工学 >>> 计算机科学技术 >>> 计算机科学技术基础学科 人工智能 计算机系统结构 计算机软件 计算机工程 计算机应用 计算机科学技术其他学科
搜索结果: 1-15 共查到计算机科学技术 privacy相关记录31条 . 查询时间(0.146 秒)
Cornell Tech researchers have developed a mechanism for preserving anonymity in encrypted messaging – which conceals message content but might not cloak the sender’s identity – while simultaneously bl...
Whether you’re using the same old phone, or you received a new smartphone as a holiday gift, the last thing you want to do is put yourself — and your personal information — at risk. Vitaly Shmatikov, ...
2018年,题为"Privacy Protection for E-health Systems Using Dynamic Authentication and Three-factor Key Agreement" 论文刊发在国际权威期刊《IEEE Transactions on Industrial Electronics》上。该文第一作者为中国地质大学计算机学院章丽平副教授。该文对电子医疗...
The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend s...
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and pra...
As we are deep into the Information Age, we also witness the explosive growth of data available on the Internet. Human beings have created quintillion bytes of data every day, which come from sensors,...
To many people, smartphones have been an indispensable part of daily life and work. With personal financial and medical information and job related data being processed on smartphones and related mobi...
Welcome to the official website of the 2017 International Conference on Cryptography, Security and Privacy, ICCSP 2017, will be held during March 17-19, 2017, in Wuhan, China. ICCSP 2017, aims to bri...
How a mobile app says it will collect or share a user’s personal information with third parties often appears to be inconsistent with how the app actually behaves, a new automated analysis system deve...
Chalk up one more task a smartphone app may do better than you: figuring out your privacy settings.A field study suggests that a personalized privacy assistant app being developed at Carnegie Mellon U...
As the world grows more social and connects more online, privacy management is becoming more collaborative, according to Penn State researchers."This is a paradigm shift, in a lot of ways, because mos...
The promise of big data lies in researchers' ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the world.These data may be generated b...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generate...
We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without either party revealing any other information about their location. We describe several secure protocols t...
Using baseball as a metaphor, this practical, engaging session will explore the security and privacy risks with a number of technologies for storing, handling and communicating health information and ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...