| [1] |
LI XiaoLong, ZHANG Su, LYU Ailin.
Research on mechanism and countermeasures of accelerating the process of industrial digitalization driven by data elements
[J]. Information and Communications Technology and Policy, 2024, 50(4): 79-84.
|
| [2] |
GE Sifan, HAN Jianyang, DU Chunxiang, WANG Juntao.
Research and practice on the construction of data element authorization operation platform for telecom operators
[J]. Information and Communications Technology and Policy, 2024, 50(4): 85-90.
|
| [3] |
SHANG Runan, CHEN Wei, SUN Wei, XIE Xining.
Research on telecom operators’ data element authorization mechanism
[J]. Information and Communications Technology and Policy, 2024, 50(4): 91-96.
|
| [4] |
WANG Yanhong, KONG Ling, FU Yanyan, LI Jingdian.
Analysis and suggestions on the standardization path of privacy computing technology
[J]. Information and Communications Technology and Policy, 2024, 50(1): 32-36.
|
| [5] |
JU Xin, CAO Jing, CHEN Fozhong, LIU Wenmao, HU Zhonghua.
Application and security research of privacy computing in health industry
[J]. Information and Communications Technology and Policy, 2023, 49(2): 43-48.
|
| [6] |
LIU Naijia, GUO Jian, LI Haihua.
Research on application of privacy computing in distributed cognitive Industrial Internet
[J]. Information and Communications Technology and Policy, 2023, 49(11): 25-32.
|
| [7] |
WANG Wubing, LIU Bo, FAN Yuan, TAO Lifeng, XU Dongde.
A design and security analysis of the confidential computing architecture based on trusted execution environment
[J]. Information and Communications Technology and Policy, 2022, 48(8): 8-18.
|
| [8] |
WEI Tao, PAN Wuqiong, LI Tingting, WEI Zhenqiang.
Trusted-environment-based privacy preserving computing: breaks the bottleneck of ciphertext-exchange era
[J]. Information and Communications Technology and Policy, 2022, 48(5): 15-24.
|
| [9] |
CHENG Rufan, WANG Lin, GUO Lanting, ZHENG Hao, SUN Qi, LI Zhi, WANG Shuang.
Applications of privacy preserving computing in biomedical areas
[J]. Information and Communications Technology and Policy, 2022, 48(5): 60-67.
|
| [10] |
HUANG Dengxi, PAN Xuefang.
Research and practice of data asset value calculation
[J]. Information and Communications Technology and Policy, 2022, 48(2): 29-36.
|
| [11] |
LEI Lei.
Research on the current situation and development trend of data security
[J]. Information and Communications Technology and Policy, 2022, 48(10): 69-74.
|
| [12] |
Yuxia SHI.
Data element market situation, problems and suggestions
[J]. Information and Communications Technology and Policy, 2022, 48(1): 19-23.
|
| [13] |
YUAN Bo, WANG Siyuan.
Privacy preserving computing product evaluation system
[J]. Information and Communications Technology and Policy, 2021, 47(6): 12-18.
|
| [14] |
SUN Ke.
Problems and reflections on the development of value of data elements
[J]. Information and Communications Technology and Policy, 2021, 47(6): 63-67.
|
| [15] |
HE Wei.
Overview of China's digital economy development
[J]. Information and Communications Technology and Policy, 2021, 47(2): 1-7.
|