搜索资源列表
2
- People have difficulty remembering multiple passwords. This results in reduced security as users reuse the same password for different systems or reveal other passwords as they try to log in. It can also lead to reduced privacy, as users may
Cryptography_Developers
- Cryptography for developers eBook by Tom St Denis, Simon Johnson. -Special examples of Cryptography goals: Privacy, Integrity, Authentication -Full Discussion of Large Integer Arithmetic, Public Key Algoritms
r
- Investigating Privacy-Sensitive Features for Speech Detection in Multiparty Conversations (2)
microsoft-spy
- 微软产品隐私监控方案,包含架构规范及详细记录-Privacy Survalence Solution for Microsoft Products, Architecture and detailed information included
PROVIDING-PRIVACY-PRESERVING-IN-CLOUD-COMPUTING.r
- IT Auditing to Assure a Secure Cloud Computing Aim:- Securing private data in a cloud. Existing System:- Securing data in a cloud is not done in the existing system. The administrator will remove the data of a private user without intimatin
PAM-AN-EFFICIENT-AND-PRIVACY-AWARE-MONITORING-FRA
- PAM AN EFFICIENT AND PRIVACY-AWARE MONITORING FRAMEWORK FOR CONTINUOUSLY MOVING OBJECTS.rar
(2002)-Smart-cards
- (2002) Smart cards and biometrics in privacy-sensitive secur
17427278
- 本书介绍硬件电路PCB layout很齐全的电气完整性分析,是画pCB必读课本-The book is introduced textbooks hardware circuit PCB layout very complete analysis of the electrical integrity the painting pCB Privacy Policy
pollingsystem
- HAVA requires each polling location have at least one voting system accessible to individuals with disabilities, including nonvisual accessibility for the blind and visually impaired, in a manner that provides the same opportunity for access and part
FULLTEXT01
- Security and Privacy in RFID Applications
Complete-Doc
- Abstract—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing thi
Privacy-in-Social-Networks
- It is a presentation related to privacy in social networks.
hyperlink_demo
- 拉响Android手机QQ安全警报:聊天记录查看器的编写完整实例,附技术文档,说的很有深意,详细介绍了手机在获得ROOT权限后,使用QQ可能对用户隐私带来的极大的危害。从另一方面也说明了手机Root权限后,所带来的安全风险。程序首先运行到QQ相关的目录获取数据库,然后复制到自身目录下,通过Android提供的Sqlite操作类对数据进行解析-Android phone QQ security alarm sounded: chat log viewer to write complete exa
Gmatch-Secure-and-Privacy-Preserving-Group-Matchi
- Gmatch Secure and Privacy-Preserving Group Matching in Social Networks
applausl
- Privacy Preserving and Collusion Resistance in aLocation Proof Updating System Abstract: APPLAUS generate location proofs and sends the updates to a location proof server Pseudonyms are used to protect source location privacy from the attacker
06002066
- WATERMARKING ALGORIHTM TO IMPROVE THE IMAGE PRIVACY PRESERVING
drilling-vibration-
- 调用matlab程序,利用凸包原理,实现了钻柱振动监测,程序源代码可见,但实测数据保密-Call matlab procedures, the use of convex hull principle, to achieve the drill string vibration monitoring, program source code visible, but the measured data privacy
Design-and-Analysis-of-a-Highly-User-Friendly
- Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method
Supporting-Privacy-Protection-in-Personalized
- .The content is too simple 2.Is not a sourcecode or document 3.lost some files 4.Descr iption is not detailed or not correct 5.Compressed file has password 6.Sourcecode duplicate or already exist
report(131140702005)
- This not important . relented work for overlapping slicing it used in government for privacy preserving-This is not important . relented work for overlapping slicing it used in government for privacy preserving