000 | 03958nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-981-99-4943-4 | ||
003 | DE-He213 | ||
005 | 20250516155955.0 | ||
007 | cr nn 008mamaa | ||
008 | 240212s2024 si | s |||| 0|eng d | ||
020 |
_a9789819949434 _9978-981-99-4943-4 |
||
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
100 | 1 |
_aLi, Fenghua. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aPrivacy Computing _h[electronic resource] : _bTheory and Technology / _cby Fenghua Li, Hui Li, Ben Niu. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXIV, 204 p. 54 illus., 42 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aChapter 1 Introduction -- Chapter 2 Privacy Protection Related Technologies -- Chapter 3 Privacy Computing Theory -- Chapter 4 Privacy Computing Technology -- Chapter 5 The future trend of privacy computing. | |
520 | _aThe continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aComputational intelligence. | |
650 | 0 |
_aData protection _xLaw and legislation. |
|
650 | 0 | _aData protection. | |
650 | 0 |
_aArtificial intelligence _xData processing. |
|
650 | 1 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aPrivacy. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aData Science. |
700 | 1 |
_aLi, Hui. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aNiu, Ben. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819949427 |
776 | 0 | 8 |
_iPrinted edition: _z9789819949441 |
776 | 0 | 8 |
_iPrinted edition: _z9789819949458 |
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-981-99-4943-4 |
912 | _aZDB-2-INR | ||
912 | _aZDB-2-SXIT | ||
942 | _cLIBRO_ELEC | ||
999 |
_c274176 _d274175 |