[1] |
WEI Tao, PAN Wuqiong, LI Tingting, WEI Zhenqiang.
Trusted-environment-based privacy preserving computing: breaks the bottleneck of ciphertext-exchange era
[J]. Information and Communications Technology and Policy, 2022, 48(5): 15-24.
|
[2] |
JIA Xuan, BAI Yuzhen, MA Zhihua.
Overview of privacy preserving computing application scenarios
[J]. Information and Communications Technology and Policy, 2022, 48(5): 45-52.
|
[3] |
WANG Xue, LI Wulu, LI Yuan, HE Linfang, LIU Chunwei, LI Sisi.
Analysis of privacy preserving computing in inclusive finance
[J]. Information and Communications Technology and Policy, 2022, 48(5): 53-59.
|
[4] |
CHENG Rufan, WANG Lin, GUO Lanting, ZHENG Hao, SUN Qi, LI Zhi, WANG Shuang.
Applications of privacy preserving computing in biomedical areas
[J]. Information and Communications Technology and Policy, 2022, 48(5): 60-67.
|
[5] |
YANG Jingshi, WANG Siyuan, YUAN Bo, LIU Jiaxi.
Research on the standardization of performance measurement of privacy preserving computing products
[J]. Information and Communications Technology and Policy, 2022, 48(5): 7-14.
|
[6] |
HAN Zongda, DENG Yutao, CHENG Xiang.
A survey on oblivious keyword search
[J]. Information and Communications Technology and Policy, 2022, 48(5): 82-90.
|
[7] |
Zelin LU, Yan CHEN.
The theoretical connotation, realistic challenges, and practical path on marketization for data
[J]. Information and Communications Technology and Policy, 2022, 48(1): 11-18.
|
[8] |
ZHAO Jingwu, ZHOU Ruijue .
Privacy preserving computing: the construction of synchronization rules for data flow and data security
[J]. Information and Communications Technology and Policy, 2021, 47(7): 53-.
|
[9] |
LIANG Deng.
The legal boundaries of targeting advertising applications for privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(7): 66-75.
|
[10] |
CHAI Di.
A survey of threshold homomorphic encryption application in privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(7): 82-86.
|
[11] |
YAN Shu, LYU Ailin.
Overview of the development of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(6): 1-11.
|
[12] |
YUAN Bo, WANG Siyuan.
Privacy preserving computing product evaluation system
[J]. Information and Communications Technology and Policy, 2021, 47(6): 12-18.
|
[13] |
XIA Jiajun, LU Ying, ZHANG Ziyang, ZHANG Yuting, ZHANG Jiachen.
Research on vertical federated learning based on secret sharing and homomorphic encryption
[J]. Information and Communications Technology and Policy, 2021, 47(6): 19-26.
|
[14] |
FU Fangcheng, HOU Chen, CHENG Yong, TAO Yangyu.
Key technology and innovation of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(6): 27-37.
|
[15] |
XU Qian, ZHANG Qing, YU Bo, YU Wenqing, HE Wei.
Middleware and blockchain based interconnecting system of heterogeneous privacy preserving computing platforms
[J]. Information and Communications Technology and Policy, 2021, 47(6): 38-49.
|