咨询与建议

限定检索结果

文献类型

  • 122 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 125 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 102 篇 工学
    • 75 篇 计算机科学与技术...
    • 48 篇 网络空间安全
    • 16 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 电子科学与技术(可...
    • 11 篇 信息与通信工程
    • 10 篇 仪器科学与技术
    • 6 篇 机械工程
    • 4 篇 电气工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 纺织科学与工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 公安技术
  • 24 篇 管理学
    • 24 篇 管理科学与工程(可...
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 125 篇 privacy protecti...
  • 16 篇 blockchain
  • 10 篇 隐私保护
  • 10 篇 federated learni...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 security
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 3 篇 data integrity
  • 3 篇 homomorphic encr...
  • 3 篇 data sharing
  • 3 篇 sgx
  • 3 篇 iot
  • 3 篇 machine learning
  • 3 篇 trust
  • 2 篇 internet of thin...
  • 2 篇 secret sharing
  • 2 篇 personalized fed...
  • 2 篇 deep learning

机构

  • 6 篇 information secu...
  • 5 篇 school of inform...
  • 3 篇 college of compu...
  • 3 篇 department of ma...
  • 3 篇 hainan blockchai...
  • 2 篇 school of comput...
  • 2 篇 beijing key labo...
  • 2 篇 college of infor...
  • 2 篇 state key labora...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 key laboratory o...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 college of compu...
  • 1 篇 zte corporation ...
  • 1 篇 beijing key labo...
  • 1 篇 school of comput...

作者

  • 5 篇 gang xu
  • 3 篇 xin liu
  • 3 篇 jieren cheng
  • 3 篇 xiu-bo chen
  • 3 篇 song cheng
  • 2 篇 liehuang zhu
  • 2 篇 haseeb ahmad
  • 2 篇 yixian yang
  • 2 篇 peng weiping
  • 2 篇 xiubo chen
  • 2 篇 shiyuan xu
  • 2 篇 jun li
  • 2 篇 ke xiao
  • 2 篇 shui yu
  • 2 篇 deng ruyi
  • 2 篇 yibo cao
  • 2 篇 naixue xiong
  • 2 篇 yu yang
  • 2 篇 youliang tian
  • 2 篇 wei zhang

语言

  • 103 篇 英文
  • 22 篇 中文
检索条件"主题词=Privacy protection"
125 条 记 录,以下是1-10 订阅
排序:
privacy protection Smartcard Authentication Scheme in Cloud Computing
收藏 引用
Chinese Journal of Electronics 2018年 第1期27卷 41-45页
作者: FAN Kai DENG Hai LI Hui YANG Yintang State Key Laboratory of Integrated Service Networks Xidian University
Cloud computing provides users with a great deal of flexibility and convenience. However, cloud computing also brings very serious security problems, especially for enterprise data security stored in the *** the data ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
privacy protection for Medical Images Based on DenseNet and Coverless Steganography
收藏 引用
Computers, Materials & Continua 2020年 第9期64卷 1797-1817页
作者: Yun Tan Jiaohua Qin Hao Tang Xuyu Xiang Ling Tan Neal NXiong College of Computer Science and Information Technology Central South University of Forestry&TechnologyChangsha410114China The Second Xiangya Hospital of Central South University Changsha410011China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464USA
With the development of the internet of medical things(IoMT),the privacy protection problem has become more and more *** this paper,we propose a privacy protection scheme for medical images based on DenseNet and cover... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
privacy protection Algorithm for the Internet of Vehicles Based on Local Differential privacy and Game Model
收藏 引用
Computers, Materials & Continua 2020年 第8期64卷 1025-1038页
作者: Wenxi Han Mingzhi Cheng Min Lei Hanwen Xu Yu Yang Lei Qian Guizhou Provincial Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China College of New Media Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science The University of AucklandAucklandNew Zealand
In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly *** research on the privacy protection of the I... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
privacy protection Based Access Control Scheme in Cloud-Based Services
收藏 引用
China Communications 2017年 第1期14卷 61-71页
作者: Kai Fan Qiong Tian Junxiong Wang Hui Li Yintang Yang State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an710071China Key Lab.of the Minist.of Educ.for Wide Band-Gap Semiconductor Materials and Devices Xidian UniversityXi'an710071China
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 645-654页
作者: Xu Li Gwanggil Jeon Wenshuo Wang Jindong Zhao School of Computer and Control Engineering Yantai UniversityYantai264005China Department of Embedded Systems Engineering Incheon National UniversityAcademyro-119Incheon22012Republic of Korea
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A privacy protection Strategy for Source Location in WSN Based on Angle and Dynamical Adjustment of Node Emission Radius
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 1064-1072页
作者: JIA Zongpu WEI Xiaojuan GUO Hairu PENG Weiping SONG Cheng College of Computer Science and Technology Henan Polytechnic University
We propose two novel methods to improve the source location privacy security protection and the node energy utilization in Wireless sensor networks(WSN).A privacy preservation protocol for source location in WSN based... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Achieving adaptively secure data access control with privacy protection for lightweight IoT devices
收藏 引用
Science China(Information Sciences) 2021年 第6期64卷 144-157页
作者: Zhitao GUAN Wenti YANG Liehuang ZHU Longfei WU Ruimiao WANG School of Control and Computer Engineering North China Electric Power University School of Computer Beijing Institute of Technology Department of Mathematics and Computer Science Fayetteville State University
The Internet of things(IoT) technology has been used in a wide range of fields, ranging from industrial manufacturing to daily lives. The IoT system contains numerous resource-constrained lightweight devices such as w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Differential privacy protection Protocol Based on Location Entropy
收藏 引用
Tsinghua Science and Technology 2023年 第3期28卷 452-463页
作者: Ping Guo Baopeng Ye Yuling Chen Tao Li Yixian Yang Xiaobin Qian Xiaomei Yu State Key Laboratory of Public Big Data School of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Information Technology Innovation Service Center of Guizhou Province Guiyang 550025China School of Cyberspace Security Beijing University of Posts and TelecommnuicationsBeijing 100000China Guizhou CoVision Science&Technology Co. Ltd.Guiyang 550025China School of Information Science and Engineering Shandong Normal UniversityJinan 250000China
A Location-Based Service(LBS)refers to geolocation-based services that bring both convenience and *** an increase in the scale and value of data,most existing location privacy protection protocols cannot balance priva... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Research on k-anonymity privacy protection scheme based on bilinear pairings
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2018年 第5期25卷 12-19页
作者: Song Cheng Zhang Yadong Wang Lei Liu Zhizhong College of Computer Science and Technology ( Software College) Henan Polytechnic University
Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Blockchain privacy protection Based on Post Quantum Threshold Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第7期76卷 957-973页
作者: Faguo Wu Bo Zhou Jie Jiang Tianyu Lei Jiale Song Institute of Artificial Intelligence Beihang UniversityBeijing100191China Zhongguancun Laboratory Beijing100094China Key Laboratory of Mathematics Informatics and Behavioral Semantics(LMIB)Beihang UniversityBeijing100191China Bejing Advanced Innovation Center for Future Blockchain and privacy Computing Beihang UniversityBeijing100191China LMIB and School of Mathematical Sciences Beihang UniversityBeijing100191China
With the rapid increase in demand for data trustworthiness and data security,distributed data storage technology represented by blockchain has received unprecedented *** technologies have been suggested for various us... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论