[1] |
HU Jian, ZHANG Lintao, CHAI Hua, ZHENG Liang, HE Chengfei.
Exploration of privacy-preserving computation combined with supercomputing
[J]. Information and Communications Technology and Policy, 2023, 49(6): 79-83.
|
[2] |
FANG Jing, ZHOU Yongkai, BIAN Yang, WANG Qi, DING Yadan.
Practices and thoughts on privacy-preserving computation under the basic data system
[J]. Information and Communications Technology and Policy, 2023, 49(4): 48-58.
|
[3] |
ZHANG Zhaolong, XIE Jiang, BAO Hongyu.
Thoughts on data security compliance governance in telecommunication field
[J]. Information and Communications Technology and Policy, 2023, 49(2): 14-19.
|
[4] |
LI Yufeng, LIU Qi, WEI Liang.
Considerations on data security of Internet of Vehicles
[J]. Information and Communications Technology and Policy, 2023, 49(2): 2-8.
|
[5] |
HU Guohua, WANG Zhendong, LIU Shaoyu, LI Qiang.
Government data security compliance analysis and innovation practice
[J]. Information and Communications Technology and Policy, 2023, 49(2): 20-29.
|
[6] |
JU Xin, CAO Jing, CHEN Fozhong, LIU Wenmao, HU Zhonghua.
Application and security research of privacy computing in health industry
[J]. Information and Communications Technology and Policy, 2023, 49(2): 43-48.
|
[7] |
FENG Shiduo, GAO Jingjie, LI Shenzhi, YAO Nanwei.
Research on the evolution trend of ICT supply chain security system
[J]. Information and Communications Technology and Policy, 2023, 49(2): 49-53.
|
[8] |
PIAO Hongguo, LIU Minghui.
Research on the target framework and implementation scheme of data security compliance system construction
[J]. Information and Communications Technology and Policy, 2023, 49(2): 58-64.
|
[9] |
LIANG Qing.
Middle platform of data security builds the lifeline of enterprise data
[J]. Information and Communications Technology and Policy, 2023, 49(2): 92-96.
|
[10] |
ZHANG Bin, WEN Nuan, QIU Qin, ZHOU Ying, LI Wenqi.
Research and practice of data security management in information and communication enterprises
[J]. Information and Communications Technology and Policy, 2022, 48(8): 19-23.
|
[11] |
LIU Xin, CAO Jing, SHAO Zhijie, ZHOU Yuefeng.
Anti-ransomware research based on data storage technologies
[J]. Information and Communications Technology and Policy, 2022, 48(8): 36-42.
|
[12] |
WANG Wei, CAO Jing, CHENG Geng, LI Xueying.
Research on reducing the impact of automated decision on personal information security
[J]. Information and Communications Technology and Policy, 2022, 48(8): 52-58.
|
[13] |
WEI Kai, YAN Shu, LYU Ailin.
An overview on the market-based allocation of data factor
[J]. Information and Communications Technology and Policy, 2022, 48(8): 59-64.
|
[14] |
ZHOU Bohui, YU Le, MA Yusheng, PAN Jiali.
Patent situation analysis of data security technology
[J]. Information and Communications Technology and Policy, 2022, 48(7): 87-91.
|
[15] |
GUO Zhen, LI Shuaizheng.
Thinking on the path of accelerating the development of digital economy based on artificial intelligence
[J]. Information and Communications Technology and Policy, 2022, 48(6): 69-74.
|