LEADER 00997nam0-22003251i-450- 001 990006936200403321 005 20051108144253.0 010 $a88-85876-23-4 035 $a000693620 035 $aFED01000693620 035 $a(Aleph)000693620FED01 035 $a000693620 100 $a20010719d1994----km-y0itay50------ba 101 0 $aita 105 $aa-------001yy 200 1 $aCristianità ed Europa$emiscellanea di studi in onore di Luigi Prosdocimi$fa cura di Cesare Alzati 210 $aRoma$cHerder$d1994 215 $a3 v. in 3 tomi$d24 cm 610 0 $aRELIGIONE$aEuropa$aAspetti sociali 676 $a274$v21$zita 702 1$aAlzati,$bCesare 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006936200403321 952 $a274 ALZ 1 (1.1, 1.2-2)$bBibl. 38884$fFLFBC 952 $a274 ALZ 1 (1.1 BIS)$bBibl. 31820$fFLFBC 952 $a274 ALZ 1 (1.2 BIS)$bBibl. 31820$fFLFBC 959 $aFLFBC 996 $aCristianità ed Europa$9628368 997 $aUNINA LEADER 01202nam 2200349 450 001 9910793623703321 010 $a3-8382-6995-0 035 $a(CKB)4100000008699973 035 $a(MiAaPQ)EBC5782683 035 $a(EXLCZ)994100000008699973 100 $a20190809d2018 uy 0 101 0 $ager 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBildungskorruption in Russland und der Ukraine $eEine komparative Analyse der Performanz staatlicher Antikorruptionsmassnahmen im Hochschulsektor am Beispiel universitarer Aufnahmeprufungen /$fEduard Klein ; edited by Andreas Umland ; mit einem vorwort von Heiko Pleines 210 1$aStuttgart :$cIbidem Verlag,$d2018. 215 $a1 online resource (521 pages) 606 $aCorruption$zRussia (Federation) 615 0$aCorruption 676 $a364.1060947 700 $aKlein$b Eduard$01552856 702 $aUmland$b Andreas 702 $aPleines$b Heiko 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910793623703321 996 $aBildungskorruption in Russland und der Ukraine$93812990 997 $aUNINA LEADER 03761nam 22006375 450 001 9910835055603321 005 20240307120829.0 010 $a9789819949434 010 $a9819949432 024 7 $a10.1007/978-981-99-4943-4 035 $a(MiAaPQ)EBC31149799 035 $a(Au-PeEL)EBL31149799 035 $a(DE-He213)978-981-99-4943-4 035 $a(CKB)30327379900041 035 $a(OCoLC)1422230998 035 $a(EXLCZ)9930327379900041 100 $a20240212d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrivacy Computing $eTheory and Technology /$fby Fenghua Li, Hui Li, Ben Niu 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (217 pages) 311 08$aPrint version: Li, Fenghua Privacy Computing Singapore : Springer,c2024 9789819949427 327 $aChapter 1 Introduction -- Chapter 2 Privacy Protection Related Technologies -- Chapter 3 Privacy Computing Theory -- Chapter 4 Privacy Computing Technology -- Chapter 5 The future trend of privacy computing. 330 $aThe continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions. 606 $aComputational intelligence 606 $aData protection$xLaw and legislation 606 $aData protection 606 $aArtificial intelligence$xData processing 606 $aComputational Intelligence 606 $aPrivacy 606 $aData and Information Security 606 $aData Science 615 0$aComputational intelligence. 615 0$aData protection$xLaw and legislation. 615 0$aData protection. 615 0$aArtificial intelligence$xData processing. 615 14$aComputational Intelligence. 615 24$aPrivacy. 615 24$aData and Information Security. 615 24$aData Science. 676 $a005.8 700 $aLi$b Fenghua$01772124 701 $aLi$b Hui$0274539 701 $aNiu$b Ben$01738329 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910835055603321 996 $aPrivacy Computing$94271756 997 $aUNINA