-
1
Evaluation method of privacy protection effect based on multi-layer fuzzy comprehensive evaluation
Published 2020-12-01Subjects: “…privacy protection…”
Get full text
Article -
2
Study on Standardization of Privacy Protection in Network Environment
Published 2013-04-01Subjects: Get full text
Article -
3
Securing guarantee of the blockchain network:attacks and countermeasures
Published 2021-01-01Subjects: Get full text
Article -
4
Efficient and safe auditable mixed-coin service scheme based on blind signature
Published 2020-08-01Subjects: Get full text
Article -
5
A survey on key technologies of privacy protection for machine learning
Published 2020-11-01Subjects: Get full text
Article -
6
A novel approach for face privacy protection based on surveillance video in complex scene
Published 2021-01-01Subjects: “…face privacy protection…”
Get full text
Article -
7
Federated Reinforcement Learning in Stock Trading Execution: The FPPO Algorithm for Information Security
Published 2025-01-01Subjects: Get full text
Article -
8
Provable secure mutual authentication protocol for RFID in the standard model
Published 2013-04-01Subjects: Get full text
Article -
9
Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology
Published 2020-02-01Subjects: Get full text
Article -
10
An exploration of the influencing factors of privacy fatigue among mobile social media users from the configuration perspective
Published 2025-01-01Subjects: Get full text
Article -
11
Secure communication mechanism for VSN based on certificateless signcryption
Published 2021-07-01Subjects: Get full text
Article -
12
Progress of research on privacy protection for data publication and data mining
Published 2016-01-01Subjects: “…privacy protection…”
Get full text
Article -
13
-
14
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01Subjects: Get full text
Article -
15
-
16
Survey of big-data-analysis-resistant privacy protection
Published 2016-04-01Subjects: “…privacy protection…”
Get full text
Article -
17
Location privacy preserving scheme against attack from friends in SNS
Published 2016-10-01Subjects: Get full text
Article -
18
Location-semantic-based location privacy protection for road network
Published 2016-08-01Subjects: Get full text
Article -
19
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01Subjects: Get full text
Article -
20
Research on ciphertext search and sharing technology in edge computing mode
Published 2022-04-01Subjects: Get full text
Article