Results 21 to 30 of about 956 (257)
Certificateless public key cryptography based provable data possession scheme in edge environment
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj +2 more sources
Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI +3 more
doaj +2 more sources
The Role of Certifications in Improving Household Food Security Among Peruvian Farmers
ABSTRACT Achieving global food security requires sustainable transformations in agri‐food systems. Voluntary Sustainability Standards (VSS) such as Organic and Fairtrade aim to internalize certain social and environmental costs while promoting more equitable value distribution, improved market access, and sustainable production practices.
Lisa‐Marie Schulte, Awudu Abdulai
wiley +1 more source
New provable data transfer from provable data possession and deletion for secure cloud storage
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu +3 more
doaj +1 more source
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella +5 more
wiley +1 more source
In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in
Lanjun Dang +6 more
doaj +1 more source
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high ...
Guofeng Wang +5 more
doaj +1 more source
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav +2 more
wiley +1 more source
Abstract Sensor technology advancements have provided a viable solution to fight COVID and to develop healthcare systems based on Internet of Things (IoTs). In this study, image processing and Artificial Intelligence (AI) are used to improve the IoT framework.
Noor M Allayla +2 more
wiley +1 more source
The Politics of Framing the Student Problem: Inquiries Into Australian Civics Education, 2006–2024
ABSTRACT Recurring debates about civics, the kinds of history that should, and should not, be taught in school, and ‘standards debates’ about the ‘basics’ typically follow on the heels of recurring moral panics about the ‘declining’ state of ‘our’ education system.
Patrick O'Keeffe +2 more
wiley +1 more source

