咨询与建议

限定检索结果

文献类型

  • 120 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 125 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 74 篇 计算机科学与技术...
    • 46 篇 网络空间安全
    • 14 篇 控制科学与工程
    • 14 篇 软件工程
    • 13 篇 电子科学与技术(可...
    • 9 篇 信息与通信工程
    • 8 篇 仪器科学与技术
    • 6 篇 机械工程
    • 4 篇 电气工程
    • 2 篇 测绘科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 纺织科学与工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 21 篇 管理学
    • 21 篇 管理科学与工程(可...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 地球物理学
    • 1 篇 系统科学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 125 篇 privacy protecti...
  • 16 篇 blockchain
  • 10 篇 隐私保护
  • 10 篇 federated learni...
  • 7 篇 access control
  • 6 篇 data security
  • 6 篇 security
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 3 篇 data integrity
  • 3 篇 homomorphic encr...
  • 3 篇 data sharing
  • 3 篇 sgx
  • 3 篇 iot
  • 3 篇 machine learning
  • 3 篇 trust
  • 2 篇 internet of thin...
  • 2 篇 secret sharing
  • 2 篇 personalized fed...
  • 2 篇 deep learning

机构

  • 6 篇 information secu...
  • 5 篇 school of inform...
  • 3 篇 hainan blockchai...
  • 3 篇 department of ma...
  • 2 篇 school of comput...
  • 2 篇 college of infor...
  • 2 篇 school of comput...
  • 2 篇 state key labora...
  • 2 篇 beijing key labo...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 key laboratory o...
  • 2 篇 college of compu...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 college of compu...
  • 1 篇 school of econom...
  • 1 篇 beijing key labo...
  • 1 篇 jinan university...

作者

  • 5 篇 gang xu
  • 3 篇 xin liu
  • 3 篇 jieren cheng
  • 3 篇 xiu-bo chen
  • 3 篇 song cheng
  • 2 篇 liehuang zhu
  • 2 篇 haseeb ahmad
  • 2 篇 yixian yang
  • 2 篇 peng weiping
  • 2 篇 xiubo chen
  • 2 篇 shiyuan xu
  • 2 篇 jun li
  • 2 篇 ke xiao
  • 2 篇 shui yu
  • 2 篇 deng ruyi
  • 2 篇 yibo cao
  • 2 篇 naixue xiong
  • 2 篇 yu yang
  • 2 篇 youliang tian
  • 2 篇 wei zhang

语言

  • 103 篇 英文
  • 22 篇 中文
检索条件"主题词=privacy protection"
125 条 记 录,以下是1-10 订阅
排序:
privacy protection Smartcard Authentication Scheme in Cloud Computing
收藏 引用
Chinese Journal of Electronics 2018年 第1期27卷 41-45页
作者: FAN Kai DENG Hai LI Hui YANG Yintang State Key Laboratory of Integrated Service Networks Xidian University
Cloud computing provides users with a great deal of flexibility and convenience. However, cloud computing also brings very serious security problems, especially for enterprise data security stored in the *** the data ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
privacy protection for Medical Images Based on DenseNet and Coverless Steganography
收藏 引用
Computers, Materials & Continua 2020年 第9期64卷 1797-1817页
作者: Yun Tan Jiaohua Qin Hao Tang Xuyu Xiang Ling Tan Neal NXiong College of Computer Science and Information Technology Central South University of Forestry&TechnologyChangsha410114China The Second Xiangya Hospital of Central South University Changsha410011China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464USA
With the development of the internet of medical things(IoMT),the privacy protection problem has become more and more *** this paper,we propose a privacy protection scheme for medical images based on DenseNet and cover... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
privacy protection Algorithm for the Internet of Vehicles Based on Local Differential privacy and Game Model
收藏 引用
Computers, Materials & Continua 2020年 第8期64卷 1025-1038页
作者: Wenxi Han Mingzhi Cheng Min Lei Hanwen Xu Yu Yang Lei Qian Guizhou Provincial Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China College of New Media Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science The University of AucklandAucklandNew Zealand
In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly *** research on the privacy protection of the I... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
privacy protection Based Access Control Scheme in Cloud-Based Services
收藏 引用
China Communications 2017年 第1期14卷 61-71页
作者: Kai Fan Qiong Tian Junxiong Wang Hui Li Yintang Yang State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an710071China Key Lab.of the Minist.of Educ.for Wide Band-Gap Semiconductor Materials and Devices Xidian UniversityXi'an710071China
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 645-654页
作者: Xu Li Gwanggil Jeon Wenshuo Wang Jindong Zhao School of Computer and Control Engineering Yantai UniversityYantai264005China Department of Embedded Systems Engineering Incheon National UniversityAcademyro-119Incheon22012Republic of Korea
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A privacy protection Strategy for Source Location in WSN Based on Angle and Dynamical Adjustment of Node Emission Radius
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 1064-1072页
作者: JIA Zongpu WEI Xiaojuan GUO Hairu PENG Weiping SONG Cheng College of Computer Science and Technology Henan Polytechnic University
We propose two novel methods to improve the source location privacy security protection and the node energy utilization in Wireless sensor networks(WSN).A privacy preservation protocol for source location in WSN based... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Achieving adaptively secure data access control with privacy protection for lightweight IoT devices
收藏 引用
Science China(Information Sciences) 2021年 第6期64卷 144-157页
作者: Zhitao GUAN Wenti YANG Liehuang ZHU Longfei WU Ruimiao WANG School of Control and Computer Engineering North China Electric Power University School of Computer Beijing Institute of Technology Department of Mathematics and Computer Science Fayetteville State University
The Internet of things(IoT) technology has been used in a wide range of fields, ranging from industrial manufacturing to daily lives. The IoT system contains numerous resource-constrained lightweight devices such as w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Differential privacy protection Protocol Based on Location Entropy
收藏 引用
Tsinghua Science and Technology 2023年 第3期28卷 452-463页
作者: Ping Guo Baopeng Ye Yuling Chen Tao Li Yixian Yang Xiaobin Qian Xiaomei Yu State Key Laboratory of Public Big Data School of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Information Technology Innovation Service Center of Guizhou Province Guiyang 550025China School of Cyberspace Security Beijing University of Posts and TelecommnuicationsBeijing 100000China Guizhou CoVision Science&Technology Co. Ltd.Guiyang 550025China School of Information Science and Engineering Shandong Normal UniversityJinan 250000China
A Location-Based Service(LBS)refers to geolocation-based services that bring both convenience and *** an increase in the scale and value of data,most existing location privacy protection protocols cannot balance priva... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Research on k-anonymity privacy protection scheme based on bilinear pairings
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2018年 第5期25卷 12-19页
作者: Song Cheng Zhang Yadong Wang Lei Liu Zhizhong College of Computer Science and Technology ( Software College) Henan Polytechnic University
Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Redundant Data Detection and Deletion to Meet privacy protection Requirements in Blockchain-Based Edge Computing Environment
收藏 引用
China Communications 2024年 第3期21卷 149-159页
作者: Zhang Lejun Peng Minghui Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin Cyberspace Institute Advanced Technology Guangzhou UniversityGuangzhou 510006China College of Information Engineering Yangzhou UniversityYangzhou 225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou 362000China Computer Science Department City University of Hong KongHong Kong 999077China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 21004China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei 230601China Department of Computer Science and Artificial Intelligence Wenzhou UniversityWenzhou 325035China Guangzhou University Library Guangzhou UniversityGuangzhou 510006China Central Economic and Mathematics Institute Russian Academy of Sciences MIREA-Russian Technological University Moscow RegionRussia
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论