Privacy相关论文
The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless net-works(6G).Due t......
Double auction mechanisms have been designed to trade a variety of divisible resources (e.g.,electricity,mobile data,and......
Privacy preserving secure expansive aggregation with malicious node identification in linear wireles
The Wireless Sensor Networks(WSNs)used for the monitoring applications like pipelines carrying oil,water,and gas;perimet......
Recently,with the rapid development of Internet of Things(IoT),vehicular ad hoc network(VANET),as a typical application ......
SIV:A Structural Integrity Verification Approach of Cloud Components with Enhanced Privacy and Perfo
There are privacy leakage risks and degradation of performance when verifying the integrity of components with existing ......
As the use of online services has increased,many online vendors and service providers have attempted to improve services......
Purpose-This study aims to understand the impact of users privacy concerns on their acceptance of social networking web ......
A Large-Scale Heterogeneous Network(LS-HetNet)integrates different networks into one uniform network system to provide s......
A huge amount of sensitive personal data is being collected by various online health monitoring applications.Although th......
Permissionless blockchain,as a kind of distributed ledger,has gained considerable attention because of its openness,tran......
Fighting COVID-19 and Future Pandemics With the Internet of Things:Security and Privacy Perspectives
The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2(SARS-Co V-2; also referred to ......
Facial recognition technology has multiple functions and risks,and has been widely applied in China and India.The curren......
This paper presents a survey of technologies for personal data self-management interfacing with administrative and terri......
The growing popularity of users in online social network gives a big opportunity for online auction.The famous Informati......
Cloud computing is the delivery of computing and storage capacity as a service to users.Cloud storage,as a subservic......
Achieving data security and privacy in the cloud means ensuring confidentiality and integrity of data and computatio......
With the increasing popularity of the Internet and mobile Internet,the Virtual Community(VC) is becoming an important me......
Social networks are getting more and more attention in recent years.People join social networks to share their informati......
1.生日来临之际我奶奶过82岁的生日时,我送给她一份出人意料的礼物——一张由总统签名的生日贺卡。(根据规定,80岁以上的老年人可......
The widespread use of mobile devices in digital community has promoted the variety of data collecting methods.However,th......
J.K.Rowling has told the Leveson Inquiry1 that she has had to take action against newspapers about 50 times over breache......
Internet has penetrated into all the aspects of our life and work.We can study and work by it;we can find a job by it;we......
Tsinghua Science and Technology was started publication in 1996.It is an international academic journal sponsored by Tsi......
Temporal key integrity protocol(TKIP) is a sub-protocol of IEEE 802.11i.TKIP remedies some security flaws in wired equiv......
Security Mechanisms of Wired Equivalent Privacy and Wi-Fi Protected Access in WLAN:Review and Analys
An analysis of WLAN security mechanisms of wired equivalent privacy(WEP) and Wi-Fi protected access(WPA) discovers that ......
With the broad implementations of the electronic business and government applications,robust system security and strong ......
Deepened understanding of the mechanism involved in the activation of T cells and improved molecular biology techniques ......
位置服务(Location Service)是由移动通信网络提供的一种增值业务,通过一组定位技术获得移动台的位置信息(如经纬度坐标数据),提供给......
针对医院门诊存在的患者一般信息、病史、病情、检查结果的泄露,患者身体,特别是隐私部位暴露等患者隐私侵权现象进行分析,认为医......
Tiered Mobile Wireless Sensor Network(TMWSN)is a new paradigm introduced by mobile edge computing.Now it has received wi......
Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspective
The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; also referred to ......
闲言碎语与流言蜚语可能总是流传在你的学校或者社区周围,这是完全正常的。有时候,这无伤大雅;但有些时候,流言可能会对个人、友谊......
The slogan of the famous video site youtube.com is“Broadcast Yourself”. This site lets you subscribe to a“channel”—......
Freedom and privacy of correspon-dence are basic rights of a citizen to per-sonal freedom. According to Article 66 ofthe......
Iwould be lying if I told you that when,back in October, one of my studentspeered over the toilet stall door to wishme a......
Human Flesh Search and Protection of the Right to Privacy——Definition and protection of right to pri
Ⅰ When the network age just started,many netizens thought everything was virtual in the net.A man may vilify others in ......
A taxi company in shanghai has announced its plan to equip half of its fleet - about 6,000 taxis - with digital video rec......
你安装ICQ了吗?想不想让看你主页的人知道你的ICQ是否在线呢?方法是打开ICQ,选ICQ菜单中的“Security&privacy”,然后选中“Secur......
随着因特网上出现的一些小范围的电子选举,电子选举开始引起人们的关注.而电子选举中的关键技术之一是电子选举协议的设计,特别是......
Web search engines are very useful information service tools in the Internet. The current web search engines produce sea......
Along with the forthcoming of Google Earth,Virtual Earth,the next generation of Internet,Web 2.0,grid computing and smar......
In this paper, we propose a flexible location-based service (LBS) middleware framework to make the development and deplo......