[1] |
LIANG Deng.
The legal boundaries of targeting advertising applications for privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(7): 66-75.
|
[2] |
CHAI Di.
A survey of threshold homomorphic encryption application in privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(7): 82-86.
|
[3] |
YAN Shu, LYU Ailin.
Overview of the development of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(6): 1-11.
|
[4] |
YUAN Bo, WANG Siyuan.
Privacy preserving computing product evaluation system
[J]. Information and Communications Technology and Policy, 2021, 47(6): 12-18.
|
[5] |
XIA Jiajun, LU Ying, ZHANG Ziyang, ZHANG Yuting, ZHANG Jiachen.
Research on vertical federated learning based on secret sharing and homomorphic encryption
[J]. Information and Communications Technology and Policy, 2021, 47(6): 19-26.
|
[6] |
FU Fangcheng, HOU Chen, CHENG Yong, TAO Yangyu.
Key technology and innovation of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(6): 27-37.
|
[7] |
XU Qian, ZHANG Qing, YU Bo, YU Wenqing, HE Wei.
Middleware and blockchain based interconnecting system of heterogeneous privacy preserving computing platforms
[J]. Information and Communications Technology and Policy, 2021, 47(6): 38-49.
|
[8] |
HUANG Cuiting, ZHANG Fan, SUN Xiaochao, BIAN Yang.
A survey of Private Set Intersection technology and finance practice
[J]. Information and Communications Technology and Policy, 2021, 47(6): 50-.
|
[9] |
QIANG Feng, XUE Yushan, XIANG Mei.
Privacy preserving computing in the financial field
[J]. Information and Communications Technology and Policy, 2021, 47(6): 57-62.
|
[10] |
YANG Zhengjun, ZHANG Guohua, SHI Yuxia, GAO Fuping.
Research on the problems of digital advertising identifier and countermeasures
[J]. Information and Communications Technology and Policy, 2021, 47(3): 41-48.
|
[11] |
CHE Lijun, TIAN Bo, ZHANG Huazhi, WU Jiawei.
Practice of privacy protection for telecommunications users
[J]. Information and Communications Technology and Policy, 2021, 47(2): 68-73.
|
[12] |
TAN Qingling, XIE Lijing.
Analysis of the data security risk of Internet of Vehicles and the solutions
[J]. Information and Communications Technology and Policy, 2020, 46(8): 37-40.
|
[13] |
YANG Chunbaixue, CHEN Tian.
Epidemic response and data protection in Europe and America
[J]. Information and Communications Technology and Policy, 2020, 46(8): 63-67.
|
[14] |
WANG Yanyan, GUI Li, CAI Yafen.
Research on the evaluation of user data protection of IoV
[J]. Information and Communications Technology and Policy, 2020, 46(8): 68-71.
|
[15] |
WANG Chen, SONG Liang.
Research on data security protection system of Industrial Internet
[J]. Information and Communications Technology and Policy, 2020, 46(4): 7-11.
|