已选(0)清除
条数/页: 排序方式:
|
| Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. 期刊论文 International Journal of Communication Systems, 2018, 卷号: Vol.31 No.1 作者: Chen,GC; Arain,QA; Chen,L; Memon,I; Memon,H 收藏  |  浏览/下载:13/0  |  提交时间:2019/12/24
|
| Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States 学位论文 : Queensland University of Technology, 2017 作者: Watt,JamesRobert 收藏  |  浏览/下载:4/0  |  提交时间:2019/12/24
|
| Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification 期刊论文 IEEE Security and Privacy, 2017, 页码: 1 作者: AleksanderEssex 收藏  |  浏览/下载:7/0  |  提交时间:2019/12/24
|
| 10. International Cybersecurity Law 期刊论文 Cybersecurity Law, 2017, 页码: 339-359 作者: JeffKosseff 收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
|
| Enforcing Differential Privacy for Shared Collaborative Filtering 期刊论文 IEEE Access, 2017, 卷号: Vol.5, 页码: 35-49 作者: JingBi; QingWang; JianqiangLi; YuZhao; Ji-JiangYang 收藏  |  浏览/下载:10/0  |  提交时间:2019/12/24
|
| Health Information Law 期刊论文 The Oxford Handbook of U.S. Health Law, 2017 作者: FrankPasquale 收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
|
| The fate of 'privacy' in an automated society 期刊论文 Pandora's Box, 2016, 页码: 75-81 作者: Richardson,Megan 收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
|
| Retos de la legislación informática en México 期刊论文 Computación y Sistemas, 2016, 卷号: Vol.20 No.4, 页码: 827-831 作者: ArgüellesArellano,MaríadelConsuelo 收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
|
| Chapter 7 – Computer Security, Data Protection, and Privacy Issues 期刊论文 Clinical Research Computing, 2016, 页码: 143-158 作者: PrakashNadkarni 收藏  |  浏览/下载:4/0  |  提交时间:2019/12/24
|
| Multi-authority security framework for scalable EHR systems 期刊论文 International Journal of Medical Engineering and Informatics, 2016, 卷号: Vol.8 No.4, 页码: 390-408 作者: YiMu; FatemehRezaeibagha; WillySusilo; KhinThanWin 收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
|