Protecting security and privacy

被引:0
|
作者
Kohno, Tadayoshi [1 ]
机构
[1] Univ Washington, Dept Comp Sci & Engn, Seattle, WA 98195 USA
关键词
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
引用
收藏
页码:36 / 36
页数:1
相关论文
共 50 条
  • [1] Protecting Patient Privacy and Data Security
    Taitsman, Julie K.
    Grimm, Christi Macrina
    Agrawal, Shantanu
    [J]. NEW ENGLAND JOURNAL OF MEDICINE, 2013, 368 (11): : 977 - 979
  • [2] Privacy and Security - Protecting Patients' Health Information
    Hoffman, Sharona
    [J]. NEW ENGLAND JOURNAL OF MEDICINE, 2022, 387 (21): : 1913 - 1916
  • [3] The Use of Security Cameras with Privacy Protecting Ability
    Prashyanusorn, Vacharee
    Prashyanusorn, Paiboon
    Kaviya, Somkuan
    Fujii, Yusaku
    Yupapin, Preecha P.
    [J]. 2ND INTERNATIONAL SCIENCE, SOCIAL SCIENCE, ENGINEERING AND ENERGY CONFERENCE 2010 (I-SEEC 2010), 2011, 8 : 301 - 307
  • [4] Security Module Protecting the Privacy of Mobile Communication
    Starikovskiy, Andrey
    Panfilov, Leonid
    Chugunkov, Ilya
    [J]. BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA) FOR YOUNG SCIENTISTS, 2018, 636 : 308 - 317
  • [5] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319
  • [6] Double Security Guarantee: Protecting User Privacy and Model Security in QoS Prediction
    Xu, Jianlong
    Xu, Zhuo
    Lin, Jian
    She, Weiwei
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2022), 2022, : 140 - 145
  • [7] A Banking Chatbot Security Control Procedure for Protecting User Data Security and Privacy
    Lai, Sen-Tarng
    Leu, Fang-Yie
    Lin, Jeng-Wei
    [J]. ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 561 - 571
  • [8] Gemini: A lightweight virtualization architecture for protecting privacy and security of smartphone
    Liao, Shichao
    Yang, Xia
    Guo, Wensheng
    Sun, Haiyong
    Jiang, Zhixiang
    Zhao, Xiaoyan
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS) - PROCEEDINGS, 2016, : 186 - 191
  • [9] Economic perspective analysis of protecting big data security and privacy
    Tao, Hai
    Bhuiyan, Md Zakirul Alam
    Rahman, Md Arafatur
    Wang, Guojun
    Wang, Tian
    Ahmed, Md Manjur
    Li, Jing
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 98 : 660 - 671
  • [10] The silver bullet: Protecting privacy and security through law and technology
    Rosen, Jeffrey
    [J]. PROCEEDINGS OF THE AMERICAN PHILOSOPHICAL SOCIETY, 2007, 151 (03) : 291 - 299