工学 >>> 力学 农业工程 林业工程 工程与技术科学基础学科 测绘科学技术 材料科学 矿山工程技术 石油与天然气工程 冶金工程技术 机械工程 光学工程 仪器科学与技术 动力与电气工程 能源科学技术 核科学技术 电子科学与技术 信息与通信工程 控制科学与技术 计算机科学技术 化学工程 纺织科学技术 印刷工业 服装工业、制鞋工业 轻工技术与工程 食品科学技术 土木建筑工程 水利工程 交通运输工程 船舶与海洋工程 航空、航天科学技术 兵器科学与技术 环境科学技术 安全科学技术 工业设计
搜索结果: 16-30 共查到工学 privacy相关记录47条 . 查询时间(0.079 秒)
As the world grows more social and connects more online, privacy management is becoming more collaborative, according to Penn State researchers."This is a paradigm shift, in a lot of ways, because mos...
Researchers at the Harvard John A. Paulson School of Engineering and Applied Sciences have developed a technique that can quickly change the opacity of a window, turning it cloudy, clear or...
The promise of big data lies in researchers' ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the world.These data may be generated b...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generate...
We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without either party revealing any other information about their location. We describe several secure protocols t...
Personal privacy devices (PPDs) are low-cost jammers to mask GPS signals, so that the location of the host vehicle is not revealed to other parties. Although it is illegal to use PPDs in the United St...
Using baseball as a metaphor, this practical, engaging session will explore the security and privacy risks with a number of technologies for storing, handling and communicating health information and ...
Individuals are increasingly encouraged to share private information with service providers. Privacy is relaxed to increase the utility of the data for the provider. This dissertation offers an altern...
Private data analysis on statistical data has been addressed by many recent literatures. The goal of such analysis is to measure statistical properties of a database without revealing information of i...
A growing number of information retrieval applications rely on search behavior aggregated over many users. If aggregated data such as search query reformulations is not handled properly, it can allow ...
The parallel trends of greater energy-efficiency and more aggressive power management are yielding computers that inch closer to energy-proportional computing with every generation. Energy-proportiona...
In the era of big data, the prospect of analyzing, monitoring and investigating all sources of data starts to stand out in every aspect of our life. The benefit of such practices becomes concrete only...
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
PITTSBURGH—Web services companies, such as Facebook, Google and Microsoft, all make promises about how they will use personal information they gather. But ensuring that millions of lines of code in th...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...