[1] |
WEI Tao, PAN Wuqiong, LI Tingting, WEI Zhenqiang.
Trusted-environment-based privacy preserving computing: breaks the bottleneck of ciphertext-exchange era
[J]. Information and Communications Technology and Policy, 2022, 48(5): 15-24.
|
[2] |
LYU Ailin, YAN Shu.
Some thoughts on cross-platform interconnection of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2022, 48(5): 2-6.
|
[3] |
JIA Xuan, BAI Yuzhen, MA Zhihua.
Overview of privacy preserving computing application scenarios
[J]. Information and Communications Technology and Policy, 2022, 48(5): 45-52.
|
[4] |
CHENG Rufan, WANG Lin, GUO Lanting, ZHENG Hao, SUN Qi, LI Zhi, WANG Shuang.
Applications of privacy preserving computing in biomedical areas
[J]. Information and Communications Technology and Policy, 2022, 48(5): 60-67.
|
[5] |
YANG Jingshi, WANG Siyuan, YUAN Bo, LIU Jiaxi.
Research on the standardization of performance measurement of privacy preserving computing products
[J]. Information and Communications Technology and Policy, 2022, 48(5): 7-14.
|
[6] |
HAN Zongda, DENG Yutao, CHENG Xiang.
A survey on oblivious keyword search
[J]. Information and Communications Technology and Policy, 2022, 48(5): 82-90.
|
[7] |
ZHANG Xi, AN Zhen.
Consideration and suggestions on the development of digital inclusive finance for small and medium-sized banks
[J]. Information and Communications Technology and Policy, 2022, 48(3): 82-85.
|
[8] |
ZHANG Yuming, ZHANG Qiwei.
Research on data integration of large group enterprises
[J]. Information and Communications Technology and Policy, 2022, 48(2): 61-66.
|
[9] |
Zhigang WANG, Zhengfu JIN.
Promoting the high-quality development of digital economy with the construction of digital public finance
[J]. Information and Communications Technology and Policy, 2022, 48(1): 32-36.
|
[10] |
ZHAO Jingwu, ZHOU Ruijue .
Privacy preserving computing: the construction of synchronization rules for data flow and data security
[J]. Information and Communications Technology and Policy, 2021, 47(7): 53-.
|
[11] |
LIANG Deng.
The legal boundaries of targeting advertising applications for privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(7): 66-75.
|
[12] |
CHAI Di.
A survey of threshold homomorphic encryption application in privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(7): 82-86.
|
[13] |
YAN Shu, LYU Ailin.
Overview of the development of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(6): 1-11.
|
[14] |
YUAN Bo, WANG Siyuan.
Privacy preserving computing product evaluation system
[J]. Information and Communications Technology and Policy, 2021, 47(6): 12-18.
|
[15] |
XIA Jiajun, LU Ying, ZHANG Ziyang, ZHANG Yuting, ZHANG Jiachen.
Research on vertical federated learning based on secret sharing and homomorphic encryption
[J]. Information and Communications Technology and Policy, 2021, 47(6): 19-26.
|