Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Privacy Computing

Best Price (Coupon Required):
Buy Privacy Computing for $125.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $139.00 - $139.00
BEST PRICE

Single Product Purchase

$125.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$139.00 $139.00

10% OFF
This deals requires coupon
$125.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9789819949427
Condition
New
Product Description

The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Buildings for Education

Buildings for Education

$59.99
Ubiquitous Music

Ubiquitous Music

$54.99
Breeding and Biotechnology of Tea and its Wild Species

Breeding and Biotechnology of Tea and its Wild Species

$169.99
European Energy Security

European Energy Security

$54.99
School Behavioral Health

School Behavioral Health

$109.00
Digital Education

Digital Education

$54.99
Introduction to FORTRAN 77

Introduction to FORTRAN 77

$59.99
Wirtschaftlichkeitsanalysen im Gesundheitswesen

Wirtschaftlichkeitsanalysen im Gesundheitswesen

$69.99
The Mathematical Universe

The Mathematical Universe

$44.99
Kosten- und Leistungsrechnung im Handel

Kosten- und Leistungsrechnung im Handel

$59.99
Prinzip Nation

Prinzip Nation

$49.99
Annual Report on Chinas Economic Growth

Annual Report on Chinas Economic Growth

$109.99
Topics in Engineering Meteorology

Topics in Engineering Meteorology

$36.00
Proteins and Proteomics of Leishmania and Trypanosoma

Proteins and Proteomics of Leishmania and Trypanosoma

$169.99
Building the Knowledge Economy, Transforming Cities? Transnational Education Zones as a Multi-Scalar

Building the Knowledge Economy, Transforming Cities? Transnational Education Zones as a Multi-Scalar

$89.99
Coating Substrates and Textiles

Coating Substrates and Textiles

$109.99
Nonperturbative Quantum Field Theory and the Structure of Matter

Nonperturbative Quantum Field Theory and the Structure of Matter

$39.99
The Regulatory Regime of Food Safety in China

The Regulatory Regime of Food Safety in China

$119.99
The Doraleh Disputes

The Doraleh Disputes

$99.00
Scaling Social Impact

Scaling Social Impact

$54.99
Frauengestalten

Frauengestalten

$59.99
Hochspannungstechnik

Hochspannungstechnik

$99.99
Rookie Read-About Geography-Continents: Antarctica

Rookie Read-About Geography-Continents: Antarctica

$4.46
Umwelterziehung in der Schule

Umwelterziehung in der Schule

$59.99
An Absence of Competition

An Absence of Competition

$119.99
Quantum Chemistry: The Challenge of Transition Metals and Coordination Chemistry

Quantum Chemistry: The Challenge of Transition Metals and Coordination Chemistry

$219.99
Planung in der Datenverarbeitung

Planung in der Datenverarbeitung

$69.99
Women Entrepreneurs in Sub-Saharan Africa

Women Entrepreneurs in Sub-Saharan Africa

$199.99
Ben Jonsons Theatrical Republics

Ben Jonsons Theatrical Republics

$84.99
Stellar Remnants

Stellar Remnants

$84.99
Practice and Principles in Therapeutic Colonoscopy

Practice and Principles in Therapeutic Colonoscopy

$109.99
International Law and Armed Conflict

International Law and Armed Conflict

$169.99
The Illusion of Linearity

The Illusion of Linearity

$109.99
Pot-Pollen in Stingless Bee Melittology

Pot-Pollen in Stingless Bee Melittology

$169.99
Energieversorgungskonzepte

Energieversorgungskonzepte

$84.99
Surgical Management of Childhood Glaucoma

Surgical Management of Childhood Glaucoma

$139.99
Electrically Induced Vortical Flows

Electrically Induced Vortical Flows

$39.99
Expert Oracle RAC 12c

Expert Oracle RAC 12c

$69.99
Proceedings of the 9th Conference on Sound and Music Technology

Proceedings of the 9th Conference on Sound and Music Technology

$169.99
HACCP User's Manual

HACCP User's Manual

$169.99
previous
next