Results 281 to 290 of about 150,216 (340)
Secure Computing for Fog-Enabled Industrial IoT. [PDF]
Alvi AN+5 more
europepmc +1 more source
Medical Big Data Storage in Precision Medicine: A Systematic Review. [PDF]
Langarizadeh M, Hajebrahimi M.
europepmc +1 more source
Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare. [PDF]
Xie Q, Ding Z.
europepmc +1 more source
Novel model to authenticate role-based medical users for blockchain-based IoMT devices. [PDF]
Aslam MS+7 more
europepmc +1 more source
Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption. [PDF]
Jerkovic F, Sarkar NI, Ali J.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Trusting Computers Through Trusting Humans
International Journal of Technology and Human Interaction, 2007This article considers the question of how we may trust automatically generated program code. The code walkthroughs and inspections of software engineering mimic the ways that mathematicians go about assuring themselves that a mathematical proof is true.
Paul Spedding, Alison Adam
openaire +2 more sources
A Trust Logic for Pre-Trust Computations
2018 21st International Conference on Information Fusion (FUSION), 2018Computational trust is the digital counterpart of the human notion of trust as applied in social systems. Its main purpose is to improve the reliability of interactions in online communities and of knowledge transfer in information management systems. Trust models are formal frameworks in which the notion of computational trust is described rigorously ...
Tagliaferri, Mirko, Aldini, Alessandro
openaire +2 more sources