Paper Title:
Privacy Protection Schemes against Easy Information Access
  Abstract

Information technology greatly facilitates our lives, and at the same time, people are able to invade personal privacy more easily than never before with the aid of recent technological advances. Reasons for this are discussed. Different protection models to meet the challenge are compared and a proper and improved one is proposed.

  Info
Periodical
Edited by
Qi Luo
Pages
2152-2157
DOI
10.4028/www.scientific.net/AMM.58-60.2152
Citation
B. G. Hong, "Privacy Protection Schemes against Easy Information Access", Applied Mechanics and Materials, Vols. 58-60, pp. 2152-2157, 2011
Online since
June 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Wan Mei Zhao, Rui Wang, Xue Zheng Zhang
Chapter 6: Mechatronics, Automation, Control, Net and Information Technologies, Simulation and Modelling
Abstract:Internet of Things (IOT) is considered as an important part of the new generation of information technology and the problem of data security...
706
Authors: Li Ping Hao, Yi Hui Chen
Chapter 2: Information Technologies and Information Processing Algorithms
Abstract:Cloud computing is the most anticipated revolution in the computer field. It has the ability to distribute the resource dynamically....
2350
Authors: Xiang Min Ren, Bo Xuan Jia, Ke Chao Wang, Jian Cheng
Chapter 6: Communications and Network Technologies
Abstract:Social network is a collection of interrelated social actors, including individuals, groups, organizations, enterprises, even countries, is...
701