Results 41 to 50 of about 1,665,841 (189)

E-Voting in an ubicomp world: trust, privacy, and social implications [PDF]

open access: yes, 2008
The advances made in technology have unchained the user from the desktop into interactions where access is anywhere, anytime. In addition, the introduction of ubiquitous computing (ubicomp) will see further changes in how we interact with technology and ...
Bederson, B.B.   +29 more
core   +3 more sources

An Efficient Trust Management Technique Using ID3 Algorithm With Blockchain in Smart Buildings IoT

open access: yesIEEE Access, 2023
Because of the rising population density, relationships are necessary to raise living standards through sending and receiving a wide range of services.
Fathe Jeribi   +3 more
doaj   +1 more source

TRACEABILITY AMONG SMALLHOLDERS IN ORGANIC FRESH PRODUCE VALUE CHAINS: CASE OF NAIROBI [PDF]

open access: yes, 2014
Traceability enhances information sharing and disclosure thereby increasing trust among stakeholder along value chains. This research evaluated information flow along organic fresh produce value chains using a participatory study of organic certified ...
Gichure, Josphat Njenga   +3 more
core   +1 more source

RECLAMO: virtual and collaborative honeynets based on trust management and autonomous systems applied to intrusion management [PDF]

open access: yes, 2013
Security intrusions in large systems is a problem due to its lack of scalability with the current IDS-based approaches. This paper describes the RECLAMO project, where an architecture for an Automated Intrusion Response System (AIRS) is being proposed ...
Fernández Cambronero, David   +4 more
core   +1 more source

Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)

open access: yesConnection Science, 2022
Individuals use Vehicular Ad Hoc Networks (VANETs) to secure, reliable communication networks as a viable route of transmission. Platooning uses Inter-Vehicular Communication to supervise a group of vehicles (IVC).
R. Priya, N. Sivakumar
doaj   +1 more source

Artificial Intelligence (AI) Trust Framework and Maturity Model: Applying an Entropy Lens to Improve Security, Privacy, and Ethical AI

open access: yesEntropy, 2023
Recent advancements in artificial intelligence (AI) technology have raised concerns about the ethical, moral, and legal safeguards. There is a pressing need to improve metrics for assessing security and privacy of AI systems and to manage AI technology ...
Michael Mylrea, Nikki Robinson
doaj   +1 more source

A Medical Implants Supply Chain System based on Blockchain Technology [PDF]

open access: yesمجله علوم پزشکی صدرا
Nowadays, medical implants are widely used around the world. Medical implant device safety is closely related to public health and national security.
Ali Tavakoligolpaygani   +2 more
doaj   +1 more source

IEEE Access Special Section Editorial: Blockchain-Enabled Trustworthy Systems

open access: yesIEEE Access, 2021
We are enjoying the benefits brought by the accelerated development of computing systems and the Internet. However, we are also facing a few security and privacy vulnerabilities caused by the increasing system complexity, heterogeneity, dynamicity, and ...
Hong-Ning Dai   +5 more
doaj   +1 more source

A Multi-Tier Trust-Based Security Mechanism for Vehicular Ad-Hoc Network Communications

open access: yesSensors, 2022
Securing communications in vehicle ad hoc networks is crucial for operations. Messages exchanged in vehicle ad hoc network communications hold critical information such as road safety information, or road accident information and it is essential these ...
Brian Akwirry   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy