找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Privacy in New Computing Environments; Second EAI Internati Jin Li,Zheli Liu,Hao Peng Conference proceedings 2019 ICST Institu

[复制链接]
楼主: 拿着锡
发表于 2025-3-28 15:51:54 | 显示全部楼层
发表于 2025-3-28 19:05:16 | 显示全部楼层
An-Sheng Yin,Shun-Yi ZhangThese critics demand international law to be more inclusive towards non-European knowledge, inter alia Islamic law. Some scholars have argued that it is essential for the ICC to refer to Islamic law, not only to counter Eurocentrism in general but also because of the growing number of cases involvin
发表于 2025-3-29 00:46:38 | 显示全部楼层
Yanan Zhang,Shengqiang Han,Stevenyin Zhong,Peiji Shi,Xuebin Shaoorizes the ways in which the ICTs have interpreted and applied international human rights norms. Based on the foregoing chapters, two approaches have been identified. The first is adherence to IHRL and the second is the contextualization of human rights norms based on the specific circumstances in w
发表于 2025-3-29 06:45:14 | 显示全部楼层
Yanan Zhang,Peiji Shi,Yangyang Liu,Shengqiang Han,Baoying Mu,Jia Zhengonal criminal justice, most accused persons remain in detention from the moment that they are arrested until a final judgment is rendered. International human rights law recognizes detention for the purpose of bringing a person to trial as a permissible limitation of the right to liberty. However, t
发表于 2025-3-29 11:07:10 | 显示全部楼层
Qi Zhang,Shaojing Fu,Nan Jia,Jianchao Tang,Ming Xuonal criminal justice, most accused persons remain in detention from the moment that they are arrested until a final judgment is rendered. International human rights law recognizes detention for the purpose of bringing a person to trial as a permissible limitation of the right to liberty. However, t
发表于 2025-3-29 13:23:02 | 显示全部楼层
Xiaohan Yue,Jian Xu,Bing Chen,Yuan Heow the ICTs have relied on sources of international human rights law in their case law on this issue. The focus is on coercive measures, specifically search and seizure operations and the interception of private communication. The unique features of international criminal justice significantly impac
发表于 2025-3-29 16:38:04 | 显示全部楼层
A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharingent systems do, and also have unconditional security which the classical E-payment systems cannot provide. Security analysis shows that our scheme is unforgeability, undeniability, blindness and unconditionally secure.
发表于 2025-3-29 22:34:54 | 显示全部楼层
Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and TraceabilitTCP sliding window technology and interconnected functions to improve agent security. Experiments on real data sets show that the theoretical analysis and experimental results are consistent, thereby reflecting the feasibility and efficiency of the scheme.
发表于 2025-3-30 00:57:59 | 显示全部楼层
Privacy Preservation in Publishing Electronic Health Records Based on Perturbationng or deleting some points while ensuring the published data to satisfy .-diversity. A comprehensive set of real-life healthcare data sets are applied to evaluate the performance of our anonymization approach. Simulations show our scheme possesses better privacy while ensuring higher utility.
发表于 2025-3-30 05:27:01 | 显示全部楼层
Privacy Disclosures Detection in Natural-Language Text Through Linguistically-Motivated Artificial Nece of text discloses personal or private information, and evaluate our approach in a binary classification task with 93% accuracy on our own labeled dataset, and 86% on a dataset of ground truth. Unlike document classification tasks in the area of natural language processing, our framework is devel
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 23:04
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表