Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Research on User Privacy Protection Method in Logistics Industry
Liaoning Police College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  This paper takes the protection of user privacy information in express logistics industry as the main research object, and de- signs a scheme to protect user privacy by using RFID technology and multi-layer encryption technology. The proposed scheme can realize the dual privacy protection for both internal and external of logistics companies, and ensure that the responsible person of pri- vacy information disclosure can be reviewed.
Key wordsprivacy protection      RFID technology      network security     
Published: 24 February 2021

Cite this article:

CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry. Computer & Telecommunication, 2020, 1(12): 75-79.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2020/V1/I12/75

[1] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[2] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[3] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[4] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[5] Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests[J]. 电脑与电信, 2020, 1(6): 66-73.
[6] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[7] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[8] WANG Shuai ZHANG Gui-jie. AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance[J]. 电脑与电信, 2020, 1(11): 60-64.
[9] ZHANG Yu. Application of DES File Encryption in Network Security[J]. 电脑与电信, 2019, 1(7): 49-.
[10] JIANG Lin-zhou. Man-in-the-middle Attack and Defense Methods in Wireless Networks[J]. 电脑与电信, 2019, 1(5): 48-50.
[11] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[12] YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme[J]. 电脑与电信, 2018, 1(1-2): 53-54.
[13] FAN Miao-miao. Analysis of WSN Network Security Management Mechanism[J]. 电脑与电信, 2018, 1(12): 84-86.
[14] Xie Fan. Analysis on the Computer Network Security and Router Troubleshooting[J]. 电脑与电信, 2017, 1(7): 42-43.
[15] Zhang Shuai, Zhao Yan. Research on Scenario Privacy Protection Design for Mobile Terminal[J]. 电脑与电信, 2017, 1(5): 38-40.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd