A Study On Data Transformation For Privacy Protection
碩士 === 國防管理學院 === 國防資訊研究所 === 96 === The popularization of internet and information cause the facility and quickly development for collecting data in all kinds of careers. However, those original unprotected data will be leaked by manager’s omission, ego trip, or hackers’ attack and so on. While tho...
Main Authors: | Jen-Chung Wang, 王仁中 |
---|---|
Other Authors: | Hsiang-Jung Tsai |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/51458509797159370210 |
Similar Items
-
Authentication and Key Agreement in Various Communication Environments for User Privacy Protection
by: Ren-Chiun Wang, et al.
Published: (2010) -
PRIVACY AND DATA PROTECTION
by: L. Determann
Published: (2019-06-01) -
Study of Personal Privacy Information Protection Operation In Government Agencies
by: Liang-Chung Yuan, et al.
Published: (2013) -
Protection of Big Data Privacy
by: Abid Mehmood, et al.
Published: (2016-01-01) -
Protection of Privacy in Biometric Data
by: Iynkaran Natgunanathan, et al.
Published: (2016-01-01)