Results 21 to 30 of about 160,167 (287)

Hybridchain: A Novel Architecture for Confidentiality-Preserving and Performant Permissioned Blockchain Using Trusted Execution Environment

open access: yesIEEE Access, 2020
Blockchain is making headlines due to it promises to provide a decentralized, transparent, tamper-resistant, traceable and verifiable historical transaction records that can resist faults of any single node. According to the latest data from State of the
Yong Wang   +3 more
doaj   +1 more source

A Transformer-Based Hierarchical Variational AutoEncoder Combined Hidden Markov Model for Long Text Generation

open access: yesEntropy, 2021
The Variational AutoEncoder (VAE) has made significant progress in text generation, but it focused on short text (always a sentence). Long texts consist of multiple sentences.
Kun Zhao   +3 more
doaj   +1 more source

Hyperledger Fabric Access Control System for Internet of Things Layer in Blockchain-Based Applications

open access: yesEntropy, 2021
Blockchain-based applications are gaining traction in various application fields, including supply chain management, health care, and finance. The Internet of Things (IoT) is a critical component of these applications since it allows for data collection ...
Adnan Iftekhar   +3 more
doaj   +1 more source

Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach [PDF]

open access: yes, 2012
The use of clouds raises significant security concerns for the services they provide. Addressing these concerns requires novel models of cloud service certification based on multiple forms of evidence including testing and monitoring data, and trusted ...
Damiani, E., MaƱa, A., Spanoudakis, G.
core   +1 more source

FBANet: Transfer Learning for Depression Recognition Using a Feature-Enhanced Bi-Level Attention Network

open access: yesEntropy, 2023
The House-Tree-Person (HTP) sketch test is a psychological analysis technique designed to assess the mental health status of test subjects. Nowadays, there are mature methods for the recognition of depression using the HTP sketch test.
Huayi Wang   +3 more
doaj   +1 more source

Trust and Trusted Computing Platforms [PDF]

open access: yes, 2011
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust that are prominent in computing systems. In this paper, a result of the Software Engineering Institute's Independent Research and Development Project "Trusted Computing in Extreme Adversarial Environments: Using Trusted Hardware as a Foundation for Cyber ...
Fisher, David   +2 more
openaire   +1 more source

Tree-formed Verification Data for Trusted Platforms

open access: yes, 2012
The establishment of trust relationships to a computing platform relies on validation processes. Validation allows an external entity to build trust in the expected behaviour of the platform based on provided evidence of the platform's configuration.
Andreas Brett   +54 more
core   +1 more source

Android Data-Clone Attack via Operating System Customization

open access: yesIEEE Access, 2020
To avoid the inconvenience of retyping a user's ID and password, most mobile apps now provide the automatic login feature for a better user experience. To this end, auto-login credential is stored locally on the smartphone.
Wenna Song   +7 more
doaj   +1 more source

Privacy Inference Attack Against Users in Online Social Networks: A Literature Review

open access: yesIEEE Access, 2021
With the rapid development of social networks, users pay more and more attention to the protection of personal information. However, the transmission of users’ personal information through social networks will inevitably lead to privacy leakage ...
Yangheran Piao, Kai Ye, Xiaohui Cui
doaj   +1 more source

A Review of Differential Privacy in Individual Data Release

open access: yesInternational Journal of Distributed Sensor Networks, 2015
The rapid development of mobile technology has improved users' quality of treatment, and tremendous amounts of medical information are readily available and widely used in data analysis and application, which bring on serious threats to users' privacy ...
Jun Wang, Shubo Liu, Yongkai Li
doaj   +1 more source

Home - About - Disclaimer - Privacy