Showing 1 - 9 results of 9 for search '"data protection"', query time: 0.10s Refine Results
  1. 1

    An Authentication and Data Protection Scheme Research for Mass Storage Devices

    Published 2018-06-01
    “…In order to protect the user data security in USB storage devices, an effective authentication and data protection scheme is proposed. Using the attribute-based control technology, the security authentication of the USB device user is realized, and the privacy data fine-grained control of the USB device is realized. …”
    Get full text
    Article
  2. 2
  3. 3

    Multi-teacher Contrastive Knowledge Inversion for Data-Free Distillation by LIN Zhenyuan, LIN Shaohui, YAO Yiwu, HE Gaoqi, WANG Changbo, MA Lizhuang

    Published 2023-11-01
    Subjects: “…model compression; data-free; knowledge distillation; data protection; privacy protection…”
    Get full text
    Article
  4. 4

    Research of Critical Data Encryption Algorithm of Gas Monitoring System of Coal Mine and Its Implementatio by CHEN Yun-qi, ZHANG Yi

    Published 2012-07-01
    Subjects: “…coal mine, gas monitoring, data protection, data encryption, symmetric encryption algorithm, sql server 2008…”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Expert Consensus on Digital Therapies for Insomnia in China by China Sleep Research Society

    Published 2024-02-01
    “…To address this issue, the China Sleep Research Society collaborated with domestic experts in sleep medicine and medical engineering to develop the Expert Consensus on Digital Therapies for Insomnia in China, elaborates on the definition, indications, core principles, research and development, promotion and application, education and training, data protection, ethical supervision, aiming to establish a unified and comprehensive framework for DTI.…”
    Get full text
    Article
  8. 8

    資訊隱私權之重塑 ― 以行動商務為例 The Architecture of Information Privacy: by 林雅惠 Ya-Hui Lin

    Published 2004-06-01
    “…Second, this comment proposes a solution- a property regime for personal data replaces today’s liability regime to achieve a sound regulatory framework of data protection. Finally, this comment examines the privacy infringement occurred in the value chain of location based services and suggests additional legislations enacted in Telecommunications Act, Data Protection Act, Criminal Act and other related regulations in Taiwan.…”
    Get full text
    Article
  9. 9

    Design and Analysis of a Blockchain Security Framework Model for Smart Libraries by YANG Xiaofei, KONG Yuefan, SUN Jipu

    Published 2023-04-01
    “…It is found that there are three major contradictions: data freedom and openness and data security protection, user behavior analysis and user privacy data protection, and dynamic editing and static protection of smart services. …”
    Get full text
    Article