搜索资源列表
15629.11白皮书
- gb15629.11 whitepaper is for china wlan standard authentication and privacy
Stateoftheartinprivacypreservingdatamining
- 基于隐私保护的数据挖掘是数据库技术重要的一部分,本文是对其发展的概述。-Privacy protection based on data mining is an important part of database technology, this article is an overview of their development.
WAPI
- WAPI是WLAN Authentication and Privacy Infrastructure的英文缩写。-WAPI is the WLAN Authentication and Privacy Infrastructure abbreviation.
department_2008
- a ppt file describe privacy protected visual surveillance , a survey of all existed methods on provacy preserving visual surveillance
aa
- 实现开机前的登录密码,保护个人的信息不流失,很好的保护个人隐私,公司的机密-Achieve pre-boot password log in, the protection of personal information is not lost, good protection of personal privacy, the company s confidential
v30-185
- protocol of the gsm.Privacy in New Mobile Payment Protocol
USB
- USB隐私大公开,USB概念、基础知识以及未来发展状况-USB Privacy open to the public, USB concepts, basic knowledge, and future developments
1
- 在线社会网络信息检索,一篇PAPER,关于如何提取人物信息的算法与思想的实现。-Information Revelation and Privacy in Online SocialNetworks
2
- People have difficulty remembering multiple passwords. This results in reduced security as users reuse the same password for different systems or reveal other passwords as they try to log in. It can also lead to reduced privacy, as users may
Cryptography_Developers
- Cryptography for developers eBook by Tom St Denis, Simon Johnson. -Special examples of Cryptography goals: Privacy, Integrity, Authentication -Full Discussion of Large Integer Arithmetic, Public Key Algoritms
r
- Investigating Privacy-Sensitive Features for Speech Detection in Multiparty Conversations (2)
microsoft-spy
- 微软产品隐私监控方案,包含架构规范及详细记录-Privacy Survalence Solution for Microsoft Products, Architecture and detailed information included
PROVIDING-PRIVACY-PRESERVING-IN-CLOUD-COMPUTING.r
- IT Auditing to Assure a Secure Cloud Computing Aim:- Securing private data in a cloud. Existing System:- Securing data in a cloud is not done in the existing system. The administrator will remove the data of a private user without intimatin
PAM-AN-EFFICIENT-AND-PRIVACY-AWARE-MONITORING-FRA
- PAM AN EFFICIENT AND PRIVACY-AWARE MONITORING FRAMEWORK FOR CONTINUOUSLY MOVING OBJECTS.rar
Personal-Privacy-Device-Interference-in-the-WAAS.
- The Federal Aviation Administration (FAA) Wide Area Augmentation System (WAAS) Monitoring Team has investigated increases in Radio Frequency Interference (RFI) events observed since 2009. The Oklahoma City-based WAAS Monitoring Team initially observe
data-privacy(1)
- data privacy is the area where we can secure once personal information
Privacy-in-Social-Networks
- It is a presentation related to privacy in social networks.
Privacy---in-social-network-sites
- 社交网络隐私策略内容分享与保护,最新行业动态,权威顶级期刊论文-Content sharing social network privacy policy and protection, the latest industry developments, the authority' s top Papers
Incentive-Compatible-Privacy-Preserving-Data
- Incentive Compatible Privacy-Preserving Data Analysis
Gmatch-Secure-and-Privacy-Preserving-Group-Matchi
- Gmatch Secure and Privacy-Preserving Group Matching in Social Networks