logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Privacy Computing Theory And Technology 1st Li Fenghua Li Hui

  • SKU: BELL-55645468
Privacy Computing Theory And Technology 1st Li Fenghua Li Hui
$ 31.00 $ 45.00 (-31%)

4.1

40 reviews

Privacy Computing Theory And Technology 1st Li Fenghua Li Hui instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 7.59 MB
Pages: 218
Author: Li, Fenghua, Li, Hui, Niu, Ben
ISBN: 9789819949427, 9819949424
Language: English
Year: 2024
Edition: 1st

Product desciption

Privacy Computing Theory And Technology 1st Li Fenghua Li Hui by Li, Fenghua, Li, Hui, Niu, Ben 9789819949427, 9819949424 instant download after payment.

The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.

Related Products