Results 71 to 80 of about 150,216 (340)

Trusted computing: Challenges & solutions [PDF]

open access: yes, 2009
Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group
Awang, Nor Fatimah
core  

SGXIO: Generic Trusted I/O Path for Intel SGX

open access: yes, 2017
Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well.
Anati I.   +6 more
core   +1 more source

Static and Dynamic Behavior of Novel Y‐Shaped Sandwich Beams Subjected to Compressive Loadings: Integration of Supervised Learning and Experimentation

open access: yesAdvanced Engineering Materials, EarlyView.
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi   +4 more
wiley   +1 more source

Cycle ORAM: A Practical Protection for Access Pattern in Untrusted Storage

open access: yesIEEE Access, 2019
Oblivious RAM (ORAM) is a cryptographic primitive to hide memory access pattern in untrusted storage, but the cost remains prohibitively expensive. This paper proposes cycle ORAM, an improvement of Ring ORAM for small client setting.
Bo Zhao, Zhihong Chen, Hai Lin
doaj   +1 more source

A Method of Ultra-Large-Scale Matrix Inversion Using Block Recursion

open access: yesInformation, 2020
Ultra-large-scale matrix inversion has been applied as the fundamental operation of numerous domains, owing to the growth of big data and matrix applications.
HouZhen Wang, Yan Guo, HuanGuo Zhang
doaj   +1 more source

Bistable Mechanisms 3D Printing for Mechanically Programmable Vibration Control

open access: yesAdvanced Engineering Materials, EarlyView.
This work introduces a 3D‐printed bistable mechanism integrated into tuned mass dampers (TMDs) for mechanically adaptive passive vibration suppression. Through optimized geometry, the bistable design provides adaptable vibration reduction across a broad range of scenarios, achieving effective vibration mitigation without complex controls or external ...
Ali Zolfagharian   +4 more
wiley   +1 more source

Trustworthy content push

open access: yes, 2007
Delivery of content to mobile devices gains increasing importance in industrial environments to support employees in the field. An important application are e-mail push services like the fashionable Blackberry.
Kuntze, Nicolai, Schmidt, Andreas U.
core   +2 more sources

Beyond Order: Perspectives on Leveraging Machine Learning for Disordered Materials

open access: yesAdvanced Engineering Materials, EarlyView.
This article explores how machine learning (ML) revolutionizes the study and design of disordered materials by uncovering hidden patterns, predicting properties, and optimizing multiscale structures. It highlights key advancements, including generative models, graph neural networks, and hybrid ML‐physics methods, addressing challenges like data ...
Hamidreza Yazdani Sarvestani   +4 more
wiley   +1 more source

A Security Pattern for Cloud service certification [PDF]

open access: yes, 2019
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier   +1 more
core  

Citizen Electronic Identities using TPM 2.0

open access: yes, 2014
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...
Asokan, N.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy