期刊文献+
共找到1,265篇文章
< 1 2 64 >
每页显示 20 50 100
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
1
作者 Anna Sheri George Jomin George Judy Jenkins 《E-Health Telecommunication Systems and Networks》 2024年第3期23-44,共22页
Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selec... Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides. 展开更多
关键词 Mobile Devices Patient Privacy confidentiality Breaches Data Security Data Protection Regulatory Compliance User Consent Data Encryption Third-Party Integration User Awareness
下载PDF
The Confidentiality of Coding Video Games with Cheat Code and Bots for Cheating in a Virtual World
2
作者 Samantha Gorton Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第6期105-114,共10页
Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual gam... Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest. 展开更多
关键词 Video Games confidentiality Virtual World Cheat Code Bots PROGRAMMING
下载PDF
Building Semantic Communication System via Molecules:An End-to-End Training Approach
3
作者 Cheng Yukun Chen Wei Ai Bo 《China Communications》 SCIE CSCD 2024年第7期113-124,共12页
The concept of semantic communication provides a novel approach for applications in scenarios with limited communication resources.In this paper,we propose an end-to-end(E2E)semantic molecular communication system,aim... The concept of semantic communication provides a novel approach for applications in scenarios with limited communication resources.In this paper,we propose an end-to-end(E2E)semantic molecular communication system,aiming to enhance the efficiency of molecular communication systems by reducing the transmitted information.Specifically,following the joint source channel coding paradigm,the network is designed to encode the task-relevant information into the concentration of the information molecules,which is robust to the degradation of the molecular communication channel.Furthermore,we propose a channel network to enable the E2E learning over the non-differentiable molecular channel.Experimental results demonstrate the superior performance of the semantic molecular communication system over the conventional methods in classification tasks. 展开更多
关键词 deep learning end-to-end learning molecular communication semantic communication
下载PDF
Confidential Procedure Model:a Method for Quantifying Confidentiality Leakage 被引量:1
4
作者 Zhang Yong Li Xiangxue +2 位作者 Zhou Yuan Li Zhibin Qian Haifeng 《China Communications》 SCIE CSCD 2012年第11期117-126,共10页
In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality lo... In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality loss is formalized as a dynamic procedure, instead of a static function, and described via the "waterfall" diagram; 2) confidentiality loss is quantified in a relative manner, i.e., taken as a quantitative metric, the ratio of the conditional entropy being reserved after observing the entropy of the original full confidential information; 3) the optimal attacks including exhaustive attacks as well as all possible attacks that have (or have not even) been discovered, are taken into account when defining the novel concept of the confidential degree. To elucidate the proposed model, we analyze the information leakage in side-channel attacks and the anonymity of DC-net in a quantitative manner. 展开更多
关键词 confidentiality quantitative analysis perfect secrecy side-channel attack ANONYMITY
下载PDF
Read-write rule property research of the combined function about the confidentiality and integrality 被引量:1
5
作者 LIU Yi-he 《通讯和计算机(中英文版)》 2008年第5期40-42,共3页
关键词 BLP模式 Biba模式 秘密性 完整性
下载PDF
End-to-End Joint Multi-Object Detection and Tracking for Intelligent Transportation Systems
6
作者 Qing Xu Xuewu Lin +6 位作者 Mengchi Cai Yu‑ang Guo Chuang Zhang Kai Li Keqiang Li Jianqiang Wang Dongpu Cao 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2023年第5期280-290,共11页
Environment perception is one of the most critical technology of intelligent transportation systems(ITS).Motion interaction between multiple vehicles in ITS makes it important to perform multi-object tracking(MOT).How... Environment perception is one of the most critical technology of intelligent transportation systems(ITS).Motion interaction between multiple vehicles in ITS makes it important to perform multi-object tracking(MOT).However,most existing MOT algorithms follow the tracking-by-detection framework,which separates detection and tracking into two independent segments and limit the global efciency.Recently,a few algorithms have combined feature extraction into one network;however,the tracking portion continues to rely on data association,and requires com‑plex post-processing for life cycle management.Those methods do not combine detection and tracking efciently.This paper presents a novel network to realize joint multi-object detection and tracking in an end-to-end manner for ITS,named as global correlation network(GCNet).Unlike most object detection methods,GCNet introduces a global correlation layer for regression of absolute size and coordinates of bounding boxes,instead of ofsetting predictions.The pipeline of detection and tracking in GCNet is conceptually simple,and does not require compli‑cated tracking strategies such as non-maximum suppression and data association.GCNet was evaluated on a multivehicle tracking dataset,UA-DETRAC,demonstrating promising performance compared to state-of-the-art detectors and trackers. 展开更多
关键词 Intelligent transportation systems Joint detection and tracking Global correlation network end-to-end tracking
下载PDF
An End-to-End Machine Learning Framework for Predicting Common Geriatric Diseases
7
作者 Jian Guo Yu Han +2 位作者 Fan Xu Jiru Deng Zhe Li 《Journal of Beijing Institute of Technology》 EI CAS 2023年第2期209-218,共10页
Interdisciplinary applications between information technology and geriatrics have been accelerated in recent years by the advancement of artificial intelligence,cloud computing,and 5G technology,among others.Meanwhile... Interdisciplinary applications between information technology and geriatrics have been accelerated in recent years by the advancement of artificial intelligence,cloud computing,and 5G technology,among others.Meanwhile,applications developed by using the above technologies make it possible to predict the risk of age-related diseases early,which can give caregivers time to intervene and reduce the risk,potentially improving the health span of the elderly.However,the popularity of these applications is still limited for several reasons.For example,many older people are unable or unwilling to use mobile applications or devices(e.g.smartphones)because they are relatively complex operations or time-consuming for older people.In this work,we design and implement an end-to-end framework and integrate it with the WeChat platform to make it easily accessible to elders.In this work,multifactorial geriatric assessment data can be collected.Then,stacked machine learning models are trained to assess and predict the incidence of common diseases in the elderly.Experimental results show that our framework can not only provide more accurate prediction(precision:0.8713,recall:0.8212)for several common elderly diseases,but also very low timeconsuming(28.6 s)within a workflow compared to some existing similar applications. 展开更多
关键词 predicting geriatric diseases machine learning end-to-end framework
下载PDF
Attention-based neural network for end-to-end music separation
8
作者 Jing Wang Hanyue Liu +3 位作者 Haorong Ying Chuhan Qiu Jingxin Li Muhammad Shahid Anwar 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第2期355-363,共9页
The end-to-end separation algorithm with superior performance in the field of speech separation has not been effectively used in music separation.Moreover,since music signals are often dual channel data with a high sa... The end-to-end separation algorithm with superior performance in the field of speech separation has not been effectively used in music separation.Moreover,since music signals are often dual channel data with a high sampling rate,how to model longsequence data and make rational use of the relevant information between channels is also an urgent problem to be solved.In order to solve the above problems,the performance of the end-to-end music separation algorithm is enhanced by improving the network structure.Our main contributions include the following:(1)A more reasonable densely connected U-Net is designed to capture the long-term characteristics of music,such as main melody,tone and so on.(2)On this basis,the multi-head attention and dualpath transformer are introduced in the separation module.Channel attention units are applied recursively on the feature map of each layer of the network,enabling the network to perform long-sequence separation.Experimental results show that after the introduction of the channel attention,the performance of the proposed algorithm has a stable improvement compared with the baseline system.On the MUSDB18 dataset,the average score of the separated audio exceeds that of the current best-performing music separation algorithm based on the time-frequency domain(T-F domain). 展开更多
关键词 channel attention densely connected network end-to-end music separation
下载PDF
Analysis of a Two Category Confidentiality Modeling Information Security
9
作者 Marn-Ling Shing Chen-Chi Shing Lee-Pin Shing 《通讯和计算机(中英文版)》 2012年第5期538-546,共9页
关键词 保密性 建模分析 信息安全 网络供应商 马尔可夫链 最佳组合 相关信息 系统入侵
下载PDF
DTHN: Dual-Transformer Head End-to-End Person Search Network
10
作者 Cheng Feng Dezhi Han Chongqing Chen 《Computers, Materials & Continua》 SCIE EI 2023年第10期245-261,共17页
Person search mainly consists of two submissions,namely Person Detection and Person Re-identification(reID).Existing approaches are primarily based on Faster R-CNN and Convolutional Neural Network(CNN)(e.g.,ResNet).Wh... Person search mainly consists of two submissions,namely Person Detection and Person Re-identification(reID).Existing approaches are primarily based on Faster R-CNN and Convolutional Neural Network(CNN)(e.g.,ResNet).While these structures may detect high-quality bounding boxes,they seem to degrade the performance of re-ID.To address this issue,this paper proposes a Dual-Transformer Head Network(DTHN)for end-to-end person search,which contains two independent Transformer heads,a box head for detecting the bounding box and extracting efficient bounding box feature,and a re-ID head for capturing high-quality re-ID features for the re-ID task.Specifically,after the image goes through the ResNet backbone network to extract features,the Region Proposal Network(RPN)proposes possible bounding boxes.The box head then extracts more efficient features within these bounding boxes for detection.Following this,the re-ID head computes the occluded attention of the features in these bounding boxes and distinguishes them from other persons or backgrounds.Extensive experiments on two widely used benchmark datasets,CUHK-SYSU and PRW,achieve state-of-the-art performance levels,94.9 mAP and 95.3 top-1 scores on the CUHK-SYSU dataset,and 51.6 mAP and 87.6 top-1 scores on the PRW dataset,which demonstrates the advantages of this paper’s approach.The efficiency comparison also shows our method is highly efficient in both time and space. 展开更多
关键词 TRANSFORMER occluded attention end-to-end person search person detection person re-ID Dual-Transformer Head
下载PDF
End-to-End Auto-Encoder System for Deep Residual Shrinkage Network for AWGN Channels
11
作者 Wenhao Zhao Shengbo Hu 《Journal of Computer and Communications》 2023年第5期161-176,共16页
With the rapid development of deep learning methods, the data-driven approach has shown powerful advantages over the model-driven one. In this paper, we propose an end-to-end autoencoder communication system based on ... With the rapid development of deep learning methods, the data-driven approach has shown powerful advantages over the model-driven one. In this paper, we propose an end-to-end autoencoder communication system based on Deep Residual Shrinkage Networks (DRSNs), where neural networks (DNNs) are used to implement the coding, decoding, modulation and demodulation functions of the communication system. Our proposed autoencoder communication system can better reduce the signal noise by adding an “attention mechanism” and “soft thresholding” modules and has better performance at various signal-to-noise ratios (SNR). Also, we have shown through comparative experiments that the system can operate at moderate block lengths and support different throughputs. It has been shown to work efficiently in the AWGN channel. Simulation results show that our model has a higher Bit-Error-Rate (BER) gain and greatly improved decoding performance compared to conventional modulation and classical autoencoder systems at various signal-to-noise ratios. 展开更多
关键词 Deep Residual Shrinkage Network Autoencoder end-to-end Learning Communication Systems
下载PDF
2009—2022年广州地区保密性弃血情况调查
12
作者 梁明月 骆宏 +5 位作者 黄伯泉 何博 陈小光 黄晓斌 戎霞 张伟东 《中国输血杂志》 2024年第1期80-83,共4页
目的对广州地区保密性弃血情况进行调查分析,为保障血液安全提供科学依据。方法对2009—2022年广州地区保密性弃血献血人次、献血者人群特征、保密性弃血原因和献血后回告时间进行统计分析。结果2009—2022年广州地区保密性弃血回告率为... 目的对广州地区保密性弃血情况进行调查分析,为保障血液安全提供科学依据。方法对2009—2022年广州地区保密性弃血献血人次、献血者人群特征、保密性弃血原因和献血后回告时间进行统计分析。结果2009—2022年广州地区保密性弃血回告率为0.0062%(260/4170984),各年间的保密性弃血回告率有差异(P<0.05);2009—2022年保密性弃血回告率在性别和职业方面无差异(P>0.05),在献血年龄、献血次数、文化程度和婚姻状态方面有差异(P<0.05),其中18~30岁献血者(0.0073%)和首次献血者(0.0108%)是保密性弃血的主要人群。高危性行为(28.46%,74/260)是保密性弃血的首要原因,保密性弃血回告时间高峰期在献血后72 h内,其中献血后24~72 h回告要求保密性弃血的人次(68.46%,178/260)占比最高。结论保密性弃血是保障血液安全非常重要的措施,在献血者招募过程应重点对18~30岁献血者和首次献血者进行详细的献血前健康征询,排除高危献血者,同时强化保密性弃血回告及方法途径指引宣传,做好保密性弃血原因登记和分类工作,从源头筛选出合格、低风险的无偿献血者,保障血液安全。 展开更多
关键词 保密性弃血 人群特征 献血后回告
下载PDF
“调解不成无损于现状”机制的功能与法理基础
13
作者 宋连斌 武振国 周健 《东北大学学报(社会科学版)》 北大核心 2024年第1期100-107,共8页
为促进诚信调解,“调解不成无损于现状”机制要求如果调解不成,当事人不得单方公开调解交流以改变调解前原有的权利状态。“调解不成无损于现状”机制的功能,在于促进调解程序的顺利进行、维持调解员的中立地位、保证调解程序和后续争... 为促进诚信调解,“调解不成无损于现状”机制要求如果调解不成,当事人不得单方公开调解交流以改变调解前原有的权利状态。“调解不成无损于现状”机制的功能,在于促进调解程序的顺利进行、维持调解员的中立地位、保证调解程序和后续争议解决程序的独立性和完整性,但如何保证其实施,则存在多种选择路径。若借助于保密合同,则合同之外的主体难受约束;若借助于排除规则,则与仲裁规则的合同性质相悖;若借助于无损于现状特免权,特免权之外的自然人和法人都将成为特免权的义务主体。因此,以无损于现状特免权为基础,根据调解交流是否与促成调解这一目标有关,可以在提供主体、产生时间和信息类型三个方面有效构建调解交流的保护机制。 展开更多
关键词 调解保密 公平审理 无损于现状特免权
下载PDF
突发公共卫生事件下量子保密通信与应急物流耦合体系构建
14
作者 甘卫华 刘嘉琛 《物流科技》 2024年第9期63-67,共5页
在突发公共卫生事件的防控中,应急物流发挥着重大作用,我国应急物流存在一些不足:例如,系统指挥及管理机制不统一,物资储备短缺与生产不足,应急物流信息网络不完善。文章考虑应急物流对于数据共享、效率提升、保密性的要求,提出了量子... 在突发公共卫生事件的防控中,应急物流发挥着重大作用,我国应急物流存在一些不足:例如,系统指挥及管理机制不统一,物资储备短缺与生产不足,应急物流信息网络不完善。文章考虑应急物流对于数据共享、效率提升、保密性的要求,提出了量子保密通信与应急物流的耦合机理以及突发公共卫生事件下应用量子保密通信技术技术完善应急物流的对策,以期为我国应急物流效率提升和可靠性保障提供可行性策略。 展开更多
关键词 应急物流 量子保密通信 信息网络体系 耦合机理
下载PDF
体系化构造:美国保密基础设施立法及启示
15
作者 张涛 朱莉欣 《西安交通大学学报(社会科学版)》 北大核心 2024年第4期144-154,共11页
数字技术高速发展态势下,国家保密法律制度需要树立符合时代特征的保密基础设施概念,充分考虑设置、维护、管理和销毁保密信息的端点、系统环境、人员的安全及相应的能力,以积极应对网络信息技术运用带来的环境变化和挑战。第二次世界... 数字技术高速发展态势下,国家保密法律制度需要树立符合时代特征的保密基础设施概念,充分考虑设置、维护、管理和销毁保密信息的端点、系统环境、人员的安全及相应的能力,以积极应对网络信息技术运用带来的环境变化和挑战。第二次世界大战后美国保密立法历程表明,美国通过法律法规推动保密基础设施的现代化和改革,逐步完成了系统架构下的涉密信息安全保障;而立法后紧跟的标准、手册等规范文件对贯彻实施其保密基础设施法律法规也起到了非常重要的作用。美国保密基础设施立法一直以国家安全战略为遵循,并不断加强与企业合作,如今则更加重视与网络安全的衔接。研究美国保密基础设施立法现状与趋势,为中国从立法理念、规范内容和形式等方面完善保密法律制度提供了新思路。 展开更多
关键词 国家安全 网络安全 保密基础设施 保密法律制度 关键基础设施 受控非密信息系统 权益让渡
下载PDF
医疗保密义务的例外情形研究
16
作者 申伟 黄李睿怡 《医学与法学》 2024年第5期21-29,共9页
在医患关系中,对于患者的健康信息,医疗人员以保密为原则、披露为例外,且披露必须满足特定条件,方能排除其披露行为的违法性;在现行法框架下,其处理患者医疗健康信息时,既需要满足《个人信息保护法》中有关敏感个人信息处理的一般条件,... 在医患关系中,对于患者的健康信息,医疗人员以保密为原则、披露为例外,且披露必须满足特定条件,方能排除其披露行为的违法性;在现行法框架下,其处理患者医疗健康信息时,既需要满足《个人信息保护法》中有关敏感个人信息处理的一般条件,也需要满足《民法典》中隐私权所要求的特别条件。为充分保障患者权益,应避免医疗健康信息披露的泛滥;相关立法的后续修订完善,应坚持以保密为原则、披露为例外的基本理念,并借鉴域外相关立法经验,尽可能实现我国医疗保密义务之例外情形的法定化、明确化。 展开更多
关键词 医疗健康信息 敏感个人信息 医疗保密义务之例外 违法阻却事由
下载PDF
我国证券市场吹哨人保护制度完善研究
17
作者 蒋辉宇 周玮 《中国证券期货》 2024年第1期88-96,共9页
随着证券市场违法行为的隐秘性不断增强,监管难度日益增加,吹哨人的存在则有效缓解了这一难题。但是由于吹哨人的举报行为威胁到被举报人的利益,因此吹哨人常常面临着被报复的风险,证券市场吹哨人保护制度包括吹哨人身份信息保密、反报... 随着证券市场违法行为的隐秘性不断增强,监管难度日益增加,吹哨人的存在则有效缓解了这一难题。但是由于吹哨人的举报行为威胁到被举报人的利益,因此吹哨人常常面临着被报复的风险,证券市场吹哨人保护制度包括吹哨人身份信息保密、反报复保护、权利救济三方面的内容,而我国在这三方面均存在不完善之处,无法为吹哨人提供足够的保护。在借鉴美国经验的基础之上,我国目前可以通过加强身份信息保密规则的制定、增加反报复保护制度、增设吹哨人权益救济制度来完善证券市场吹哨人保护制度,更好地保护吹哨人的合法权益。 展开更多
关键词 证券市场吹哨人 身份信息保密制度 反报复保护制度 权益救济制度
下载PDF
心理咨询保密豁免规则的立法构建
18
作者 任静 赵依凡 李筱永 《医学与哲学》 北大核心 2024年第2期61-66,共6页
《中华人民共和国精神卫生法》首次对心理咨询人员的保密义务做出原则性规定,与《中华人民共和国民法典》等法律规范形成了框架,但实践要求下保密豁免情形尚未形成系统性规则。基于隐私权保护和专业信任关系,探讨心理咨询保密义务的来源... 《中华人民共和国精神卫生法》首次对心理咨询人员的保密义务做出原则性规定,与《中华人民共和国民法典》等法律规范形成了框架,但实践要求下保密豁免情形尚未形成系统性规则。基于隐私权保护和专业信任关系,探讨心理咨询保密义务的来源,提出遵循来访者对隐私的自我决定和“权益位阶理论”下保密豁免的正当性。明确心理咨询人员在涉及公共安全等利益时负有配合调查义务,面临自然人生命健康可能遭受非法侵害时的预警和保护义务以及针对未成年人和成年心智障碍者的强制报告义务,以期促进保障隐私权益和周全更优位利益的平衡。 展开更多
关键词 心理咨询 隐私权 保密义务 保密义务豁免
下载PDF
基于动态完整性度量的机密计算运行时监控方案
19
作者 李为 冯伟 +1 位作者 秦宇 冯登国 《计算机研究与发展》 EI CSCD 北大核心 2024年第10期2482-2500,共19页
机密计算(confidential computing,CC)技术基于硬件可信执行环境(TEE),通过隔离、完整性度量和远程证明等技术保护使用中数据的机密性和完整性,并免受特权敌手的攻击.然而,现有机密计算平台的完整性度量和远程证明机制主要针对启动时,... 机密计算(confidential computing,CC)技术基于硬件可信执行环境(TEE),通过隔离、完整性度量和远程证明等技术保护使用中数据的机密性和完整性,并免受特权敌手的攻击.然而,现有机密计算平台的完整性度量和远程证明机制主要针对启动时,而缺少运行时完整性保护,例如当用户工作负载潜在的内存漏洞被敌手利用时容易遭受控制流劫持等攻击,目前仅包含启动时完整性保护的机密计算平台无法有效防止或者检测此类运行时攻击.针对该问题,提出了一种基于动态完整性度量的机密计算运行时监控方案,通过向TEE中引入控制流和数据流度量,并扩展可信验证方功能以进行运行时远程证明,实现了机密计算平台内用户工作负载的运行时完整性保护.使用CSV/SEV服务器作为机密计算平台,在其机密虚拟机/容器基础上进行了系统原型实现与实验评估,评估结果表明,方案在增强运行时安全性的同时,引入了约16%的性能损耗. 展开更多
关键词 机密计算 可信执行环境 运行时证明 控制流完整性 数据流完整性
下载PDF
全密态数据库密态计算关键技术综述
20
作者 毕树人 钮泽平 +1 位作者 李国良 李琦 《软件学报》 EI CSCD 北大核心 2024年第8期3980-4010,共31页
随着近些年云服务的流行,越来越多的企业和个人将数据存储在云数据库上.但在享受云服务便利的同时,也带来数据安全的问题.其中一个比较关键的问题是敏感数据的机密性保护,即保护用户的敏感数据不被窥探和泄漏.在这样的背景下,全密态数... 随着近些年云服务的流行,越来越多的企业和个人将数据存储在云数据库上.但在享受云服务便利的同时,也带来数据安全的问题.其中一个比较关键的问题是敏感数据的机密性保护,即保护用户的敏感数据不被窥探和泄漏.在这样的背景下,全密态数据库应运而生.相对于传统数据库,全密态数据库能够在数据的传输、存储和计算整个生命周期中对数据进行加密,保护数据的机密性.目前,在对数据加密的同时,支持所有SQL功能并保持高性能等方面还存在很多挑战.全面调研全密态数据库密态计算的关键技术,根据技术类型进行归纳分类,并在功能性、安全性和性能等方面进行对比与总结.首先介绍全密态数据库架构,包括基于加密算法的纯软件架构、基于可信执行环境(TEE)的可信硬件架构和软硬融合式架构.然后,总结归纳各个架构的关键技术.最后,讨论当前研究的挑战和机会,并提供一些未来研究的开放性问题. 展开更多
关键词 全密态数据库 机密性保护 加密算法 可信执行环境(TEE)
下载PDF
上一页 1 2 64 下一页 到第
使用帮助 返回顶部