[1] |
WANG Yanhong, KONG Ling, FU Yanyan, LI Jingdian.
Analysis and suggestions on the standardization path of privacy computing technology
[J]. Information and Communications Technology and Policy, 2024, 50(1): 32-36.
|
[2] |
ZHU Yue.
Practical difficulties and solutions of differential privacy for personal information protection
[J]. Information and Communications Technology and Policy, 2024, 50(1): 37-44.
|
[3] |
JIAO Zhiwei, WU Zhenghao, XU Yijia, WEI Fanxing.
Research and practice of decentralized digital identity authentication technology based on privacy protection
[J]. Information and Communications Technology and Policy, 2024, 50(1): 59-66.
|
[4] |
ZHOU Yijing, CUI Zhuo, HUANG Cuiting, LIN Wenzhen, CHEN Tao.
An innovative system of data element circulation based on knowledge federation
[J]. Information and Communications Technology and Policy, 2023, 49(6): 61-70.
|
[5] |
HU Jian, ZHANG Lintao, CHAI Hua, ZHENG Liang, HE Chengfei.
Exploration of privacy-preserving computation combined with supercomputing
[J]. Information and Communications Technology and Policy, 2023, 49(6): 79-83.
|
[6] |
FANG Jing, ZHOU Yongkai, BIAN Yang, WANG Qi, DING Yadan.
Practices and thoughts on privacy-preserving computation under the basic data system
[J]. Information and Communications Technology and Policy, 2023, 49(4): 48-58.
|
[7] |
JU Xin, CAO Jing, CHEN Fozhong, LIU Wenmao, HU Zhonghua.
Application and security research of privacy computing in health industry
[J]. Information and Communications Technology and Policy, 2023, 49(2): 43-48.
|
[8] |
DAI Weitao, YU Jinhao, TIAN Wensheng, FAN Jiafeng, WANG Zedong, LU Yifan, YAN Zhichao, TANG Panpan.
Database lifecycle protection method based on privacy calculation
[J]. Information and Communications Technology and Policy, 2023, 49(2): 65-74.
|
[9] |
LIU Naijia, GUO Jian, LI Haihua.
Research on application of privacy computing in distributed cognitive Industrial Internet
[J]. Information and Communications Technology and Policy, 2023, 49(11): 25-32.
|
[10] |
SHAO Hang, GAO Siqi, ZHONG Li, FU Zhihui, MENG Dan, LI Xiaolin.
Homomorphic encryption protocols and applications in privacy preserving computation
[J]. Information and Communications Technology and Policy, 2022, 48(8): 75-88.
|
[11] |
WANG Wubing, LIU Bo, FAN Yuan, TAO Lifeng, XU Dongde.
A design and security analysis of the confidential computing architecture based on trusted execution environment
[J]. Information and Communications Technology and Policy, 2022, 48(8): 8-18.
|
[12] |
WEI Tao, PAN Wuqiong, LI Tingting, WEI Zhenqiang.
Trusted-environment-based privacy preserving computing: breaks the bottleneck of ciphertext-exchange era
[J]. Information and Communications Technology and Policy, 2022, 48(5): 15-24.
|
[13] |
LYU Ailin, YAN Shu.
Some thoughts on cross-platform interconnection of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2022, 48(5): 2-6.
|
[14] |
ZHOU Jianping, ZHENG Peitian, WANG Yunhe, JIN Chen, SHI Dai.
A brief analysis of the impact of privacy preserving computation on data capitalization flow patterns
[J]. Information and Communications Technology and Policy, 2022, 48(5): 25-33.
|
[15] |
JIA Xuan, BAI Yuzhen, MA Zhihua.
Overview of privacy preserving computing application scenarios
[J]. Information and Communications Technology and Policy, 2022, 48(5): 45-52.
|