-
1
An Authentication and Data Protection Scheme Research for Mass Storage Devices
Published 2018-06-01“…In order to protect the user data security in USB storage devices, an effective authentication and data protection scheme is proposed. Using the attribute-based control technology, the security authentication of the USB device user is realized, and the privacy data fine-grained control of the USB device is realized. …”
Get full text
Article -
2
-
3
Multi-teacher Contrastive Knowledge Inversion for Data-Free Distillation
Published 2023-11-01Subjects: “…model compression; data-free; knowledge distillation; data protection; privacy protection…”
Get full text
Article -
4
Research of Critical Data Encryption Algorithm of Gas Monitoring System of Coal Mine and Its Implementatio
Published 2012-07-01Subjects: “…coal mine, gas monitoring, data protection, data encryption, symmetric encryption algorithm, sql server 2008…”
Get full text
Article -
5
-
6
論德國科技防疫措施下 之個資風險與保護法制 Risks and Legal Protection of Personal Data Under the Technological Measures for Pandemic Prevention in Germany
Published 2022-08-01Subjects: Get full text
Article -
7
Expert Consensus on Digital Therapies for Insomnia in China
Published 2024-02-01“…To address this issue, the China Sleep Research Society collaborated with domestic experts in sleep medicine and medical engineering to develop the Expert Consensus on Digital Therapies for Insomnia in China, elaborates on the definition, indications, core principles, research and development, promotion and application, education and training, data protection, ethical supervision, aiming to establish a unified and comprehensive framework for DTI.…”
Get full text
Article -
8
資訊隱私權之重塑 ― 以行動商務為例 The Architecture of Information Privacy:
Published 2004-06-01“…Second, this comment proposes a solution- a property regime for personal data replaces today’s liability regime to achieve a sound regulatory framework of data protection. Finally, this comment examines the privacy infringement occurred in the value chain of location based services and suggests additional legislations enacted in Telecommunications Act, Data Protection Act, Criminal Act and other related regulations in Taiwan.…”
Get full text
Article -
9
Design and Analysis of a Blockchain Security Framework Model for Smart Libraries
Published 2023-04-01“…It is found that there are three major contradictions: data freedom and openness and data security protection, user behavior analysis and user privacy data protection, and dynamic editing and static protection of smart services. …”
Get full text
Article