Results 51 to 60 of about 156,809 (179)

Interest-Based Access Control for Content Centric Networks (extended version)

open access: yes, 2015
Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network ...
Ghali, Cesar   +3 more
core   +1 more source

An Ordered Universal Accumulator Based on a Hash Chain

open access: yesApplied Sciences
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering.
Wenbao Jiang   +3 more
doaj   +1 more source

Local Descriptors Optimized for Average Precision

open access: yes, 2018
Extraction of local feature descriptors is a vital stage in the solution pipelines for numerous computer vision tasks. Learning-based approaches improve performance in certain tasks, but still cannot replace handcrafted features in general. In this paper,
He, Kun, Lu, Yan, Sclaroff, Stan
core   +1 more source

A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification

open access: yesIEEE Access
In medical and healthcare application scenarios, data integrity and user privacy are often concerned the most. A sanitizable signature scheme is a common adopted approach since it admits an authorized person to sanitize partial sensitive information of ...
Han-Yu Lin, Tung-Tso Tsai, Hsu-Lun Wu
doaj   +1 more source

Performance verification experiment for enzyme-linked immunosorbent assay in blood screening laboratory

open access: yesZhongguo shuxue zazhi, 2023
Objective To verificate the performance of enzyme-linked immunosorbent assay (ELISA) in blood screening laboratory. Methods The repeatability, precision, sensitivity, specificity, compliance, detection limit and anti-interference of ELISA items in the ...
Humin LIU   +4 more
doaj   +1 more source

Exponential Discriminative Metric Embedding in Deep Learning

open access: yes, 2018
With the remarkable success achieved by the Convolutional Neural Networks (CNNs) in object recognition recently, deep learning is being widely used in the computer vision community.
Chen, Zhangling   +3 more
core   +1 more source

Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination

open access: yes网络与信息安全学报
With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy ...
Tianpeng ZHANG, Zhiyu REN, Xuehui DU, Haichao WANG
doaj   +5 more sources

CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Networks

open access: yes, 2018
Verifying robustness of neural network classifiers has attracted great interests and attention due to the success of deep neural networks and their unexpected vulnerability to adversarial perturbations.
Boopathy, Akhilan   +4 more
core   +1 more source

Learning Representations from Persian Handwriting for Offline Signature Verification, a Deep Transfer Learning Approach

open access: yes, 2019
Offline Signature Verification (OSV) is a challenging pattern recognition task, especially when it is expected to generalize well on the skilled forgeries that are not available during the training.
Araabi, Babak N.   +3 more
core   +1 more source

Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures

open access: yesSensors, 2018
The internet-of-things (also known as IoT) connects a large number of information-sensing devices to the Internet to collect all kinds of information needed in real time.
Xiuhua Lu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy