Font Size: a A A
Keyword [Protect]
Result: 181 - 200 | Page: 10 of 10
181. Efficient Intrusion Detection and Prevention System to Protect Private Data Stored in Mobile Devices
182. To protect the children: An examination of arguments for the content regulation of mass media
183. The firewall mobile customs agent: A distributed firewall architecture
184. Privacy Protection and Personalized Services for Mobile Users
185. USBWall: A Novel Security Mechanism to Protect Against Maliciously Reprogrammed USB Devices
186. Geoprivacy: Location Masking Strategies and Personal Identification Ris
187. Protect Sensitive Computing Using Program Transformation And Trusted Execution Environment
188. Research On Integrity Verification Of Query Results In Cloud Computing
189. Research On Secure Multi-Party Computing Privacy Protection Technology Based On Blockchain
190. Control Flow Obfuscation Using Neural Network To Protect The Logic Information Of Program In Cloud Computing
191. High-power IGBT Module Overvoltage Suppression And Short Circuit Protection Research
192. Research On The Motivation Of Co-owners To Protect The Privacy Of Original Owners From The Perspective Of Information Sensitivity
193. Research On The Privacy Protection Of Social Media Users In The Era Of Big Date
194. Design And Implementation Of Prototype System Of Digital Asset Right Confirmation Based On Consortium Chain
195. Interference Effect Of HPM On A Low Noise Amplifier With A PIN Limiter
196. Research On Multi-keyword Sorting And Searching Scheme Of Outsourcing Data With Privacy Protection
197. Research On Searchable Encryption Technology To Protect The Integrity Of Search Results
198. Research On Location Privacy Protect Algorithm Based On The Semantic Quantification Of Location
199. PyReunpacker: An Automatic Unpack System Base On Dynamic Analysis
200. Research On Lightweight Federated Learning Based On CDH Problem To Protect Data Privacy And Ensure Model Accuracy
  <<First  <Prev  Next>  Last>>  Jump to