scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "Data Protection"

1 - 10 of 75,692 results for
 "Data Protection"
Results per page:

Blockchain Framework for Secure COVID-19 Pandemic Data Handling and Protection.

Publication Type:Academic Journal

Source(s):Computational Intelligence & Neuroscience. 9/14/2022, p1-11. 11p.

Abstract:COVID-19 pandemic caused global epidemic infections, which is one of the most severe infections in human medical history. In the absence of proper medications and vaccines, handling the pandemic has been challenging for governments and major health fac...

View details

A Steganography Model Data Protection Method Based on Scrambling Encryption.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 3, p5363-5375. 13p.

Abstract:At present, the image steganography method based on CNN has achieved good results. The trained model and its parameters are of great value. Once leaked, the secret image will be exposed. To protect the security of steganographic network model parameter...

View details

BSPPF: Blockchain-Based Security and Privacy Preventing Framework for Data Middle Platform in the Era of IR 4.0.

Publication Type:Academic Journal

Source(s):Journal of Nanomaterials. 8/30/2022, p1-14. 14p.

Abstract:Security and privacy issues about Big Data have emerged as one of the most pressing concerns in both academic circles and the business world in the era of IR 4.0. These worries are made worse because businesses are beginning to construct their own Big ...

View details

The Research of Adaptive Data Desensitization Method Based on Middle Platform.

Publication Type:Academic Journal

Source(s):Wireless Communications & Mobile Computing. 8/18/2022, p1-7. 7p.

Abstract:With the popularization of Middle Platform characterized by data aggregating and governance, the security protection of data is paying more and more attention, and the data desensitization technology is widely used. In order to solve the high threshold...

View details

Cloud Storage Model Based on the BGV Fully Homomorphic Encryption in the Blockchain Environment.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 7/20/2022, p1-9. 9p.

Abstract:Blockchain is a distributed time-series database. Based on the blockchain platform, this paper designs the framework model of cloud storage and designs the cloud storage model based on homomorphic encryption based on the operation process of the model....

View details

Application of Big Data in Legal Protection of Minors' Sexual Autonomy.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 7/13/2022, p1-7. 7p.

Abstract:Whether minors can grow up healthily is the key to the happiness and peace of hundreds of millions of families, the great rejuvenation of the Chinese nation, and the development of the country. For better legal protection of minors' sexual autonomy, Ch...

View details

Data Protection Software for Civil Aviation Control Flight Information System Based on FPE Algorithm.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 5/13/2022, p1-7. 7p.

Abstract:This study is aimed in order to study the data protection software of civil aviation management flight information system based on FPE algorithm. The author established the data warehouse software of the air traffic control production information stati...

View details

A Study on Resource Security under Legal Protection of e-Commerce Data Sovereignty Based on Blockchain Network.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 5/13/2022, p1-7. 7p.

Abstract:With the growing demand for cross-border electronic data forensics, national sovereignty and international network security have ushered in great challenges, and how to achieve dynamic balance in various fields under cross-border electronic data forens...

View details

Digital Forensics as Advanced Ransomware Pre-Attack Detection Algorithm for Endpoint Data Protection.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 7/6/2022, p1-16. 16p.

Abstract:Ransomware is a malicious software that takes files hostage and demands ransomware to release them. It targets individuals, corporations, organizations, and public services such as hospitals and police stations. It is a growing industry that affected m...

View details

Federated Learning and Privacy.

Publication Type:Periodical

Source(s):Communications of the ACM. Apr2022, Vol. 65 Issue 4, p90-97. 8p. 1 Illustration, 4 Diagrams, 1 Chart.

Abstract:Building privacy-preserving systems for machine learning and data science on decentralized data. [ABSTRACT FROM AUTHOR]

View details

banner_970x250 (970x250)

sponsored