咨询与建议

限定检索结果

文献类型

  • 22 篇 期刊文献
  • 19 篇 会议

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36 篇 工学
    • 31 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 6 篇 信息与通信工程
    • 6 篇 软件工程
    • 5 篇 控制科学与工程
    • 3 篇 石油与天然气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 网络空间安全
  • 6 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 理学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 1 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学

主题

  • 41 篇 privacy computin...
  • 9 篇 blockchain
  • 8 篇 homomorphic encr...
  • 4 篇 federated learni...
  • 3 篇 data security
  • 3 篇 data privacy
  • 3 篇 data sharing
  • 3 篇 privacy-preservi...
  • 3 篇 differential pri...
  • 3 篇 machine learning
  • 3 篇 cloud computing
  • 3 篇 convolutional ne...
  • 2 篇 vehicle dynamics
  • 2 篇 smart contracts
  • 2 篇 deep learning
  • 2 篇 secure multi-par...
  • 2 篇 zero-knowledge p...
  • 2 篇 fully homomorphi...
  • 2 篇 privacy preservi...
  • 2 篇 fully homomorphi...

机构

  • 2 篇 huaqiao univ col...
  • 2 篇 sun yat sen univ...
  • 2 篇 univ greenwich d...
  • 2 篇 sun yat sen univ...
  • 2 篇 chinese acad sci...
  • 2 篇 dalian univ tech...
  • 1 篇 delft univ techn...
  • 1 篇 wuhan univ techn...
  • 1 篇 xidian univ key ...
  • 1 篇 hong kong polyte...
  • 1 篇 beijing advanced...
  • 1 篇 department of co...
  • 1 篇 univ chinese aca...
  • 1 篇 engineering rese...
  • 1 篇 tianjin univ tec...
  • 1 篇 chongqing univ t...
  • 1 篇 school of comput...
  • 1 篇 gtiisc tmcc sysn...
  • 1 篇 department of el...
  • 1 篇 zhejiang univ pe...

作者

  • 3 篇 zhou junwei
  • 2 篇 liang kaitai
  • 2 篇 zheng zibin
  • 2 篇 panaousis emmano...
  • 2 篇 yang yinghao
  • 2 篇 lang huile
  • 2 篇 lei botian
  • 2 篇 chen chuan
  • 2 篇 lu hang
  • 2 篇 li xiaowei
  • 1 篇 wu jiajing
  • 1 篇 li junjiong
  • 1 篇 chongsong you
  • 1 篇 li jinguo
  • 1 篇 li zhengxiong
  • 1 篇 wang lei
  • 1 篇 ge wenfei
  • 1 篇 ning zhaolong
  • 1 篇 shi ying
  • 1 篇 li peng

语言

  • 39 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=privacy computing"
41 条 记 录,以下是1-10 订阅
排序:
A Trusted Data privacy computing Method for Vehicular Ad Hoc Networks Based on Homomorphic Encryption and DAG Blockchain
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第6期12卷 6621-6632页
作者: Jiang, Wenxian Tao, Jun Guan, Zhenglei Southeast Univ Sch Cyber Sci & Engn Nanjing 211189 Peoples R China Huaqiao Univ Coll Comp Sci & Technol Xiamen 361000 Peoples R China
Recently, vehicular ad hoc networks (VANETs) have garnered significant attention in the industry, thanks to their distinctive characteristics of mobility and real-time capabilities. In order to protect the privacy of ... 详细信息
来源: 评论
Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2024年 222卷
作者: Zhang, Hongwei Fan, Wei Wang, Jinsong Tianjin Univ Technol Sch Comp Sci & Engn Tianjin 300384 Peoples R China Tianjin Key Lab Intelligence Comp & Novel Software Tianjin 300384 Peoples R China Natl Engn Lab Comp Virus Prevent & Control Techno Tianjin 300457 Peoples R China
With the rapid development of information technology and the increasing popularity of personalized services, the flow of users' personal information in the Internet is inevitable between different platforms and ap... 详细信息
来源: 评论
Research on interconnection technology of heterogeneous platforms for privacy computing for energy big data  3
Research on interconnection technology of heterogeneous plat...
收藏 引用
3rd International Conference on Energy and Power Engineering, Control Engineering (EPECE)
作者: Zhai, Yujia Huang, Xiuli Yu, Pengfei State Grid Smart Grid Res Inst Co Ltd State Grid Lab Power Cyber Secur Protect & Monito Nanjing Peoples R China
Energy data, especially power data, has the advantages of covering a wide range of industries, high value density, and good accuracy, relying on energy big data can widely describe all kinds of terminal production and... 详细信息
来源: 评论
PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing
收藏 引用
JOURNAL OF CLOUD computing-ADVANCES SYSTEMS AND APPLICATIONS 2022年 第1期11卷 1-17页
作者: Zhao, Jindong Wang, Wenshuo Wang, Dan Wang, Xuan Mu, Chunxiao Yantai Univ Sch Comp & Control Engn Yantai 264005 Peoples R China
Nowadays, smart medical cloud platforms have become a new direction in the industry. However, because the medical system involves personal physiological data, user privacy in data transmission and processing is also e... 详细信息
来源: 评论
Application of privacy computing to Smart Grid Data Sharing Platform  2
Application of Privacy Computing to Smart Grid Data Sharing ...
收藏 引用
2nd Asian Conference on Frontiers of Power and Energy (ACFPE)
作者: Jia, Ning Gao, QiaoMei Liu, YongMei Meng, Hao Liu, ShuQing Yi, FengChao Inner Mongolia Univ Coll Comp Sci Hohhot Peoples R China Inner Mongolia Univ Finance Dept Hohhot Peoples R China Inner Mongolia IEDS Co Ltd Tech Res Inst Hohhot Peoples R China
Data, as an emerging factor of production, is profoundly changing the traditional mode of production and at the same time giving rise to the need for a data-centered digital economy. Currently, data sharing between go... 详细信息
来源: 评论
Research and application of power blockchain data sharing technology based on privacy computing  3
Research and application of power blockchain data sharing te...
收藏 引用
3rd International Conference on Energy, Power and Electrical Technology, ICEPET 2024
作者: Shi, Ying Wang, Lixing Ao, Jin Song, Jie Li, Qian Zhang, Xuesen State Grid Jilin Electric Power Company Co. Ltd Jilin China Co. Ltd. Beijing China
A new type of power system gathers large-scale energy and related data. This paper builds a blockchain power data trusted sharing platform prototype system with independent intellectual property rights to provide a tr... 详细信息
来源: 评论
privacy computing meets metaverse: Necessity, taxonomy and challenges
收藏 引用
AD HOC NETWORKS 2024年 158卷
作者: Chen, Chuan Li, Yuecheng Wu, Zhenpeng Mai, Chengyuan Liu, Youming Hu, Yanming Kang, Jiawen Zheng, Zibin Sun Yat Sen Univ Sch Comp Sci & Engn GuangZhou Peoples R China Sun Yat Sen Univ Sch Software Engn ZhuHai Peoples R China Guangdong Univ Technol Sch Automat GuangZhou Peoples R China
Metaverse, the core of the next -generation Internet, is a computer -generated holographic digital environment that simultaneously combines spatio-temporal, immersive, real-time, sustainable, interoperable, and datase... 详细信息
来源: 评论
Public Credit Data Circulation and Sharing based on privacy computing
Public Credit Data Circulation and Sharing based on Privacy ...
收藏 引用
2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity, ICDSCNC 2024
作者: Zhang, Fengna Liu, Renzhong Harbin University of Commerce School of Finance Harbin China Harbin Finance University Financial Supervision and Financial Risk Prevention Research Center Harbin China
In the digital age, public credit data is crucial for financial stability and business integrity but is hindered by privacy concerns and data silos. This study proposes an innovative privacy computing model integratin... 详细信息
来源: 评论
An Industrial Digital Financial Application Platform based on privacy computing  24
An Industrial Digital Financial Application Platform based o...
收藏 引用
Proceedings of the 2024 the 12th International Conference on Information Technology (ICIT)
作者: Xiaobin Zhang Peng Chen Chongsong You Bin Liu Meilin Huang CCCC (Xiamen) E-commerce Co. Ltd Xiamen China
In the digital economy era, data information has become an indispensable production factor and the core asset of enterprises. Therefore, the data privacy protection issue is highlighted. Recently, privacy computing te... 详细信息
来源: 评论
The Failure and Response of Risk Prevention Regulations: Taking privacy computing as an Example
收藏 引用
Open Journal of Social Sciences 2023年 11卷 533-550页
作者: Xinhui Liu School of Economic Law Shanghai University of Politics and Law Shanghai China
Against the backdrop of the continuous development of the data economy and the widespread application of algorithm technology, the protection of data security and privacy has increasingly become a concern for countrie... 详细信息
来源: 评论