Results 1 to 10 of about 12,108 (212)

Privacy and trusted computing [PDF]

open access: green14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., 2004
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user and remote third parties. The privacy implications of this approach are investigated in the context of the Trusted Computing Platform Alliance (TCPA) specification.
Reid, Jason   +3 more
openaire   +4 more sources

Mobile Trusted Computing [PDF]

open access: bronzeProceedings of the IEEE, 2014
Trusted computing technologies for mobile devices have been researched, developed, and deployed over the past decade. Although their use has been limited so far, ongoing standardization may change this by opening up these technologies for easy access by developers and users.
Asokan, N.   +8 more
openaire   +4 more sources

A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure [PDF]

open access: yesFoods
The food and agriculture sector is a cornerstone of critical infrastructure (CI), underpinning global food security, public health, and economic stability.
Chengliang Zheng   +9 more
doaj   +2 more sources

Trusted Cloud Computing [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G ...
Kashif Kifayat   +2 more
doaj   +2 more sources

Research on digital copyright protection based on the hyperledger fabric blockchain network technology [PDF]

open access: yesPeerJ Computer Science, 2021
With the recent development in network technology over a few years, digital works can be easily published online. One of the main issues in the field of digital technology is the infringement of digital works, which can seriously damage the data owners ...
Yanhui Liu   +3 more
doaj   +2 more sources

Similarity Property and Slide Attack of Block Cipher FESH

open access: yesIET Information Security, 2023
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties ...
Yafei Zheng, Wenling Wu
doaj   +1 more source

Application progress of SGX in trusted computing area

open access: yes网络与信息安全学报, 2021
The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks. Firstly, the research background and working principle of SGX
ZHAO Bo, YUAN Anqi, AN Yang
doaj   +3 more sources

An End-to-End Rumor Detection Model Based on Feature Aggregation

open access: yesComplexity, 2021
The social network has become the primary medium of rumor propagation. Moreover, manual identification of rumors is extremely time-consuming and laborious. It is crucial to identify rumors automatically.
Aoshuang Ye   +5 more
doaj   +1 more source

HSM-QA: Question Answering System Based on Hierarchical Semantic Matching

open access: yesIEEE Access, 2023
In recent years, Question Answering (QA) systems have gained popularity as a means of acquiring knowledge. However, the prevalent approach of matching question-answer pairs still suffers from low precision and efficiency due to the inherent ambiguity of ...
Jinlu Zhang   +4 more
doaj   +1 more source

ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model

open access: yesEntropy, 2023
The research on image-classification-adversarial attacks is crucial in the realm of artificial intelligence (AI) security. Most of the image-classification-adversarial attack methods are for white-box settings, demanding target model gradients and ...
Zhongwang Fu, Xiaohui Cui
doaj   +1 more source

Home - About - Disclaimer - Privacy