得意牛 发表于 2025-3-28 15:51:54

http://reply.papertrans.cn/87/8636/863518/863518_41.png

laceration 发表于 2025-3-28 19:05:16

An-Sheng Yin,Shun-Yi ZhangThese critics demand international law to be more inclusive towards non-European knowledge, inter alia Islamic law. Some scholars have argued that it is essential for the ICC to refer to Islamic law, not only to counter Eurocentrism in general but also because of the growing number of cases involvin

Fraudulent 发表于 2025-3-29 00:46:38

Yanan Zhang,Shengqiang Han,Stevenyin Zhong,Peiji Shi,Xuebin Shaoorizes the ways in which the ICTs have interpreted and applied international human rights norms. Based on the foregoing chapters, two approaches have been identified. The first is adherence to IHRL and the second is the contextualization of human rights norms based on the specific circumstances in w

同步左右 发表于 2025-3-29 06:45:14

Yanan Zhang,Peiji Shi,Yangyang Liu,Shengqiang Han,Baoying Mu,Jia Zhengonal criminal justice, most accused persons remain in detention from the moment that they are arrested until a final judgment is rendered. International human rights law recognizes detention for the purpose of bringing a person to trial as a permissible limitation of the right to liberty. However, t

杀人 发表于 2025-3-29 11:07:10

Qi Zhang,Shaojing Fu,Nan Jia,Jianchao Tang,Ming Xuonal criminal justice, most accused persons remain in detention from the moment that they are arrested until a final judgment is rendered. International human rights law recognizes detention for the purpose of bringing a person to trial as a permissible limitation of the right to liberty. However, t

ORBIT 发表于 2025-3-29 13:23:02

Xiaohan Yue,Jian Xu,Bing Chen,Yuan Heow the ICTs have relied on sources of international human rights law in their case law on this issue. The focus is on coercive measures, specifically search and seizure operations and the interception of private communication. The unique features of international criminal justice significantly impac

粗鲁性质 发表于 2025-3-29 16:38:04

A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharingent systems do, and also have unconditional security which the classical E-payment systems cannot provide. Security analysis shows that our scheme is unforgeability, undeniability, blindness and unconditionally secure.

Eviction 发表于 2025-3-29 22:34:54

Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and TraceabilitTCP sliding window technology and interconnected functions to improve agent security. Experiments on real data sets show that the theoretical analysis and experimental results are consistent, thereby reflecting the feasibility and efficiency of the scheme.

Harness 发表于 2025-3-30 00:57:59

Privacy Preservation in Publishing Electronic Health Records Based on Perturbationng or deleting some points while ensuring the published data to satisfy .-diversity. A comprehensive set of real-life healthcare data sets are applied to evaluate the performance of our anonymization approach. Simulations show our scheme possesses better privacy while ensuring higher utility.

nonsensical 发表于 2025-3-30 05:27:01

Privacy Disclosures Detection in Natural-Language Text Through Linguistically-Motivated Artificial Nece of text discloses personal or private information, and evaluate our approach in a binary classification task with 93% accuracy on our own labeled dataset, and 86% on a dataset of ground truth. Unlike document classification tasks in the area of natural language processing, our framework is devel
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Security and Privacy in New Computing Environments; Second EAI Internati Jin Li,Zheli Liu,Hao Peng Conference proceedings 2019 ICST Institu