期刊文献+
共找到1,876篇文章
< 1 2 94 >
每页显示 20 50 100
The Way to Optimize the Right to Personal Data Portability in Chinese Practice——Based on Empirical Analysis of the Privacy Policies of 66 Mobile Apps
1
作者 LI Jinhua 《The Journal of Human Rights》 2024年第3期637-661,共25页
Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through e... Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability. 展开更多
关键词 right to personal data portability right to consulta-tion and duplication right to data transfer privacy policy techni-cal operability
下载PDF
On the Nature of Online Retrieval of Electronic Data
2
作者 WU Yingfei NI Weisi 《The Journal of Human Rights》 2024年第4期876-903,共28页
With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online... With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online retrieval of electronic data is positioned as a new type of arbitrary investigative measure.However,study of its actual operation has found that the online retrieval of electronic data does not fully comply with the characteristics of arbitrary investigative measures.The root cause is its inaccurately defined nature due to analogy errors,an emphasis on the authenticity of electronic data at the cost of rights protection,insufficient effectiveness of normative documents to break through the boundaries of law,and superficial inconsistency found in the mechanical comparison with the nature of existing investigative measures causes.The nature of electronic data retrieved online should be defined according to different circumstances.The retrieval of electronic data disclosed on the Internet is an arbitrary investigative measure,and following procedural specifications should be sufficient.When investigators conceal their true identities and enter the cyberspace of the suspected crime through a registered account to extract dynamic electronic data for criminal activities,it is essentially a covert investigation in cyberspace,and they should follow the normative requirements for covert investigations.The retrieval of dynamic electronic data from private spaces is a technical investigative measure and should be implemented in accordance with the technical investigative procedures.Retrieval of remote“non-public electronic data involving privacy”is a mandatory investigative measure,and is essentially a search in the virtual space.Therefore,procedural specifications should be set in accordance with the standards of searching. 展开更多
关键词 electronic data online retrieval compulsory investigation SEARCH right to privacy
下载PDF
Ending Privacy’s Gremlin: Stopping the Data-Broker Loophole to the Fourth Amendment’s Search Warrant Requirement
3
作者 Samantha B. Larkin Shakour Abuzneid 《Journal of Information Security》 2024年第4期589-611,共23页
Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about... Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about individual Americans derived from consumer use of the internet and connected devices. Data profiles are then sold for profit. Government investigators use a legal loophole to purchase this data instead of obtaining a search warrant, which the Fourth Amendment would otherwise require. Consumers have lacked a reasonable means to fight or correct the information data brokers collect. Americans may not even be aware of the risks of data aggregation, which upends the test of reasonable expectations used in a search warrant analysis. Data aggregation should be controlled and regulated, which is the direction some privacy laws take. Legislatures must step forward to safeguard against shadowy data-profiling practices, whether abroad or at home. In the meantime, courts can modify their search warrant analysis by including data privacy principles. 展开更多
关键词 Access Control Access Rights Artificial intelligence Consumer Behavior Consumer Protection Criminal Law Data Brokers Data Handling Data Privacy Data Processing Data Profiling Digital Forensics
下载PDF
Brief Analysis on the Right of Privacy in a Perspective of Law and Economic
4
作者 XUE Yang 《Review of Global Academics》 2015年第2期528-531,共4页
The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information... The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information would be obtained by illegal means, and the research on the protection of privacy had increasingly aroused people's concern. The right of privacy not only had the usually outside personality characteristics, but also had a certain characteristics of property. This paper had attempted to study the right of privacy from the perspective of law and economics by interpreting the property in the right of privacy, in order to perfect the protection system of privacy in our country. 展开更多
关键词 Right of privacy Law and Economic Right of property Costs and benefits
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
5
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
The (Impossible) Art of Balancing National Security and Privacy in a Global Context
6
作者 Anne Gerdes 《Journal of Philosophy Study》 2018年第4期183-190,共8页
This paper highlights the work of collaborating European journalists, who in a series of articles, under the heading "Security for Sale-the Price we pay to protect Europeans", problematise the European Union Funding... This paper highlights the work of collaborating European journalists, who in a series of articles, under the heading "Security for Sale-the Price we pay to protect Europeans", problematise the European Union Funding framework for security technology research, which unfortunately may enhance business opportunities for mass surveillance systems in non-democratic states. Based on a case, involving a research project in which I participated as an ethical adviser, the paper illustrates how a lack of global perspectives constitutes a weakness inherent in methodologies within design ethics, such as Privacy professional idealism (Mitcham 2003), by Design and value sensitive the paper concludes by arguing outlook, which goes beyond the walled gardens oft^e European Union design. Finally, drawing on the notion of in favour of moral activism from a global 展开更多
关键词 security technology PRIVACY GLOBALIZATION human rights value-focused design
下载PDF
On the protection of the right of privacy of patients by the civil law
7
作者 Liu Lina 《International English Education Research》 2015年第8期53-54,共2页
The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circums... The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circumstances, we must offer the maximum protection of the privacy of the patients. From the point of view of the civil law, the medical institutions or the medical professionals must respect the patients, and protect the patients' privacy, so as to build a more harmonious relationship between the doctors and the patients. 展开更多
关键词 PATIENTS right of privacy civil law PROTECTION
下载PDF
Judicial Protection of Internet Privacy: Subject of Tort, Standard and Forms of Liability
8
作者 胡昌明 ZHANG Wenhong 《The Journal of Human Rights》 2017年第4期356-367,共12页
As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s Genera... As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s General Principles of Civil Law and Tort Law. However, in judicial practice, there has been no unified standard in defining a tort of privacy, especially a tort of internet privacy. With the increasing popularity of the internet, torts of internet privacy are becoming more and more rampant and severe. Focusing on "internet hunts", a common tort of internet privacy, this paper examines how to affirm a tortious act of internet privacy, as well as forms of liability. It also expounds the practical judicial issues such as the object of prosecution trials. 展开更多
关键词 right to privacy tort of internet privacy internet Mass Hunting judicial practice
下载PDF
The Internet of Things and Next-generation Public Health Information Systems 被引量:2
9
作者 Robert Steele Andrew Clarke 《Communications and Network》 2013年第3期4-9,共6页
The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and ... The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and use of health and fitness sensors, wearable sensor patches, smart watches, wireless-enabled digital tattoos and ambient sensors;and (3) The nature of public health to implicitly involve connectivity with and the acquisition of data in relation to large numbers of individuals up to population scale. Of particular relevance in relation to the Internet of Things (IoT) and public health is the need for privacy and anonymity of users. It should be noted that IoT capabilities are not inconsistent with maintaining privacy, due to the focus of public health on aggregate data not individual data and broad public health interventions. In addition, public health information systems utilizing IoT capabilities can be constructed to specifically ensure privacy, security and anonymity, as has been developed and evaluated in this work. In this paper we describe the particular characteristics of the IoT that can play a role in enabling emerging public health capabilities;we describe a privacy-preserving IoT-based public health information system architecture;and provide a privacy evaluation. 展开更多
关键词 internet of THinGS Public HEALTH Population HEALTH Privacy ANONYMITY
下载PDF
The Improvement of China’s AIDS Notification System from the Perspective of Human Rights
10
作者 毛俊响 周蓉 HU Liang 《The Journal of Human Rights》 2019年第1期31-45,共15页
China has established a two-level normative structure AIDS notification system with the AIDS Prevention and control Regulations as the core and local regulations as the supplement The problem is that the local legisla... China has established a two-level normative structure AIDS notification system with the AIDS Prevention and control Regulations as the core and local regulations as the supplement The problem is that the local legislations have different provisions with regard to the subject of notification and whether to adopt mandatory notification, which confronts the implementation of the AIDS notification system and the prevention of AIDS transmission with real difficulties The different attitudes of local legislations to the mandatory notification system for AIDS essentially reflects the dilemma of legislators in balancing the right to privacy of HIV-infected patients and the right to health of their sexual partners from the perspective of rights limitations, this paper aims to conducts interest balance analysis in the aspects of social urgency, public interest, substantive damage and the right to know of others and holds the view that when these two rights conflict with each other, priority should be given to the right to health of HIV-infected patients and their sexual partner as well as public health In terms of specific systems, the AIDS Prevention and control Regulations should establish a mandatory notification system and local legislation should take into consideration of local conditions to make specific provisions on issues of notification subject, notification procedures and confidentiality obligations after notification. 展开更多
关键词 AIDS NOTIFICATION SYSTEM RIGHT to PRIVACY RIGHT to health
下载PDF
Voluntary and Compulsory "AIDS" Screening from the Perspective of Human Rights:A Study Based on HIV Exceptionalism
11
作者 吴丹盈 李冠翔 《The Journal of Human Rights》 2019年第2期207-219,共13页
HIV screening can be used to detect,control and prevent the spread of HIV/AIDS.The attitude towards HIV screening relates to the general trend of human rights protection of AIDS sufferers and infectors.HIV exceptional... HIV screening can be used to detect,control and prevent the spread of HIV/AIDS.The attitude towards HIV screening relates to the general trend of human rights protection of AIDS sufferers and infectors.HIV exceptionalism has been adopted in traditional international practice.That means the specific notified,voluntary consent shall be obtained from examinees before they are screened.However,there is move to abandon HIV exceptionalism in order to detect more infectors and treat AIDS the same as another infectious disease.This has resulted in 'compulsory screening' and 'consent after notification'.In China, 'voluntary' screening, 'real-name detection' and 'compulsory screening' exist in different regions.Thus,it is crucial to identify the legal regulation principle of HIV screening from the perspective of human rights. 展开更多
关键词 HIV screening international EXCEPTIONALISM consentafter NOTIFICATION human RIGHT RIGHT of privacy
下载PDF
Federation Boosting Tree for Originator Rights Protection
12
作者 Yinggang Sun Hongguo Zhang +3 位作者 Chao Ma Hai Huang Dongyang Zhan Jiaxing Qu 《Computers, Materials & Continua》 SCIE EI 2023年第2期4043-4058,共16页
The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all... The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all data in a central storage point.In the current horizontal federated learning scheme,each participant gets the final jointly trained model.No solution is proposed for scenarios where participants only provide training data in exchange for benefits,but do not care about the final jointly trained model.Therefore,this paper proposes a newboosted tree algorithm,calledRPBT(the originator Rights Protected federated Boosted Tree algorithm).Compared with the current horizontal federal learning algorithm,each participant will obtain the final jointly trained model.RPBT can guarantee that the local data of the participants will not be leaked,while the final jointly trained model cannot be obtained.It is worth mentioning that,from the perspective of the participants,the scheme uses the batch idea to make the participants participate in the training in random batches.Therefore,this scheme is more suitable for scenarios where a large number of participants are jointly modeling.Furthermore,a small number of participants will not actually participate in the joint training process.Therefore,the proposed scheme is more secure.Theoretical analysis and experimental evaluations show that RPBT is secure,accurate and efficient. 展开更多
关键词 Federated learning data privacy rights protection decision tree
下载PDF
Towards Privacy-Preserving Cloud Storage:A Blockchain Approach 被引量:3
13
作者 Jia-Shun Zhang Gang Xu +3 位作者 Xiu-Bo Chen Haseeb Ahmad Xin Liu Wen Liu 《Computers, Materials & Continua》 SCIE EI 2021年第12期2903-2916,共14页
With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice m... With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice manner through the network,realizing business expansion and rapid innovation.However,due to the insufficient protection of data privacy,the problem of data privacy leakage in cloud storage is threatening cloud computing.To address the problem,we propose BC-PECK,a data protection scheme based on blockchain and public key searchable encryption.Firstly,all the data is protected by the encryption algorithm.The privacy data is encrypted and stored in a cloud server,while the ciphertext index is established by a public key searchable encryption scheme and stored on the blockchain.Secondly,based on the characteristics of trusted execution of smart contract technology,a control mechanism for data accessing and sharing is given.Data transaction is automatically recorded on the blockchain,which is fairer under the premise of ensuring the privacy and security of the data sharing process.Finally,we analyzed the security and fairness of the current scheme.Through the comparison with similar schemes,we have shown the advantages of the proposed scheme. 展开更多
关键词 Blockchain privacy protection smart contract public encryption keyword search
下载PDF
Graph publishing method based on differential privacy protection
14
作者 Wang Junli Yang Li +1 位作者 Wu Yuxi Guan Min 《High Technology Letters》 EI CAS 2018年第2期134-141,共8页
There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection... There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection that can provide rigorous and quantitative protection. Concerning the application of differential privacy in social networks,this paper analyzes current trends of research and provides some background information including privacy protection standards and noise mechanisms.Focusing on the privacy protection of social network data publishing,a graph-publishing model is designed to provide differential privacy in social networks via three steps: Firstly,according to the features of social network where two nodes that possess certain common properties are associated with a higher probability,a raw graph is divided into several disconnected sub-graphs,and correspondingly dense adjacent matrixes and the number of bridges are obtained. Secondly,taking the advantage of quad-trees,dense region exploration of the adjacent matrixes is conducted. Finally,using an exponential mechanism and leaf nodes of quad-trees,an adjacent matrix of the sanitized graph is reconstructed. In addition,a set of experiments is conducted to evaluate its feasibility,availability and strengths using three analysis techniques: degree distribution,shortest path,and clustering coefficients. 展开更多
关键词 differential privacy social network data publication
下载PDF
Privacy in Internet Age
15
作者 李艳 《海外英语》 2011年第9X期385-388,390,共5页
These years have witnessed the rapid growing of internet,and we are stepping into a new age-Internet Age.But the privacy on human rights that followed has become the hot issue.This essay tries to expose the privacy fo... These years have witnessed the rapid growing of internet,and we are stepping into a new age-Internet Age.But the privacy on human rights that followed has become the hot issue.This essay tries to expose the privacy focusing on the human rights under the internet age.It illuminates the right of privacy in internet age through the origin of privacy.By the comparison of traditional understanding of privacy and expedition of privacy under internet age,the essay concludes that the right of privacy will be transmitted by internet and will influence the development of internet as well. 展开更多
关键词 PRIVACY RIGHTS of PRIVACY inTERNET
下载PDF
Differentially Private Real-Time Streaming Data Publication Based on Sliding Window Under Exponential Decay 被引量:2
16
作者 Lan Sun Chen Ge +2 位作者 Xin Huang Yingjie Wu Yan Gao 《Computers, Materials & Continua》 SCIE EI 2019年第1期61-78,共18页
Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure.The existing research on differential privacy streaming data pu... Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure.The existing research on differential privacy streaming data publication mostly pay close attention to boosting query accuracy,but pay less attention to query efficiency,and ignore the effect of timeliness on data weight.In this paper,we propose an effective algorithm of differential privacy streaming data publication under exponential decay mode.Firstly,by introducing the Fenwick tree to divide and reorganize data items in the stream,we achieve a constant time complexity for inserting a new item and getting the prefix sum.Meanwhile,we achieve time complicity linear to the number of data item for building a tree.After that,we use the advantage of matrix mechanism to deal with relevant queries and reduce the global sensitivity.In addition,we choose proper diagonal matrix further improve the range query accuracy.Finally,considering about exponential decay,every data item is weighted by the decay factor.By putting the Fenwick tree and matrix optimization together,we present complete algorithm for differentiate private real-time streaming data publication.The experiment is designed to compare the algorithm in this paper with similar algorithms for streaming data release in exponential decay.Experimental results show that the algorithm in this paper effectively improve the query efficiency while ensuring the quality of the query. 展开更多
关键词 Differential privacy STREAMinG data PUBLICATION EXPONENTIAL decay matrix mechanism SLIDinG window
下载PDF
Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains 被引量:1
17
作者 Ruizhong Du Caixia Ma Mingyue Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第1期13-26,共14页
While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information leakage.Searchable encryption technology can perform keyword searches over encry... While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information leakage.Searchable encryption technology can perform keyword searches over encrypted data while protecting their privacy and guaranteeing the integrity of the data by verifying the search results.However,some associated problems are still encountered,such as the low efficiency of verification and uncontrollable query results.Accordingly,this paper proposes a Privacy-Preserving Searchable Encryption(PPSE)scheme based on public and private blockchains.First,we store an encrypted index in a private blockchain while outsourcing corresponding encrypted documents to a public blockchain.The encrypted documents are located through the encrypted index.This method can reduce the storage overhead on the blockchains,and improve the efficiency of transaction execution and the security of stored data.Moreover,we adopt a smart contract to introduce a secondary verification access control mechanism and restrict data users’access to the private blockchain through authorization for the purpose of guaranteeing data privacy and the correctness of access control verification.Finally,the security analysis and experimental results indicate that compared with existing schemes,the proposed scheme can not only improve the security of encrypted data but also guarantee the efficiency of the query. 展开更多
关键词 private blockchain public blockchain access control forward privacy backward privacy
原文传递
Efficient Publication of Distributed and Overlapping Graph Data Under Differential Privacy
18
作者 Xu Zheng Lizong Zhang +1 位作者 Kaiyang Li Xi Zeng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第2期235-243,共9页
Graph data publication has been considered as an important step for data analysis and mining.Graph data,which provide knowledge on interactions among entities,can be locally generated and held by distributed data owne... Graph data publication has been considered as an important step for data analysis and mining.Graph data,which provide knowledge on interactions among entities,can be locally generated and held by distributed data owners.These data are usually sensitive and private,because they may be related to owners’personal activities and can be hijacked by adversaries to conduct inference attacks.Current solutions either consider private graph data as centralized contents or disregard the overlapping of graphs in distributed manners.Therefore,this work proposes a novel framework for distributed graph publication.In this framework,differential privacy is applied to justify the safety of the published contents.It includes four phases,i.e.,graph combination,plan construction sharing,data perturbation,and graph reconstruction.The published graph selection is guided by one data coordinator,and each graph is perturbed carefully with the Laplace mechanism.The problem of graph selection is formulated and proven to be NP-complete.Then,a heuristic algorithm is proposed for selection.The correctness of the combined graph and the differential privacy on all edges are analyzed.This study also discusses a scenario without a data coordinator and proposes some insights into graph publication. 展开更多
关键词 graph data distributed data publication differential privacy
原文传递
'Location Privacy'—where do we stand?
19
作者 尚进 《海外英语》 2014年第2X期177-181,共5页
With introducing Global Positioning System(GPS),one of position determination technologies,into non-military area from military locating utilities in United States,it brings both positive and negative effect into our ... With introducing Global Positioning System(GPS),one of position determination technologies,into non-military area from military locating utilities in United States,it brings both positive and negative effect into our society simultaneously.On the one hand,the location data from these new tracking and positioning system are becoming universally available for commercial,government,educational,scientific and non-profit purposes to improve people’s daily life.On the other hand,the application of GPS also raises some impact to personal location privacy,like everything else in this world which would bring us goodness invariably carries the ability to cause harm.In this article,I will briefly talk about the advantages of GPS tracking technology firstly.Then,I will analysis the problems raised by the application of GPS technology in details,such as the concerns about personal location privacy,the moral dilemma and the right dispute when using GPS tracking children or automobile.Finally,I will introduce some safeguards which can minimize the conflicts between the applications of GPS and location privacy information protection. 展开更多
关键词 Global POSITIONinG System(GPS) LOCATION based serv
下载PDF
Blockchain for public safety:A survey of techniques and applications
20
作者 Qi Wang Yi Liu 《Journal of Safety Science and Resilience》 EI CSCD 2023年第4期389-395,共7页
As an emerging technology,blockchain provides a range of advantages,such as decentralized and transparent data storage,secure access control,and enhanced data traceability.However,it is rarely applied in the field of ... As an emerging technology,blockchain provides a range of advantages,such as decentralized and transparent data storage,secure access control,and enhanced data traceability.However,it is rarely applied in the field of public safety.This paper presents an in-depth survey of blockchain technology,focusing on its potential applications and implications within the field of public safety research.We explore the practical needs of multi-party data collaboration in emergency management and discusses the applicability and value of blockchain technology in this context.Additionally,this paper introduces and compares several popular blockchain platforms.By providing a comprehensive examination of blockchain technology and its potential benefits for public safety,this paper seeks to enhance understanding of the technology’s capabilities,encourage further research,and inspire innovation in this domain. 展开更多
关键词 Blockchain Public safety Data collaboration Data privacy
原文传递
上一页 1 2 94 下一页 到第
使用帮助 返回顶部