ABSTRACT Artificial intelligence (AI) is increasingly used in public decisionāmaking; yet existing governance tools often lack clear definitions of harm and benefit, practical methods for weighing competing values, and guidance for resolving value conflicts.
Karl de Fine Licht, Anna Folland
wiley +1 more source
CrustChain: Resolving the blockchain trilemma via decentralized storage and proof-of-capacity consensus. [PDF]
Reno S, Roy K.
europepmc +1 more source
A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks. [PDF]
Liu K +6 more
europepmc +1 more source
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
Seokhie Hong +5 more
openalex +1 more source
What Is Wrong with Imposing Risk of Harm?
ABSTRACT When and why is it wrong to impose a pure risk of harm on others? A pure risk of harm is a risk that fails to materialise into the harm that is threatened. It initially seems puzzling on what grounds a pure risk of harm can be wrong. There have been multiple attempts to explain the wrongness of imposing risk either by reference to the badness ...
Thomas Rowe
wiley +1 more source
Enabling health data analyses across multiple private datasets with no information sharing using secure multiparty computation. [PDF]
Kerr S, Robertson C, Sudlow C, Sheikh A.
europepmc +1 more source
Imagining outcomes of coral restoration and adaptation intervention in the Great Barrier Reef
Restoration initiatives are expanding globally to address climate and biodiversity threats and to help ecosystems adapt to environmental change. Research in Australia's Great Barrier Reef (GBR) is exploring novel intervention options to scale up restoration, protect corals from climate extremes, and accelerate their adaptation to heat stress.
Stewart Lockie +4 more
wiley +1 more source
Efficient Steganography with Provable Security Guarantees
Aggelos Kiayias +2 more
openalex +1 more source
Provably correct Java implementations of Spi Calculus security protocols specifications [PDF]
A. Pironti, Riccardo Sisto
openalex +1 more source

