Welcome![Sign In][Sign Up]
Location:
Search - data privacy

Search list

[Crack Hackdesfunc

Description: 传输资料加解密,再以非对称式加密法中...Data Encryption Standard (DES) algorithm,Fast ...经Triple DES CBC 演算法对私密金钥做加密或解 密.使用者可从网站下载NCNUCA的凭证产生程式,自行产生-data transmission encryption and decryption, with non-symmetric encryption method ... Data Encryption Standard (DES) algorithm, Fast ... by the CBC Triple DES algorithm keys to privacy encryption or decryption. Users can be downloaded from the website NCNUCA programs have proof of their own produce.
Platform: | Size: 55296 | Author: 工期 | Hits:

[Shell apiOfficePasswordRemover

Description: Office Password Remover 是可以瞬间破解MS Word和Excel文档文件密码工具,本人测试均不超过5秒。工作原理尚不清楚,不过使用本软件需要连接到互联网,因为要给软件服务器发送很少的数据并解密。不过大家可以放心,本软件不会泄露任何个人隐私。 本软件由看雪论坛鸡蛋壳脱壳破解,再由看雪论坛萝卜进一步破解文件大小限制,在此表示感谢。 软件已经完全汉化,除少部分非必要英文,如果用户发现翻译错误欢迎指正。-Office Password Remover can be instantaneous crack MS Word and E Excel document file password tools I tested is less than five seconds. Principle is not clear, but the use of the software needed to connect to the Internet, because the server software to give small and decryption of data. But you can rest assured that this software will not disclose any personal privacy. The software from the Forum to see snow on eggshells sabot break and then see Ice Forum radish further crack file size restrictions, in this grateful. The software has been completely finished, except for a small number of non-essential English, if users find correct translation error welcome.
Platform: | Size: 380928 | Author: 刘节 | Hits:

[Windows DevelopIDEA

Description: IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP encryption algorithm, the introduction of direct attacks to decrypt law, the text of PGP IDEA is the first line of defense. From the safety analysis of the IDEA-differential cryptanalysis capacity is far higher than double DES. Description: After the compiler plugin DLL files Add cf1127 \ features \ folder, double-click CalculationFactory.exe, click "formula / toolbox", and pressed buttons, "toolbox" tab, and can be read Plug-in tools to. The remaining nine folder contains different projects, all compiled into class library, which is calculated factory plug-in DLL files.-IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP encryption algorithm, the introduction of direct attacks to decrypt law, the text of PGP IDEA is the first line of defense. From the safety analysis of the IDEA-differential cryptanalysis capacity is far higher than double DES. Description: After the compiler plugin DLL files Add cf1127 \ features \ folder, double-click CalculationFactory.exe, click "formula/toolbox", and pressed buttons, "toolbox" tab, and can be read Plug-in tools to. The remaining nine folder contains different projects, all compiled into class library, which is calculated factory plug-in DLL files.
Platform: | Size: 87040 | Author: huli | Hits:

[Data structsm-in

Description: 数据隐私保护K-匿名问题的动态多次发布类似m-invarience算法-Data Privacy Protection K-anonymity problem on many occasions issued a similar dynamic m-invarience algorithm
Platform: | Size: 6144 | Author: 王冠 | Hits:

[Industry researchStateoftheartinprivacypreservingdatamining

Description: 基于隐私保护的数据挖掘是数据库技术重要的一部分,本文是对其发展的概述。-Privacy protection based on data mining is an important part of database technology, this article is an overview of their development.
Platform: | Size: 114688 | Author: 王函 | Hits:

[OtherD169A1E7d01

Description: Effi cient, Accurate and Privacy-Preserving Data Mining for Frequent Itemsets
Platform: | Size: 133120 | Author: asad2001 | Hits:

[Crack Hacknijuzhen

Description: 任意逆矩阵程序算法,可以对通信数据加密,保密性好。-Inverse matrix algorithm any program that can encrypt the communication data, privacy is good.
Platform: | Size: 3072 | Author: belimys | Hits:

[JSP/Javappdm

Description: privacy preserving data mining research project which is implemented in java and back end is mysql
Platform: | Size: 149504 | Author: kartheek588 | Hits:

[Software EngineeringPROVIDING-PRIVACY-PRESERVING-IN-CLOUD-COMPUTING.r

Description: IT Auditing to Assure a Secure Cloud Computing Aim:- Securing private data in a cloud. Existing System:- Securing data in a cloud is not done in the existing system. The administrator will remove the data of a private user without intimating the user. Proposed System:- In the proposed system if the administrator delete any data of a private user, the deleted information will be sent to the owner of the data. Modules:- Cloud Computing Trusted computing platform Platform Support Service Platform Module-IT Auditing to Assure a Secure Cloud Computing Aim:- Securing private data in a cloud. Existing System:- Securing data in a cloud is not done in the existing system. The administrator will remove the data of a private user without intimating the user. Proposed System:- In the proposed system if the administrator delete any data of a private user, the deleted information will be sent to the owner of the data. Modules:- Cloud Computing Trusted computing platform Platform Support Service Platform Module
Platform: | Size: 1325056 | Author: sathiyaraj124 | Hits:

[Mathimatics-Numerical algorithmsISR-Data-Mining-4

Description: Social Implications of Data Mining and Information Privacy,ISR出版的关于数据挖掘的书,这个系列的书ISR共出了五本,这是其中一本-a book about data mining published by Information science reference
Platform: | Size: 6717440 | Author: 浪打浮萍 | Hits:

[OtherNext-Generation-of-Data-Mining

Description: 这是我好不容易获得的一本高性价书,Hillol Kargupta,Jiawei Han,Philip S.Yu,Rajeev Morwani,and Vipin Kumar 等编写的一本数据挖掘的经典力作,《next generation of data mining》,相信相关领域的科研人员定会有种如获至宝的喜悦!-This series aims to capture new developments and applications in data mining and knowledge discovery, while summarizing the computational tools and techniques useful in data analysis. This series encourages the integration of mathematical, statistical, and computational methods and techniques through the publication of a broad range of textbooks, reference works, and hand-books. The inclusion of concrete examples and applications is highly encouraged. The scope of the series includes, but is not limited to, titles in the areas of data mining and knowledge discovery methods and applications, modeling, algorithms, theory and foundations, data and knowledge visualization, data mining systems and tools, and privacy and security issues.
Platform: | Size: 19233792 | Author: youknow | Hits:

[Successful incentivedata-privacy(1)

Description: data privacy is the area where we can secure once personal information
Platform: | Size: 1119232 | Author: dilip | Hits:

[Crack HackData-Encryption

Description: 随着网络的普及,人们的隐私性也相对的减少了,而数据加密是保护隐私性的一种方式,我们现在几乎天天都会应用到数据加密技术,本文介绍了几种数据加密的实现方法。在应用方面,主要介绍了指纹识别技术,这个技术正逐渐在生活广泛应用起来。-With the popularity of the network, the privacy of the people is also relatively reduced, and data encryption is a way to protect the privacy of us almost every day now applied to data encryption technology, the article describes several implementations of data encryption method. In the application, introduces fingerprint recognition technology, this technology is widely used in life gradually.
Platform: | Size: 185344 | Author: | Hits:

[Crack HackInternational-Data-Encryption-Algorithm

Description: IDEA was used as the symmetric cipher in early versions of the Pretty Good Privacy cryptosystem
Platform: | Size: 106496 | Author: raja | Hits:

[Technology ManagementIncentive-Compatible-Privacy-Preserving-Data

Description: Incentive Compatible Privacy-Preserving Data Analysis
Platform: | Size: 143360 | Author: sandy | Hits:

[OtherMona-Secure-Multi-Owner-Data-Sharing-for-Dynamic-

Description: With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. In this paper, we propose a secure multiowner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.
Platform: | Size: 622592 | Author: Manoj | Hits:

[Other systemsattribute-based

Description: This project presents a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for sharing scalable media based on data consumers’ attributes (e.g., age, nationality, or gender) rather than an explicit list of the consumers’ names. The scheme is efficient and flexible because MCP-ABE allows a content provider to specify an access policy and encrypt multiple messages within one ciphertext such that only the users whose attributes satisfy the access policy can decrypt the ciphertext. Moreover, the paper shows how to support resource-limited mobile devices by offloading computational intensive operations to cloud servers while without compromising data privacy
Platform: | Size: 7353344 | Author: pravin | Hits:

[OtherPrivacy by design in big data

Description: Privacy by design in big data
Platform: | Size: 1684480 | Author: Papadopoulos | Hits:

[OtherPrivacy αnd Data Protection By Design

Description: Privacy and Data Protection
Platform: | Size: 1181696 | Author: Papadopoulos | Hits:

[AI-NN-PRGeolife Data 1.3

Description: Geolife GPS 轨迹数据集–用户指南 这一 GPS 轨迹数据集是在 (微软研究亚洲) Geolife 项目中收集的, 178 用户在四年 (2007年4月至 2011年10月) 期间。该数据集的 GPS 轨迹由一个时间戳点序列表示, 每一个都包含纬度、经度和高度信息。该数据集包含17621个轨迹, 总距离为1251654公里, 总持续时间为48203小时。该轨迹数据集可以应用于移动模式挖掘、用户活动识别、基于位置的社交网络、位置隐私和位置推荐等多个研究领域。(Geolife GPS track data set - User Guide The GPS trajectory data set was gathered in the Geolife project (Microsoft Research Asia) and 178 users over a four-year period (April 2007 to October 2011). The GPS trajectory of the data set is represented by a sequence of time stamps, each of which contains latitude, longitude and altitude information. The dataset contains 17621 trajectories with a total distance of 1251654 km and a total duration of 48203 hours. These trajectories record different GPS loggers and GPS telephones, and have various sampling rates. The trajectory of 91% is recorded in dense representation, for example, every 1 to 5 seconds or 5 to 10 meters per point. The trajectory data set can be used in many research fields, such as mobile pattern mining, user activity recognition, location-based social networks, location privacy and location recommendation.)
Platform: | Size: 22576128 | Author: 李白43 | Hits:
« 12 3 4 »

CodeBus www.codebus.net