您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Revisiting RFID Security and Privacy.pdf

  2. Revisiting RFID Security and Privacy.pdf
  3. 所属分类:专业指导

    • 发布日期:2010-04-15
    • 文件大小:1048576
    • 提供者:z00103809
  1. Lua 中文教程PDF

  2. 目录 版权声明..............i 译序..i 目录iii 第一篇语言.......1 第0章序言.......1 0.1 序言..........1 0.2 Lua的使用者................2 0.3 Lua的相关资源............3 0.4 本书的体例.................3 0.5 关于本书...3 0.6 感谢..........4 第1章起点.......5 1.1 Chunks.......5 1.2 全局变量...7 1.3 词法约定
  3. 所属分类:C

    • 发布日期:2010-05-25
    • 文件大小:1048576
    • 提供者:aszengjun
  1. SSL and TLS_Theory and Practice(Information Security and Privacy)

  2. SSL and TLS_Theory and Practice(Information Security and Privacy).pdf
  3. 所属分类:专业指导

    • 发布日期:2011-02-19
    • 文件大小:1048576
    • 提供者:a9119376
  1. Protecting Privacy in Data Release 无水印pdf

  2. Protecting Privacy in Data Release 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
  3. 所属分类:其它

    • 发布日期:2017-09-25
    • 文件大小:7340032
    • 提供者:u011433684
  1. TensorFlow.js Machine Learning for the Web and Beyond.pdf

  2. TensorFlow.js, Google 提供的基于TensorFlow的Javascr ipt库。方便使用JS的开发者使用,并且可以为未来的边缘计算提供支持。TensorFlow. js: Machine Learning for the Web and beyond acceleration, notably TensorFire(Kwok et al., 2017), Propel Layers APl, which provides higher-level model buildin
  3. 所属分类:机器学习

    • 发布日期:2019-07-15
    • 文件大小:581632
    • 提供者:nicholaskong
  1. Advances and Open Problems in Federated Learning.pdf

  2. Advances and Open Problems in Federated Learning。Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server (e.g. ser
  3. 所属分类:讲义

    • 发布日期:2020-05-13
    • 文件大小:1048576
    • 提供者:ruiyiin
  1. 深度学习2016ppt.pdf

  2. 这是google公司2016年发表的一篇文章的PPT,主要讲述了在深度学习中应用差分隐私,论文题目为《Deep Learning with Differential Privacy》
  3. 所属分类:深度学习

    • 发布日期:2020-03-21
    • 文件大小:719872
    • 提供者:weixin_45428522
  1. NIST SP800-160-vol2-draft.pdf

  2. INTRODUCTION THE NEED FOR CYBER RESILIENT SYSTEMS he need for trustworthy secure systems1 stems from a variety of stakeholder needs that are driven by mission, business, and other objectives and concerns. The principles, concepts, and practices for
  3. 所属分类:其它

    • 发布日期:2020-02-25
    • 文件大小:2097152
    • 提供者:samsho2
  1. NIST SP800-145.pdf

  2. Interest in cloud computing has grown rapidly in recent years due to the advantages of greater flexibility and availability in obtaining computing resources at lower cost. Security and privacy, however, are a concern for agencies and organizations co
  3. 所属分类:其它

    • 发布日期:2020-02-25
    • 文件大小:79872
    • 提供者:samsho2
  1. NIST SP800-144.pdf

  2. Interest in cloud computing has grown rapidly in recent years due to the advantages of greater flexibility and availability in obtaining computing resources at lower cost. Security and privacy, however, are a concern for agencies and organizations co
  3. 所属分类:其它

    • 发布日期:2020-02-25
    • 文件大小:1048576
    • 提供者:samsho2
  1. NIST SP800-122.pdf

  2. The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. The document explains the importance of protecting the confidentiality of PII in the con
  3. 所属分类:其它

    • 发布日期:2020-02-25
    • 文件大小:812032
    • 提供者:samsho2
  1. NIST SP800-98_RFID-2007.pdf

  2. This publication seeks to assist organizations in understanding the risks of RFID technology and security measures to mitigate those risks. It provides practical, real-world advice on how to initiate, design, implement and operate RFID systems in a m
  3. 所属分类:其它

    • 发布日期:2020-02-21
    • 文件大小:1048576
    • 提供者:samsho2
  1. NIST SP800-79-1.pdf

  2. In order to enhance security, increase Government efficiency, reduce identity fraud, and protect personal privacy, the President issued Homeland Security Presidential Directive 12 (HSPD-12), Policy for a Common Identification Standard for Federal Emp
  3. 所属分类:其它

    • 发布日期:2020-02-21
    • 文件大小:844800
    • 提供者:samsho2
  1. NIST SP800-66 Rev1.pdf

  2. The National Institute of Standards and Technology (NIST) is responsible for developing standards and guidelines, including minimum requirements, used by federal agencies in providing adequate information security for the protection of agency operati
  3. 所属分类:其它

    • 发布日期:2020-02-20
    • 文件大小:680960
    • 提供者:samsho2
  1. Cloud Programming (EECS-2019-3).pdf

  2. 外文文献,伯克利大学云计算文献资料 Data storage in cloud computing leads to several security issues such as data privacy, integrity, and authentication. Efficiency for the user to upload and download the data in a secure way plays an important role, as users are
  3. 所属分类:平台管理

    • 发布日期:2020-02-18
    • 文件大小:718848
    • 提供者:weixin_41649680
  1. NIST SP800-18 Rev1.pdf

  2. Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA), requires each federal agency to develop, document, and implement an agency-wide information security program to provide information security for the
  3. 所属分类:其它

    • 发布日期:2020-02-13
    • 文件大小:368640
    • 提供者:samsho2
  1. 2013_Book_InformationSciencesAndSystems2.pdf

  2. The papers in these proceedings are grouped into seven sections:•Smart Algorithms,•Analysis Modelling and Optimisation,•Computational Linguistics,•Computer Vision,•Data and Web Engineering,•Wireless Sensor Networks,•Network Security, Data Integrity a
  3. 所属分类:机器学习

    • 发布日期:2020-01-27
    • 文件大小:10485760
    • 提供者:zhouzmtco
  1. WirelessHD-Specification-Overview-v1.1May2010.pdf

  2. The WirelessHD specification defines a wireless protocol that enables consumer devices to create a wireless video area network (WVAN) with the following characteristics: · Stream uncompressed audio and video up to Quad Full HD (QFHD) resolution, 4
  3. 所属分类:图像处理

    • 发布日期:2020-01-23
    • 文件大小:1048576
    • 提供者:len_wang
  1. Design Disasters with Justin Seeley.pdf

  2. 讲解了Design Disasters, Disaster solutions,Slow Solutions。THE AGENDA ° DESIGNDISAS世ER DISASTER SOLUHTONS SLOW SOLUHTONS HANDLING HAGU Dillehe TYPES OF DISAS2〓R HARDWARE SOFTWARE 军 Crash Report for "Adobe Photoshop CS4 Ps Adobe has detected that the
  3. 所属分类:专业指导

    • 发布日期:2019-10-06
    • 文件大小:15728640
    • 提供者:copland
  1. Xu et al. - 2019 - Making Big Data Open in Edges A Resource-Efficien.pdf

  2. 论文 - Making Big Data Open in Edges: A Resource-Efficient Blockchain-Based Approach872 lEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. VOL 30. NO. 4. APRIL 2019 mobile edge computing collaboration in 5G ecosystem. The and the throughput can ach
  3. 所属分类:比特币

    • 发布日期:2019-10-05
    • 文件大小:1048576
    • 提供者:liangyihuai
« 12 3 4 5 »