Skip to Main Content
With the development of information and communication technology, network age coming silently, it will be caused a new personal information leakage risk by the Ubiquitous Computing applications. This paper introduces the individual privacy information forms of expression in networking technology, and then puts forward with the secure multi-party computation to achieve personal information protection. Otherwise, we describe the process and the algorithm of implement. At last, we build in a conceptual model according to the layered theory of the network information on privacy protection.
Date of Conference: 6-8 May 2011