已选(0)清除
条数/页: 排序方式:
|
| Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. 期刊论文 International Journal of Communication Systems, 2018, 卷号: Vol.31 No.1 作者: Chen,GC; Arain,QA; Chen,L; Memon,I; Memon,H
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:13/0  |  提交时间:2019/12/24
|
| Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification 期刊论文 IEEE Security and Privacy, 2017, 页码: 1 作者: AleksanderEssex
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:7/0  |  提交时间:2019/12/24
|
| Enforcing Differential Privacy for Shared Collaborative Filtering 期刊论文 IEEE Access, 2017, 卷号: Vol.5, 页码: 35-49 作者: JingBi; QingWang; JianqiangLi; YuZhao; Ji-JiangYang
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:10/0  |  提交时间:2019/12/24
|
| Policy Rationales for Electronic Information Systems: An Area of Ambiguity 期刊论文 The British Journal of Social Work, 2017, 卷号: Vol.47 No.5, 页码: 1500-1516 作者: JochenDevlieghere; RudiRoose; LieveBradt
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
|
| Анализ изменения сущности понятия «Финансовая криптография» на основе 20-летней тематики международной конференции «Financial cryptography and data security»:Текст научной статьи по специальности «Экономика и экономические науки» 期刊论文 Статистика и экономика, 2016, 卷号: No.4 作者: ВАРФОЛОМЕЕВАЛЕКСАНДРАЛЕКСЕЕВИЧ
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
|
| New Victorian protective data security standards roll-out: Will you be at the table? 期刊论文 IQ: The RIM Quarterly, 2016, 卷号: Vol.32 No.2, 页码: 16-19 作者: Toohey,Alison
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:8/0  |  提交时间:2019/12/24
|
| Conception of EGNOS Integrity Data Utilization in ENC Systems 期刊论文 TransNav : International Journal on Marine Navigation and Safety of Sea Transportation, 2016, 卷号: Vol.10 No.3, 页码: 389-393 作者: MateuszBilewski; PawelZalewski
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:9/0  |  提交时间:2019/12/24
|
| The fate of 'privacy' in an automated society 期刊论文 Pandora's Box, 2016, 页码: 75-81 作者: Richardson,Megan
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
|
| A CONCEPTUAL MODEL FOR MANAGING PROTECTION INFORMATION RESOURCE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM 期刊论文 Modeling of systems and processes Моделирование систем и процессов, 2016, 卷号: Vol.8, 页码: 23-27 作者: L.Obuhova; E.Rogozin; I.Zastrognov
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:1/0  |  提交时间:2019/12/24
|
| What can lawyers do to protect themselves from cyber crime? 期刊论文 Bulletin (Law Society of South Australia), 2016, 卷号: Vol.38 No.9, 页码: 14-15 作者: Derkley,Karin
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
|