Results 181 to 190 of about 150,216 (340)
Privacy Enhanced Pervasive Computing Model with Dynamic Trust and Security [PDF]
Geetha Mariappan+1 more
openalex +1 more source
ABSTRACT The penetration of information and communication technologies (ICTs) in farming communities is increasing the use of smartphone‐based instant messaging apps. Despite this, the reasons behind participation and the impact on farm productivity in developing countries remain unexplored.
Zafar Kurbanov+4 more
wiley +1 more source
Grammar-aware test case trimming for efficient hybrid fuzzing
In recent years, hybrid fuzzing has garnered significant attention by combining the benefits of both fuzzing and concolic execution. However, existing hybrid fuzzing techniques face problems such as the performance overhead of concolic execution and low ...
Yiru Zhao, Long Gao, Qihan Wan, Lei Zhao
doaj
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things. [PDF]
Asaithambi S+5 more
europepmc +1 more source
An Overview of Trust Models for Resource Selection in Grid Computing
P Vivekananth
openalex +1 more source
Trusted Computing and the Digital Crime Scene [PDF]
Danidou, Yianna, Schafer, Burkhard
core +1 more source
ABSTRACT Social tensions and resource depletion pose significant challenges to the agri‐food sector, highlighting the need for coordinated strategies to ensure sustainability in supply chains. Despite its critical importance, the relationship between coordination mechanisms and sustainability performance remains underexplored.
Carlos Moreno‐Miranda, Liesbeth Dries
wiley +1 more source
Adaptive Trust Evaluation Model Based on Entropy Weight Method for Sensing Terminal Process. [PDF]
Li T, Zhang Y.
europepmc +1 more source
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley +1 more source
Controlled quantum authentication confidential communication protocol for smart healthcare. [PDF]
He Y, Fan J, Zhang Y.
europepmc +1 more source