Location:
Search - privacy data
Search list
Description: 传输资料加解密,再以非对称式加密法中...Data Encryption Standard (DES) algorithm,Fast ...经Triple DES CBC 演算法对私密金钥做加密或解 密.使用者可从网站下载NCNUCA的凭证产生程式,自行产生-data transmission encryption and decryption, with non-symmetric encryption method ... Data Encryption Standard (DES) algorithm, Fast ... by the CBC Triple DES algorithm keys to privacy encryption or decryption. Users can be downloaded from the website NCNUCA programs have proof of their own produce.
Platform: |
Size: 55296 |
Author: 工期 |
Hits:
Description: Office Password Remover 是可以瞬间破解MS Word和Excel文档文件密码工具,本人测试均不超过5秒。工作原理尚不清楚,不过使用本软件需要连接到互联网,因为要给软件服务器发送很少的数据并解密。不过大家可以放心,本软件不会泄露任何个人隐私。 本软件由看雪论坛鸡蛋壳脱壳破解,再由看雪论坛萝卜进一步破解文件大小限制,在此表示感谢。 软件已经完全汉化,除少部分非必要英文,如果用户发现翻译错误欢迎指正。-Office Password Remover can be instantaneous crack MS Word and E Excel document file password tools I tested is less than five seconds. Principle is not clear, but the use of the software needed to connect to the Internet, because the server software to give small and decryption of data. But you can rest assured that this software will not disclose any personal privacy. The software from the Forum to see snow on eggshells sabot break and then see Ice Forum radish further crack file size restrictions, in this grateful. The software has been completely finished, except for a small number of non-essential English, if users find correct translation error welcome.
Platform: |
Size: 380928 |
Author: 刘节 |
Hits:
Description: IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP encryption algorithm, the introduction of direct attacks to decrypt law, the text of PGP IDEA is the first line of defense. From the safety analysis of the IDEA-differential cryptanalysis capacity is far higher than double DES.
Description: After the compiler plugin DLL files Add cf1127 \ features \ folder, double-click CalculationFactory.exe, click "formula / toolbox", and pressed buttons, "toolbox" tab, and can be read Plug-in tools to. The remaining nine folder contains different projects, all compiled into class library, which is calculated factory plug-in DLL files.-IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP encryption algorithm, the introduction of direct attacks to decrypt law, the text of PGP IDEA is the first line of defense. From the safety analysis of the IDEA-differential cryptanalysis capacity is far higher than double DES.
Description: After the compiler plugin DLL files Add cf1127 \ features \ folder, double-click CalculationFactory.exe, click "formula/toolbox", and pressed buttons, "toolbox" tab, and can be read Plug-in tools to. The remaining nine folder contains different projects, all compiled into class library, which is calculated factory plug-in DLL files.
Platform: |
Size: 87040 |
Author: huli |
Hits:
Description: 数据隐私保护K-匿名问题的动态多次发布类似m-invarience算法-Data Privacy Protection K-anonymity problem on many occasions issued a similar dynamic m-invarience algorithm
Platform: |
Size: 6144 |
Author: 王冠 |
Hits:
Description: 基于隐私保护的数据挖掘是数据库技术重要的一部分,本文是对其发展的概述。-Privacy protection based on data mining is an important part of database technology, this article is an overview of their development.
Platform: |
Size: 114688 |
Author: 王函 |
Hits:
Description: Effi cient, Accurate and Privacy-Preserving
Data Mining for Frequent Itemsets
Platform: |
Size: 133120 |
Author: asad2001 |
Hits:
Description: privacy preserving data mining research project which is implemented in java and back end is mysql
Platform: |
Size: 149504 |
Author: kartheek588 |
Hits:
Description: IT Auditing to Assure a Secure Cloud Computing
Aim:-
Securing private data in a cloud.
Existing System:-
Securing data in a cloud is not done in the existing system. The administrator will remove the data of a private user without intimating the user.
Proposed System:-
In the proposed system if the administrator delete any data of a private user, the deleted information will be sent to the owner of the data.
Modules:-
Cloud Computing
Trusted computing platform
Platform Support Service
Platform Module-IT Auditing to Assure a Secure Cloud Computing
Aim:-
Securing private data in a cloud.
Existing System:-
Securing data in a cloud is not done in the existing system. The administrator will remove the data of a private user without intimating the user.
Proposed System:-
In the proposed system if the administrator delete any data of a private user, the deleted information will be sent to the owner of the data.
Modules:-
Cloud Computing
Trusted computing platform
Platform Support Service
Platform Module
Platform: |
Size: 1325056 |
Author: sathiyaraj124 |
Hits:
Description: Social Implications of Data Mining and Information Privacy,ISR出版的关于数据挖掘的书,这个系列的书ISR共出了五本,这是其中一本-a book about data mining published by Information science reference
Platform: |
Size: 6717440 |
Author: 浪打浮萍 |
Hits:
Description:
这是我好不容易获得的一本高性价书,Hillol Kargupta,Jiawei Han,Philip S.Yu,Rajeev Morwani,and Vipin Kumar 等编写的一本数据挖掘的经典力作,《next generation of data mining》,相信相关领域的科研人员定会有种如获至宝的喜悦!-This series aims to capture new developments and applications in data mining and knowledge discovery, while summarizing the computational tools and techniques useful in data analysis. This series encourages the integration of mathematical, statistical, and computational methods and techniques through the publication of a broad range of textbooks, reference works, and hand-books. The inclusion of concrete examples and applications is highly encouraged. The scope of the series includes, but is not limited to, titles in the areas of data mining and knowledge discovery methods and applications, modeling, algorithms, theory and foundations, data and knowledge visualization, data mining systems and tools, and privacy and security issues.
Platform: |
Size: 19233792 |
Author: youknow |
Hits:
Description: data privacy is the area where we can secure once personal information
Platform: |
Size: 1119232 |
Author: dilip |
Hits:
Description: 隐私数据加密软件,通过右键菜单可以直接加密文件,可直接打开编辑,自动存储为密文,也可打包成自解密文件。
-Privacy data encryption software, via the right-click menu can be directly encrypted files can be opened directly edit automatically stored as ciphertext, can also be packaged into a self-decrypting file.
Platform: |
Size: 1137664 |
Author: wilson |
Hits:
Description: 隐私数据加密软件,通过右键菜单可以直接加密文件,可直接打开编辑,自动存储为密文,也可打包成自解密文件。
-Privacy data encryption software, via the right-click menu can be directly encrypted files can be opened directly edit automatically stored as ciphertext, can also be packaged into a self-decrypting file.
Platform: |
Size: 1551360 |
Author: wilson |
Hits:
Description: 随着网络的普及,人们的隐私性也相对的减少了,而数据加密是保护隐私性的一种方式,我们现在几乎天天都会应用到数据加密技术,本文介绍了几种数据加密的实现方法。在应用方面,主要介绍了指纹识别技术,这个技术正逐渐在生活广泛应用起来。-With the popularity of the network, the privacy of the people is also relatively reduced, and data encryption is a way to protect the privacy of us almost every day now applied to data encryption technology, the article describes several implementations of data encryption method. In the application, introduces fingerprint recognition technology, this technology is widely used in life gradually.
Platform: |
Size: 185344 |
Author: 冬 |
Hits:
Description: IDEA was used as the symmetric cipher in early versions of the Pretty Good Privacy cryptosystem
Platform: |
Size: 106496 |
Author: raja |
Hits:
Description: Incentive Compatible Privacy-Preserving Data Analysis
Platform: |
Size: 143360 |
Author: sandy |
Hits:
Description: With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group
resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an
untrusted cloud is still a challenging issue, due to the frequent change of the membership. In this paper, we propose a secure multiowner
data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast
encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption
computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme
with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.
Platform: |
Size: 622592 |
Author: Manoj |
Hits:
Description: Privacy by design in big data
Platform: |
Size: 1684480 |
Author: Papadopoulos |
Hits:
Description: Privacy and Data Protection
Platform: |
Size: 1181696 |
Author: Papadopoulos |
Hits:
Description: Geolife GPS 轨迹数据集–用户指南
这一 GPS 轨迹数据集是在 (微软研究亚洲) Geolife 项目中收集的, 178 用户在四年 (2007年4月至 2011年10月) 期间。该数据集的 GPS 轨迹由一个时间戳点序列表示, 每一个都包含纬度、经度和高度信息。该数据集包含17621个轨迹, 总距离为1251654公里, 总持续时间为48203小时。该轨迹数据集可以应用于移动模式挖掘、用户活动识别、基于位置的社交网络、位置隐私和位置推荐等多个研究领域。(Geolife GPS track data set - User Guide The GPS trajectory data set was gathered in the Geolife project (Microsoft Research Asia) and 178 users over a four-year period (April 2007 to October 2011). The GPS trajectory of the data set is represented by a sequence of time stamps, each of which contains latitude, longitude and altitude information. The dataset contains 17621 trajectories with a total distance of 1251654 km and a total duration of 48203 hours. These trajectories record different GPS loggers and GPS telephones, and have various sampling rates. The trajectory of 91% is recorded in dense representation, for example, every 1 to 5 seconds or 5 to 10 meters per point. The trajectory data set can be used in many research fields, such as mobile pattern mining, user activity recognition, location-based social networks, location privacy and location recommendation.)
Platform: |
Size: 22576128 |
Author: 李白43 |
Hits: