Accès libre

Application of Hierarchical Protection Security Mechanism in Database to Party Building in Colleges and Universities

   | 02 juil. 2024
À propos de cet article

Citez

Liang, H. (2017). Optimization of party building model in colleges and universities based on multimedia intelligent platform. Boletin Tecnico/Technical Bulletin, 55(17), 569-575. Search in Google Scholar

Gayle, Kerr, Louise, & Kelly. (2017). Imc education and digital disruption. European Journal of Marketing. Search in Google Scholar

Karagul, B. I., Seker, M., & Aykut, C. (2021). Investigating students’ digital literacy levels during online education due to covid-19 pandemic. Sustainability, 13. Search in Google Scholar

Joanna Król, & Wojcik, T. G. (2017). The “ideological offensive” in education: the portrayal of the united states in secondary curricula and textbooks in poland during the stalinist period (1948–1956). Cold War History. Search in Google Scholar

Orgo, A., Bartol, T., Dolniar, D., & Podgornik, B. B. (2017). Attributes of digital natives as predictors of information literacy in higher education. British Journal of Educational Technology, 48(3). Search in Google Scholar

Wilder, S. (2019). Book review: big data in education: the digital future of learning, policy and practice:. Management Learning(3). Search in Google Scholar

Lu, Y., Tang, Z., Chai, X. L., Wang, M., & Song, S. (2022). A hierarchical protection scheme for intellectual property of semi-open source datasets based on double watermarking. Optik. Search in Google Scholar

Yang, Y., He, F., Han, S., Liang, Y., & Cheng, Y. (2021). A novel attribute-based encryption approach with integrity verification for cad assembly models. Engineering(5). Search in Google Scholar

Sun, L., & Gao, D. (2022). Security attitude prediction model of secret-related computer information system based on distributed parallel computing programming. Mathematical Problems in Engineering, 2022. Search in Google Scholar

Peng, Y., & Limin, Z. (2017). Hierarchical protection mechanism of network information based on computer security model algorithm terminal. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 62(2), 341-350. Search in Google Scholar

Hsiao, T. C., Huang, Y. M., Chung, Y. F., Chen, T. L., & Chen, T. S. (2019). Efficient hierarchical key management scheme for vr/ar database systems. International Journal of Network Security, 21(4), 551-555. Search in Google Scholar

Gupta, I., & Singh, A. K. (2020). Guim-smd: guilty user identification model using summation matrix-based distribution. IET Information Security, 14(6), 773-782. Search in Google Scholar

Yin, H. L., Fu, Y., Li, C. L., Weng, C. X., Li, B. H., & Gu, J., et al. (2023). Experimental quantum secure network with digital signatures and encryption. National Science Review(4), 86-96. Search in Google Scholar

Wanjie, L. I., Zhang, X., Xiaohui, L. I., Cao, G., & Zhang, Q. (2019). Ppdp-pcao: an efficient high-dimensional data releasing method with differential privacy protection. IEEE Access, 7, 1-1. Search in Google Scholar

Xiaolei, Kang, Xinsheng, Ji, Kaizhi, & Huang, et al. (2017). Security-oriented distributed access selection for d2d underlaying cellular networks. Electronics Letters, 53(1), 32-34. Search in Google Scholar

Takefuji, Y. (2018). A blockchain is fragile against the database approach. Science. Search in Google Scholar

Aldaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cyb ersecurity e ducation. Computers & Security(119-), 119. Search in Google Scholar

Shin, J., You, I., & Seo, J. T. (2020). Investment priority analysis of ics information security resources in smart mobile iot network environment using the analytic hierarchy process. Mobile Information Systems, 2020(3), 1-11. Search in Google Scholar

eISSN:
2444-8656
Langue:
Anglais
Périodicité:
Volume Open
Sujets de la revue:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics