CORC

浏览/检索结果: 共13条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Verifiable speech retrieval algorithm based on KNN secure hashing 期刊论文
Multimedia Tools and Applications, 2022
作者:  An, Li;  Huang, Yi-bo;  Zhang, Qiu-yu
收藏  |  浏览/下载:18/0  |  提交时间:2022/09/22
Towards Comprehensive Support for Privacy Preservation Cross-Organization Business Process Mining 期刊论文
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 卷号: 12, 期号: 4, 页码: 639-653
作者:  Liu, Cong;  Duan, Hua;  Zeng, QingTian;  Zhou, MengChu;  Lu, Faming
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/11
How Does LBA Influence Privacy: the Content and Process 期刊论文
NEW THINKING FOR STRATEGY: GREEN, INNOVATION AND SHARING, 2017, 页码: 541-545
作者:  Li, Xiao
收藏  |  浏览/下载:4/0  |  提交时间:2019/02/25
An Effective Model for Anonymizing Personal Location Trajectory 会议论文
ICCNS2016, 新加坡
作者:  A S M Touhidul Hasan;  Qingshan Jiang;  Chengming Li;  Lifei Chen
收藏  |  浏览/下载:20/0  |  提交时间:2017/01/15
Medication administration quality and health information technology: a national study of US hospitals. 期刊论文
J Am Med Inform Assoc, 2012, 卷号: Vol.19 No.3, 页码: 360-367
作者:  AnthonyDL.;  AppariA;  JohnsonME;  CarianEK
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/04
A cloud-based bpm architecture with user-end distribution of non-compute-intensive activities and sensitive data 期刊论文
Journal of computer science and technology, 2010, 卷号: 25, 期号: 6, 页码: 1157-1167
作者:  Han, Yan-Bo;  Sun, Jun-Yi;  Wang, Gui-Ling;  Li, Hou-Fu
收藏  |  浏览/下载:17/0  |  提交时间:2019/05/10
A Cloud-Based BPM Architecture with User-End Distribution of Non-Compute-Intensive Activities and Sensitive Data 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 卷号: 25, 期号: 6, 页码: 1157-1167
作者:  Han, Yan-Bo;  Sun, Jun-Yi;  Wang, Gui-Ling;  Li, Hou-Fu
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/16
privacy preserving of trust management credentials based on trusted computing 会议论文
6th International Conference on Information Security Practice and Experience, ISPEC 2010, Seoul, Korea, Republic of, 43963
Wu Bin; Feng Dengguo; Duan Meijiao
收藏  |  浏览/下载:6/0  |  提交时间:2011/03/31
a privacy-preserving integrity measurement architecture 会议论文
3rd International Symposium on Electronic Commerce and Security, ISECS 2010, Guangzhou, China, 37466
Li Shang Jie; He Ye Ping
收藏  |  浏览/下载:8/0  |  提交时间:2011/03/31
分布式系统中的可信技术研究 学位论文
博士, 中国科学院软件研究所: 中国科学院研究生院, 2008
石志国
收藏  |  浏览/下载:13/0  |  提交时间:2011/03/17


©版权所有 ©2017 CSpace - Powered by CSpace