-
1
Research on multi-party security collaborative linear regression for computing power networks
Published 2024-08-01Subjects: Get full text
Article -
2
Research on data encryption system and technology for cloud storage
Published 2020-08-01Subjects: Get full text
Article -
3
Virtualization Security, Key Issues of Public Cloud Computing Security
Published 2015-12-01Subjects: Get full text
Article -
4
Application of generative adversarial networks for financial data
Published 2024-06-01Subjects: Get full text
Article -
5
Research on the Entered Business Model of Telecom Customer Behavior Tagged Data
Published 2013-11-01Subjects: Get full text
Article -
6
Data security and protection techniques in big data:a survey
Published 2016-04-01Subjects: Get full text
Article -
7
Research on Information Security Mechanism Used in Network Video Surveillance System
Published 2013-08-01Subjects: Get full text
Article -
8
Exploration and practice of data classification and grading based on DSMM
Published 2024-11-01Subjects: Get full text
Article -
9
-
10
Big data architecture analysis and data security fusion technology
Published 2020-07-01Subjects: Get full text
Article -
11
Enhancing data security and protection in marketing: a comparative analysis of Golang and PHP approaches
Published 2023-11-01Subjects: “…data security…”
Get full text
Article -
12
-
13
Research on Security Connotation and Response Strategies for Big Data
Published 2014-02-01Subjects: “…ig data security…”
Get full text
Article -
14
Design keyed Hash function based on couple chaotic system
Published 2006-01-01Subjects: “…data security…”
Get full text
Article -
15
Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia
Published 2025-02-01Subjects: Get full text
Article -
16
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01Subjects: Get full text
Article -
17
Private data access control model based on block chain technology in the internet of things environment
Published 2022-12-01Subjects: Get full text
Article -
18
-
19
Two new color (n, n)-secret sharing schemes
Published 2007-01-01Subjects: “…data security…”
Get full text
Article -
20
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01Subjects: Get full text
Article