Results 241 to 250 of about 13,332,800 (308)
Some of the next articles are maybe not open access.

Medical Information Protection Frameworks for Smart Healthcare based on IoT

Web Intelligence, Mining and Semantics, 2019
The smart healthcare area is expanding its application to telemedicine, mobile health, EHR/EMR/PHR, wireless medical services, and precision medicine through a combination of Internet of Things (IoT) technologies.
Junho Choi   +3 more
semanticscholar   +1 more source

A new two-level information protection scheme based on visual cryptography and QR code with multiple decryptions

Measurement, 2019
Nowadays, Quick Response (QR) code has been used in many fields due to its advantages, such as reliability, high-speed scanning and large data capacity. However, embedding the privacy information into the QR code lacks adequate security protection.
Zhengxin Fu   +3 more
semanticscholar   +1 more source

China’s personal information protection in a data-driven economy: A privacy policy study of Alibaba, Baidu and Tencent

Global Media and Communication, 2019
By examining the privacy policies of leading Chinese Internet and information service providers (IISPs), this study found their privacy policies to be generally compliant with China’s personal information protection provisions.
Tao Fu
semanticscholar   +1 more source

Privacy and information protection for a new generation of city services

Proceedings of the 2nd ACM/EIGSCC Symposium on Smart Cities and Communities, 2019
This paper will showcase the work that the City of Portland has done around developing Privacy and Information Protection Principles considering the current state of technology, the social digital age, and advance inference algorithms like machine ...
Hector Dominguez   +4 more
semanticscholar   +1 more source

Information protection and information security

2020
The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems ...
openaire   +1 more source

Research of Information Protection System of Corporate Network Based on GNS3

2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), 2019
The simulation model of the corporate network protection system based on GNS3 is constructed. The GNS3 program is a graphical network emulator that allows to simulate a virtual network of more than 20 different manufacturers on a local computer, attach a
B. Korniyenko, L. Galata, L. Ladieva
semanticscholar   +1 more source

The Method of the Cryptographic Information Protection in IT -Systems

2019 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS), 2019
The subject is the information communication in IT- systems. The goal is the information protection. The method used is the cryptography with secret key. The information is transferred between the devices in IT-system. The open communication channels are
N. V. Sukhanova, R. S. Nakhushev
semanticscholar   +1 more source

Protecting Personal Information

2017
Introduction When you think about your privacy, you may care a great deal about your personal information. Notice the possessive pronoun: you may think about information about you as “yours,” maybe even as your property.
Leslie P. Francis, John G. Francis
openaire   +1 more source

Protection of Information

2016
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be ...
openaire   +1 more source

Information Protection

MILCOM 1987 - IEEE Military Communications Conference - Crisis Communications: The Promise and Reality, 1987
openaire   +2 more sources

Home - About - Disclaimer - Privacy