×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [7]
Faculty of Law [6]
THE STATE KEY LA... [1]
Faculty of Busin... [1]
Authors
ZHOU YICONG [5]
MURUGA PERUMAL R... [2]
DU LI [2]
JIA WEI JIA [1]
TAM LAP MOU [1]
CHEN XIAOYUN [1]
More...
Document Type
Journal article [13]
Conference paper [2]
Other [1]
Presentation [1]
Date Issued
2023 [1]
2021 [4]
2020 [2]
2019 [4]
2018 [5]
2014 [1]
More...
Language
英語English [16]
中文Chinese [1]
Source Publication
JMIR mHealth and... [2]
Applied Sciences [1]
Applied Sciences... [1]
Frontiers in Gen... [1]
IEEE TRANSACTION... [1]
INFORMATION SCIE... [1]
More...
Indexed By
SCIE [9]
CPCI-S [1]
CSSCI [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 17
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Issue Date Ascending
Issue Date Descending
Submit date Ascending
Submit date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Data Protection Dilemmas Arising in UNCITRAL work on Cloud Computing and the future agenda on Data Transactions
Presentation
会议地点: United Nations University, Macau, 会议日期: 25-04-2023, 报告日期: 2023-04-25
Authors:
Ramaswamy, M.P.
Favorite
|
|
Submit date:2023/08/31
Data Protection
Dilemma
Cloud Computing
Uncitral
Contractual Provisions
澳門地區民法上個人信息保護權的體系定位
Journal article
唐曉晴, 吳奇琦. 澳門地區民法上個人信息保護權的體系定位[J]. 國家檢察官學院學報, 2021, 29(155), 75-89.
Authors:
唐曉晴
;
吳奇琦
Adobe PDF
|
Favorite
|
|
Submit date:2022/08/23
个人资料保护法
Data Protection Law
个人信息保护法
Habeas Data
资讯自决权
Recht Auf Informationelle Selbstbestimmung
资讯自主权
Right To Informational Self-determination
资讯隐私权
Right To Informational Privacy
澳门民法
Macau Civil Law
Legal Standards Governing Data Protection in Europe and Potential Sources of Legal Transplants in Macau SAR
Journal article
Ramaswamy, M.P.. Legal Standards Governing Data Protection in Europe and Potential Sources of Legal Transplants in Macau SAR[J]. International Journal of Research and Innovation in Social Science, 2021, 639-650.
Authors:
Ramaswamy, M.P.
Favorite
|
|
Submit date:2022/08/30
Data protection law
European Legal Standards
GDPR
Macau
Greater Bay Area
Authors’ Reply to: And Justice for All? There Is More to the Interoperability of Contact Tracing Apps Than Legal Barriers. Comment on “COVID-19 Contact Tracing Apps: A Technologic Tower of Babel and
Journal article
Li Du. Authors’ Reply to: And Justice for All? There Is More to the Interoperability of Contact Tracing Apps Than Legal Barriers. Comment on “COVID-19 Contact Tracing Apps: A Technologic Tower of Babel and[J]. JMIR mHealth and uHealth, 2021, 9(5).
Authors:
Li Du
Favorite
|
IF:
5.4
/
5.6
|
Submit date:2023/08/28
Covid-19
Contact Tracing
Data Protection
Privacy
Interoperability
Global Health
Public Health
Authors' Reply to: And justice for all? There is more to the interoperability of contact tracing apps than legal barriers. comment on "cOVID-19 contact tracing apps: A technologic tower of babel and the gap for international pandemic control"
Other
2021-05-01
Authors:
Du, Li
;
Raposo, Vera Lúcia
;
Wang, Meng
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
|
Submit date:2021/12/07
Contact Tracing
Covid-19
Data Protection
Global Health
Interoperability
Privacy
Public Health
Genetic Privacy and Data Protection: A Review of Chinese Direct-to-Consumer Genetic Test Services
Journal article
Li Du, Meng Wang. Genetic Privacy and Data Protection: A Review of Chinese Direct-to-Consumer Genetic Test Services[J]. Frontiers in Genetics, 2020, 11, 416.
Authors:
Li Du
;
Meng Wang
Favorite
|
TC[WOS]:
8
TC[Scopus]:
13
IF:
2.8
/
3.3
|
Submit date:2020/12/04
Chinese Genetic Testing Providers
Consumers’ Right To Their Genetic Information
Data Privacy
Data Protection Law
Data Sharing
Direct-to-consumer Genetic Testing
Genetic Information Protection
Edge-based differential privacy computing for sensor–cloud systems
Journal article
Wang, Tian, Mei, Yaxin, Jia, Weijia, Zheng, Xi, Wang, Guojun, Xie, Mande. Edge-based differential privacy computing for sensor–cloud systems[J]. Journal of Parallel and Distributed Computing, 2020, 136, 75-85.
Authors:
Wang, Tian
;
Mei, Yaxin
;
Jia, Weijia
;
Zheng, Xi
;
Wang, Guojun
; et al.
Favorite
|
TC[WOS]:
85
TC[Scopus]:
111
IF:
3.4
/
3.4
|
Submit date:2021/12/06
Data Collection
Edge-based Model
Privacy Computing
Privacy Protection
Sensor–cloud
A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism
Journal article
Shih-Yu Li, Miguel Angel Benalcázar Hernández, Lap-Mou Tam, Chin-Sheng Chen. A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism[J]. Applied Sciences (Switzerland), 2019, 9(23), 5146.
Authors:
Shih-Yu Li
;
Miguel Angel Benalcázar Hernández
;
Lap-Mou Tam
;
Chin-Sheng Chen
Favorite
|
TC[WOS]:
5
TC[Scopus]:
5
IF:
2.5
/
2.7
|
Submit date:2021/03/09
Smart Automation
Cyberphysical Systems
Cloud Data Protection
Cryptography
A Cloud Image Data Protection Algorithm with Multilevel Encryption Scheme and Automated-Selection Mechanism
Journal article
Li, S. Y., Hernandez, M. A. B., Tam, L. M., Chen, C. S.. A Cloud Image Data Protection Algorithm with Multilevel Encryption Scheme and Automated-Selection Mechanism[J]. Applied Sciences, 2019, 5146-5163.
Authors:
Li, S. Y.
;
Hernandez, M. A. B.
;
Tam, L. M.
;
Chen, C. S.
Favorite
|
IF:
2.5
/
2.7
|
Submit date:2022/08/29
Smart automation
Cyberphysical systems
Cloud data protection
Cryptography
Reversible Data Hiding in Encrypted Images using Prediction-error Encoding
Conference paper
Shuang Yi, Yicong Zhou. Reversible Data Hiding in Encrypted Images using Prediction-error Encoding[C], 2019, 1789-1793.
Authors:
Shuang Yi
;
Yicong Zhou
Favorite
|
TC[WOS]:
1
TC[Scopus]:
2
|
Submit date:2019/03/26
Reversible Data Hiding
Encrypted Image
Prediction-error Encoding
Weighted Checkerboard-based Prediction Privacy Protection