000 03958nam a22005775i 4500
001 978-981-99-4943-4
003 DE-He213
005 20250516155955.0
007 cr nn 008mamaa
008 240212s2024 si | s |||| 0|eng d
020 _a9789819949434
_9978-981-99-4943-4
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
100 1 _aLi, Fenghua.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aPrivacy Computing
_h[electronic resource] :
_bTheory and Technology /
_cby Fenghua Li, Hui Li, Ben Niu.
250 _a1st ed. 2024.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2024.
300 _aXIV, 204 p. 54 illus., 42 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1 Introduction -- Chapter 2 Privacy Protection Related Technologies -- Chapter 3 Privacy Computing Theory -- Chapter 4 Privacy Computing Technology -- Chapter 5 The future trend of privacy computing.
520 _aThe continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.
541 _fUABC ;
_cPerpetuidad
650 0 _aComputational intelligence.
650 0 _aData protection
_xLaw and legislation.
650 0 _aData protection.
650 0 _aArtificial intelligence
_xData processing.
650 1 4 _aComputational Intelligence.
650 2 4 _aPrivacy.
650 2 4 _aData and Information Security.
650 2 4 _aData Science.
700 1 _aLi, Hui.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aNiu, Ben.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819949427
776 0 8 _iPrinted edition:
_z9789819949441
776 0 8 _iPrinted edition:
_z9789819949458
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-981-99-4943-4
912 _aZDB-2-INR
912 _aZDB-2-SXIT
942 _cLIBRO_ELEC
999 _c274176
_d274175