Font Size: a A A
Keyword [privacy policy]
Result: 21 - 40 | Page: 2 of 3
21. Research On Ontology-Based Privacy Protection Method For Access Control In Big Data Environment
22. Privacy Policy Negotiation Method Research And Realization Based On User And Services Characteristics In M-commerce Environment
23. Privacy Policy Fusion Based On Fuzzy Rule Reasoning
24. Study On The Revelation Of The Revision Of The British Library Privacy Policy To China
25. Design And Implemetion Of Consistency Detection And Generation Technology For Privacy Policy Of IOS Apps
26. Research On The Privacy Protection Policy Of Social Media
27. Research On Domestic Mobile Internet Privacy Protection Risk And Privacy Security Reconstruction Path
28. Research On Information Protection In The Fuzzy Zone Of Mobile Phone Media Privacy
29. Cross-age Data Collection And Research On Privacy Protection Of Minors
30. Towards verifiable privacy policy compliance of an actor-based electronic medical record system: An extension to the HAPL language focused on exposing a user interface
31. The ethics of data privacy in an electronic marketplace: A multiple case study of the privacy policy notice and the incorporation of fair information practice principles
32. Privacy in the Smart City: Implications of Sensor Network Design, Law, and Policy for Locational Privac
33. Research On Key Technologies Of Privacy Protection And Compliance On Big Data Platform
34. Research On The Influence Of App Users' Privacy Policy Reading Willingness ——An Experiment Based On Eye Tracking
35. Research On The Influence Mechanism Of User's Privacy Risk Memory And Privacy Policy On Self-disclosure
36. Research On User's Perceived Privacy Risk Of Algorithmic Recommendation News
37. Research And Implementation Of Consistency Analysis Engine For Android Application Privacy Policy And Permission Usage
38. Research On Android Malware And Privacy Leak Detection Method Based On Sensitive Data Flow
39. Detection Of Permission Abuse Behaviors For Android Applications
40. Research And Implementation Of Adversarial Attacks On Personal Information Leakage Detection Model
  <<First  <Prev  Next>  Last>>  Jump to