Tag

data security

1 views collected around this technical thread.

php中文网 Courses
php中文网 Courses
May 30, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, and demonstrates three PHP-based methods—using HTTPS, symmetric encryption (e.g., AES), and asymmetric encryption with OpenSSL—to protect communication, along with sample code and key management tips.

HTTPSOpenSSLPHP
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
DataFunTalk
DataFunTalk
May 2, 2025 · Artificial Intelligence

SecretFlow Meetup Chengdu – Privacy Computing Innovation and Application Practice

The SecretFlow open‑source community and Chengdu Smart City Research Institute co‑host a deep‑tech meetup in Chengdu, featuring leading experts from Ant Group, UESTC, and industry partners who will explore privacy‑computing principles, SPU technology, federated learning, and real‑world financial and governmental use cases through talks and hands‑on workshops.

AIFederated LearningSPU
0 likes · 8 min read
SecretFlow Meetup Chengdu – Privacy Computing Innovation and Application Practice
php中文网 Courses
php中文网 Courses
Apr 25, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, introduces HTTPS, demonstrates how to apply symmetric encryption algorithms like AES in PHP, and shows how to use PHP's OpenSSL extension for asymmetric encryption, providing practical code examples and key‑management tips.

Asymmetric EncryptionHTTPSPHP
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Top Architect
Top Architect
Feb 25, 2025 · Backend Development

Why Docker May Not Be Ideal for Running MySQL: N Reasons and Practical Guidance

The article examines why deploying MySQL in Docker containers can lead to data‑security, performance, state‑management and resource‑isolation problems, outlines mitigation strategies, discusses scenarios where containerization is feasible, and concludes with a call for community discussion while also featuring promotional material for AI‑related services.

ContainerizationDockerMySQL
0 likes · 9 min read
Why Docker May Not Be Ideal for Running MySQL: N Reasons and Practical Guidance
php中文网 Courses
php中文网 Courses
Jan 16, 2025 · Information Security

Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure PHP data transmission using HTTPS, symmetric encryption (AES, DES, 3DES) and asymmetric encryption with OpenSSL, providing code examples and key management advice to protect confidentiality, integrity, and prevent man‑in‑the‑middle attacks.

Asymmetric EncryptionHTTPSPHP
0 likes · 4 min read
Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
AntTech
AntTech
Dec 17, 2024 · Information Security

Jiangxi Secure Computing Summit Launches Industry Chain Initiative to Accelerate Data Security and Value Release

The Jiangxi "Secure Computing Industry Summit" convened on December 17, announcing a collaborative "Secure Computing Industry Chain Co‑construction Action" that unites leading institutions to promote privacy‑preserving computation technologies across finance, healthcare, and public data, aiming to safely unlock the value of data assets.

Data InfrastructureJiangxiPrivacy-Preserving
0 likes · 7 min read
Jiangxi Secure Computing Summit Launches Industry Chain Initiative to Accelerate Data Security and Value Release
DataFunSummit
DataFunSummit
Dec 13, 2024 · Big Data

Data Trust as a Solution for Data Element Circulation: Ecosystem Analysis, Policies, and Practices

This article examines data as a key production factor, analyzes the data‑element ecosystem, explains data‑trust concepts and solutions, reviews relevant policies and market structures, and presents domestic and international practices and case studies illustrating how data trusts can facilitate secure, efficient data circulation and fair benefit distribution.

Big DataData GovernanceData Market
0 likes · 15 min read
Data Trust as a Solution for Data Element Circulation: Ecosystem Analysis, Policies, and Practices
Test Development Learning Exchange
Test Development Learning Exchange
Dec 2, 2024 · Information Security

Implementing a Simple Caesar Cipher for Data Encryption in Python

This tutorial explains the fundamentals of data encryption, introduces differential privacy, and guides you through implementing a simple Caesar Cipher encrypt‑and‑decrypt program in Python, complete with code examples, execution instructions, and sample output.

CryptographyPythonTutorial
0 likes · 7 min read
Implementing a Simple Caesar Cipher for Data Encryption in Python
AntTech
AntTech
Nov 18, 2024 · Information Security

Guidelines for the National Data Standard System: Building Trusted Data Infrastructure and Secure Data Flow Standards

The newly released National Data Standard System Construction Guide outlines a comprehensive framework for data supply, circulation, utilization, and security, emphasizing trusted infrastructure, controlled anonymization, cross‑domain usage control, and unified security assessment to enable safe, efficient data exchange across entities and industries.

Security assessmentcontrolled anonymizationcross-domain data control
0 likes · 11 min read
Guidelines for the National Data Standard System: Building Trusted Data Infrastructure and Secure Data Flow Standards
DataFunTalk
DataFunTalk
Nov 17, 2024 · Artificial Intelligence

Federated Learning and Data Security in the Era of Large Models: Research Overview and the FLAIR Platform

This presentation reviews recent research on data security and utilization in the large‑model era, covering privacy‑preserving federated learning, knowledge‑transfer techniques, prototype‑based modeling, multi‑model fusion methods such as FuseGen, and introduces the federated knowledge computing platform FLAIR for both horizontal and vertical federated scenarios.

FLAIRFederated LearningLarge Models
0 likes · 19 min read
Federated Learning and Data Security in the Era of Large Models: Research Overview and the FLAIR Platform
DataFunSummit
DataFunSummit
Oct 23, 2024 · Artificial Intelligence

Data Compliance Risks and Mitigation Measures Across the Generative AI Model Lifecycle

The article examines data compliance challenges and legal risks during the training, application, and optimization stages of generative AI models, and offers concrete mitigation strategies such as respecting robots.txt, obtaining user consent, handling cross‑border data, and implementing robust security and governance measures.

AI compliancedata securitygenerative AI
0 likes · 17 min read
Data Compliance Risks and Mitigation Measures Across the Generative AI Model Lifecycle
AntTech
AntTech
Oct 18, 2024 · Information Security

CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts

The second Confidential Computing Forum at CNCC2024, held on October 26 in Hangzhou, gathers leading experts to discuss TEE‑based secure computing, present cutting‑edge research on confidentiality, side‑channel attacks, collaborative trust, and cryptographic applications, and outlines future directions for data security in the digital economy.

confidential computingdata securityinformation security
0 likes · 10 min read
CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts
AntTech
AntTech
Sep 26, 2024 · Information Security

Hangzhou Launches China’s First Secret Computing Center to Secure Data Lifecycle and Enable Trusted Data Services

On September 25, Hangzhou announced the nation’s first secret‑computing center, offering end‑to‑end encrypted data storage, processing, and exchange to protect privacy while unlocking the value of big‑data across finance, healthcare, urban governance, commerce, and agriculture.

Big DataData Ecosystemcloud computing
0 likes · 6 min read
Hangzhou Launches China’s First Secret Computing Center to Secure Data Lifecycle and Enable Trusted Data Services
DataFunSummit
DataFunSummit
Aug 20, 2024 · Artificial Intelligence

Applying Large Language Models to Intelligent Telemarketing: Evolution, Architecture, and Future Outlook

This article reviews the evolution of telephone sales, introduces large model technologies, outlines their integration into intelligent telemarketing workflows, discusses practical implementation methods, challenges, and future trends, and shares insights from industry experts on optimizing AI‑driven sales automation.

AIAutomationTelemarketing
0 likes · 17 min read
Applying Large Language Models to Intelligent Telemarketing: Evolution, Architecture, and Future Outlook
AntTech
AntTech
Aug 19, 2024 · Information Security

From General Computing to Intelligent Computing to Secure Computing: Key Insights from the 2024 China Cryptography Society Cryptographic Chip Conference

At the 2024 China Cryptography Society Cryptographic Chip Academic Conference in Chengdu, Ant Group’s Vice President Wei Tao highlighted the evolution from general to intelligent to secure computing, emphasizing the pivotal role of cryptographic chips in data protection, AI development, and cross‑industry applications while calling for deeper industry‑academia collaboration.

AIIndustry-Academia Collaborationcryptographic chips
0 likes · 8 min read
From General Computing to Intelligent Computing to Secure Computing: Key Insights from the 2024 China Cryptography Society Cryptographic Chip Conference
Bilibili Tech
Bilibili Tech
Aug 2, 2024 · Information Security

Security Development Lifecycle (SDL) at Bilibili: Implementation, Data Lifecycle Security, and DevSecOps

At Bilibili, the security team adapted Microsoft’s Security Development Lifecycle by establishing capability practices such as training, threat modeling, secure coding, and component scanning, integrating these processes into development pipelines through dedicated business partners, extending protection to the full data lifecycle, and evolving toward automated DevSecOps with in‑pipeline DAST and a custom vulnerability management platform.

DASTDevSecOpsSDL
0 likes · 15 min read
Security Development Lifecycle (SDL) at Bilibili: Implementation, Data Lifecycle Security, and DevSecOps
php中文网 Courses
php中文网 Courses
Jul 31, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates three PHP-based methods—enabling HTTPS via SSL/TLS, applying symmetric algorithms such as AES, and using asymmetric encryption with OpenSSL—to protect confidentiality, integrity, and authentication of web communications.

Asymmetric EncryptionHTTPSSymmetric Encryption
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption