| [1] |
WEI Tao, PAN Wuqiong, LI Tingting, WEI Zhenqiang.
Trusted-environment-based privacy preserving computing: breaks the bottleneck of ciphertext-exchange era
[J]. Information and Communications Technology and Policy, 2022, 48(5): 15-24.
|
| [2] |
LYU Ailin, YAN Shu.
Some thoughts on cross-platform interconnection of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2022, 48(5): 2-6.
|
| [3] |
ZHOU Jianping, ZHENG Peitian, WANG Yunhe, JIN Chen, SHI Dai.
A brief analysis of the impact of privacy preserving computation on data capitalization flow patterns
[J]. Information and Communications Technology and Policy, 2022, 48(5): 25-33.
|
| [4] |
FU Fangcheng, LIU Shu, CHENG Yong, TAO Yangyu.
Vertical federated logistic regression via homomorphic encryption and secret sharing
[J]. Information and Communications Technology and Policy, 2022, 48(5): 34-44.
|
| [5] |
WANG Xue, LI Wulu, LI Yuan, HE Linfang, LIU Chunwei, LI Sisi.
Analysis of privacy preserving computing in inclusive finance
[J]. Information and Communications Technology and Policy, 2022, 48(5): 53-59.
|
| [6] |
CHENG Rufan, WANG Lin, GUO Lanting, ZHENG Hao, SUN Qi, LI Zhi, WANG Shuang.
Applications of privacy preserving computing in biomedical areas
[J]. Information and Communications Technology and Policy, 2022, 48(5): 60-67.
|
| [7] |
KAN Xinyu.
Current situation and enlightenment of data governance standardization
[J]. Information and Communications Technology and Policy, 2022, 48(2): 2-7.
|
| [8] |
LING Chao.
Analysis of “data trust”: based on dual perspectives of data governance and data capitalization
[J]. Information and Communications Technology and Policy, 2022, 48(2): 22-28.
|
| [9] |
LI Xueni, QIN Shukai.
Research on the construction of data security governance capability evaluation framework
[J]. Information and Communications Technology and Policy, 2022, 48(2): 37-41.
|
| [10] |
GONG Shiran, LIU Xuehua.
Research and analysis of data security governance
[J]. Information and Communications Technology and Policy, 2022, 48(2): 42-46.
|
| [11] |
XIAO Wenbin, LI Yufei, ZHANG Zhanmei.
Exploration of big data platform for operators based on DataOps
[J]. Information and Communications Technology and Policy, 2022, 48(2): 55-60.
|
| [12] |
ZHANG Yuming, ZHANG Qiwei.
Research on data integration of large group enterprises
[J]. Information and Communications Technology and Policy, 2022, 48(2): 61-66.
|
| [13] |
FU Shan, DENG Zhengbao, YU Peng.
On “authenticity” of data quality and the related integrated data computing strategies
[J]. Information and Communications Technology and Policy, 2022, 48(2): 8-15.
|
| [14] |
HUANG Dengxi, PAN Xuefang.
Research and practice of data asset value calculation
[J]. Information and Communications Technology and Policy, 2022, 48(2): 29-36.
|