大网站.互联网研究公司Hitwise于2010年3月发表的数据显示,......
随着信息技术在涉密单位的广泛应用,在提高工作效率的同时,也带来了许多“保密安全”问题,计算机信息防泄密问题愈加突出.目前从上......
蓝盾内网安全保密系统(BD-SECSYS)是由蓝盾信息安全技术股份有限公司自主研发的基于内网安全和防信息泄漏的内网安全集成系统。蓝......
[前言]本刊对于"网络战"的关注继续进行。本期,记者采访了国内著名信息安全专家曲成义。曲老为我们分析了全球网络战的现状和态势,......
一年之计在于春。虎年春节刚刚过去,十一届全国人大常委会第十三次会议便于2月24日在北京人民大会堂举行了第一次全体会议,其中一......
文中研究了移动终端数据安全的传统威胁以及云计算环境下的新挑战。首先从隐私泄露及资费流失等方面阐述了移动终端传统安全威胁;......
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生......
本文对计算机所包含的内容的特点进行分析,进而说明实际计算机搜查中启动条件的随意性、搜查对象的不确定性和司法审查的欠缺性,为......
Application of artificial intelligence in medicine: analysis of Chinese legal and regulatory landsca
Medical artificial intelligence (AI) in China is now on the eve of a massive surge. Despite great promise from this emer......
最早明确提出对隐私权保护的档案法规是1991年9月国家档案局、国家保密局联合颁发的.该规定第7条列举了20款“例外”,其中保护个人......
Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one......
一项的ISO技术指南有助于协调医疗保健中日益增长的电子化处理患者信患的需要与患者不断提升的保护隐私的要求之间的矛盾.......
Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mo
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7......
With the fast development of the technology, the media ethic has become a serious issues. This essay will mainly focus o......
Privacy and Intercultural Communication——Causes Behind Different Privacy of the Chinese and the Amer
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7......
【中图分类号】G2 【文献标识码】A 【文章编号】1007-4309(2011)04-0050-1.5 The rapid development of globalization ......
文中提出了一种为低成本RFID标签设计的双向认证协议,分析RFID系统可能存在的安全和隐私威胁,包括重放、冒充、后向和前向跟踪、异......
In pervasive computing environments, users can get services anytime and anywhere, but the ubiquity and mobility of the e......
空间K-匿名(spatial K-anonymity,SKA)是利用K-匿名的概念来保护用户免受基于位置的攻击.然而,现有的满足共匿性(reciprocity)要求......
...
Social networks are getting more and more attention in recent years. People join social networks to share their informat......
Online social networks (OSNs) have revolutionarily changed the way people connect with each other. One of the main facto......
Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms of transfer efficiency, many systems tr......
Privacy一词在英语中是一个十分重要的词汇,在西方文化中它体现了最基本的价位观即私人意识或隐私观念.隐私观在东西方文化中内涵......
Privacy protection in publishing set-valued data is an important problem.However,privacy notions proposed in prior works......
Privacy and Intercultural Communication——Causes Behind Different Privacy of the Chinese and the Amer
Chinese culture is featured by its “togethemess”,collectivism,and its agricultural tradition;while American culture is......
Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mo
Mobile Cloud Computing usually consists of front-end users who possess mobile devices and back-end cloud servers.This pa......
目的 了解深圳市某综合医院特需医疗服务中健康体检者(以下简称体检者)对隐私权的认知与隐私保护情况,探讨特需健康体检服务中提高......
我们认为,隐形标签、传感器和射频识别芯片等形式的纳米技术将在两个方面引发不同于过去几十年中传统意义上的隐私问题。一是它们将......
随着脑机接口技术不断发展,凸显出了一些新的问题,其中最为关键的是自主性问题,自主性主要考察自主行为,即个人能够根据自身理性做......
随着计算机网络应用的不断深化,诸如网络犯罪、网络民意和网络推手等网络社会管理问题逐渐显现,由此而产生的对以网络实名制来解决......
相关大数据技术的应用为疫情防控与治理提供了高效和扎实的技术基础,在重大疫情治理和防控的过程中,大数据技术既为疫情防控提供了......
<strong>Introduction:</strong> Healthcare industries have seen recent movements towards continuous quality improvement. ......
当代大数据驱动的生物医学研究,需要在采集、汇聚并共享利用研究参与者(患者)的大量敏感数据的基础上进行。这些数据可以来自不同......
对健康医疗大数据的数据挖掘、数据预测以及全方位的数字监控,使得个人隐私权控制困境凸显。大数据技术对个人隐私权控制的弱化、......
随着数字经济时代的到来,隐私保护问题越来越受到社会的关注。经济学是探讨隐私和个人数据问题的有力工具。从20世纪60年代开始,经......
标准必要专利建立的目的是为了推广技术,使得技术产品具有兼容性和统一性,避免资源浪费,提高生产效率。标准必要专利具有社会公共......