Results 21 to 30 of about 956 (257)

Certificateless public key cryptography based provable data possession scheme in edge environment

open access: yesTongxin xuebao, 2022
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj   +2 more sources

Provable data possession scheme with authentication

open access: yesTongxin xuebao, 2016
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI   +3 more
doaj   +2 more sources

The Role of Certifications in Improving Household Food Security Among Peruvian Farmers

open access: yesAgribusiness, EarlyView.
ABSTRACT Achieving global food security requires sustainable transformations in agri‐food systems. Voluntary Sustainability Standards (VSS) such as Organic and Fairtrade aim to internalize certain social and environmental costs while promoting more equitable value distribution, improved market access, and sustainable production practices.
Lisa‐Marie Schulte, Awudu Abdulai
wiley   +1 more source

New provable data transfer from provable data possession and deletion for secure cloud storage

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu   +3 more
doaj   +1 more source

Artificial Intelligence in Autonomous Mobile Robot Navigation: From Classical Approaches to Intelligent Adaptation

open access: yesAdvanced Intelligent Systems, EarlyView.
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella   +5 more
wiley   +1 more source

Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in
Lanjun Dang   +6 more
doaj   +1 more source

IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications

open access: yesIEEE Access, 2018
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high ...
Guofeng Wang   +5 more
doaj   +1 more source

ResearchConnect: An AI‐Powered Platform for Interdisciplinary Research Team Formation and Ideation Development

open access: yesAdvanced Intelligent Systems, EarlyView.
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav   +2 more
wiley   +1 more source

Enabling image optimisation and artificial intelligence technologies for better Internet of Things framework to predict COVID

open access: yesIET Networks, EarlyView., 2022
Abstract Sensor technology advancements have provided a viable solution to fight COVID and to develop healthcare systems based on Internet of Things (IoTs). In this study, image processing and Artificial Intelligence (AI) are used to improve the IoT framework.
Noor M Allayla   +2 more
wiley   +1 more source

The Politics of Framing the Student Problem: Inquiries Into Australian Civics Education, 2006–2024

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Recurring debates about civics, the kinds of history that should, and should not, be taught in school, and ‘standards debates’ about the ‘basics’ typically follow on the heels of recurring moral panics about the ‘declining’ state of ‘our’ education system.
Patrick O'Keeffe   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy