Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Research on User Privacy Protection Method in Logistics Industry
Liaoning Police College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  This paper takes the protection of user privacy information in express logistics industry as the main research object, and de- signs a scheme to protect user privacy by using RFID technology and multi-layer encryption technology. The proposed scheme can realize the dual privacy protection for both internal and external of logistics companies, and ensure that the responsible person of pri- vacy information disclosure can be reviewed.
Key wordsprivacy protection      RFID technology      network security     
Published: 24 February 2021

Cite this article:

CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry. Computer & Telecommunication, 2020, 1(12): 75-79.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2020/V1/I12/75

[1] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[2] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[3] TONG Wei HUANG Qi-ping.
Optimization Strategy of Privacy-oriented BRNN Protection
[J]. 电脑与电信, 2021, 1(12): 58-61.
[4] LAI Jin-zhi.
Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
[J]. 电脑与电信, 2021, 1(11): 12-15.
[5] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[6] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[7] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[8] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[9] Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests[J]. 电脑与电信, 2020, 1(6): 66-73.
[10] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[11] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[12] WANG Shuai ZHANG Gui-jie. AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance[J]. 电脑与电信, 2020, 1(11): 60-64.
[13] ZHANG Yu. Application of DES File Encryption in Network Security[J]. 电脑与电信, 2019, 1(7): 49-.
[14] JIANG Lin-zhou. Man-in-the-middle Attack and Defense Methods in Wireless Networks[J]. 电脑与电信, 2019, 1(5): 48-50.
[15] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd