Why Are All the Sets All the Sets?
ABSTRACT Necessitists about set theory think that the pure sets exists, and are the way they are, as a matter of necessity. They cannot explain why the sets (de rebus) are all the sets. This constitutes the Ur‐Objection against necessitism; it is the primary motivation cited by potentialists about set theory.
Tim Button
wiley +1 more source
IoT Authentication in Federated Learning: Methods, Challenges, and Future Directions. [PDF]
Badhib A, Alshehri S, Cherif A.
europepmc +1 more source
ABSTRACT Virtue epistemology has long struggled with the “Creditability Dilemma”: how can knowledge gained through deference be creditable to the knower if it primarily depends on others’ cognitive work? We propose a novel solution by developing a telic account of doxastic deference as a distinctive kind of social‐epistemic performance.
J. Adam Carter, Jesper Kallestrup
wiley +1 more source
A ZKP-based anonymous biometric authentication scheme for the E-health systems. [PDF]
Mao X, Zhou X, Zhao X, Chen Y.
europepmc +1 more source
Evolution of crop phenotypic spaces through domestication
Summary We used domestication as an in vivo replicated experiment to investigate how divergent selection has shaped the evolution of multivariate phenotypic spaces. We measured 11–57 qualitative and quantitative traits in 13 species, either unique or shared between species, and established a framework for cross‐species comparisons. Our results revealed
Arthur Wojcik +18 more
wiley +1 more source
Integrated Authentication Server Design for Efficient Kerberos-Blockchain VANET Authentication. [PDF]
Rahayu M, Hossain MB, Huda S, Nogami Y.
europepmc +1 more source
Apparent Paradoxes Are Paradoxes and the Problem of Change Is an Apparent Paradox
ABSTRACT In this paper, we argue that, under certain conditions, if something is, apparently, a paradox, then it is a paradox. We then apply this claim to a recent discussion on the so‐called “Problem of Change.” Throughout the history of Philosophy, many authors have viewed change as a paradoxical phenomenon. More recently, some have defended that the
Sergi Oms, Marta Campdelacreu
wiley +1 more source
Privacy-Preserving ECC-Based AKA for Resource-Constrained IoT Sensor Networks with Forgotten Password Reset. [PDF]
Yu Y, Wei K, Qi K, Wu W.
europepmc +1 more source
Why Paternalism Is Wrong (When It Is Wrong)
ABSTRACT This paper proposes a novel reinterpretation of the familiar, if inchoate, thought that paternalism offends against an ideal of personal sovereignty. The central idea is that (competent) persons have a particular kind of normative power. Just as each of us has the right to control how others are permitted to use our bodies or property, we each
Jonathan Parry
wiley +1 more source
DA34FL: a robust dynamic accumulator-based authentication and key agreement with preserving model training data integrity for federated learning. [PDF]
Li S, Zhang Y, Bai J, Fan K.
europepmc +1 more source

