Results 111 to 120 of about 2,322,677 (316)

Analysis of Open Environment Sign-in Schemes-Privacy Enhanced & Trustworthy Approach

open access: yesJournal of Advances in Information Technology, 2011
The third party based authentication possess users privacy concerns in an open environment such as links and traces user identities across various services.
Zubair Ahmad Khattak   +2 more
doaj   +1 more source

Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]

open access: yes, 2010
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core   +1 more source

Citizen Electronic Identities using TPM 2.0

open access: yes, 2014
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...
Asokan, N.   +2 more
core   +1 more source

Artificial Intelligence as the Next Visionary in Liquid Crystal Research

open access: yesAdvanced Functional Materials, EarlyView.
The functions of AI in the research laboratory are becoming increasingly sophisticated, allowing the entire process of hypothesis formulation, material design, synthesis, experimental design, and reiterative testing to be automated. In our work, we conceive how the incorporation of AI in the laboratory environment will transform the role and ...
Mert O. Astam   +2 more
wiley   +1 more source

A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes

open access: yesConference on Computer and Communications Security, 2019
This paper analyzes the vulnerability space arising in Trusted Execution Environments (TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious code. Considerable research and industry effort has gone into developing TEE
Jo Van Bulck   +5 more
semanticscholar   +1 more source

Constructing Ionic Fast Diffusion Channels on LiNi0.5Mn1.5O4 for Lithium‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
A dual‐modification strategy is developed for LNMO cathode, where bulk Ti doping stabilizes the oxygen framework and simultaneously drives the in situ formation of LaTi2O6 nano‐islands as ion diffusion channels on (111) surfaces, enabling high‐rate capacity (∼100 mAh g−1 at 30 C) and excellent cycling retention (87.8% after 1000 cycles).
Xinyi Zhang   +10 more
wiley   +1 more source

Coagulative Granular Hydrogels with an Enzyme Catalyzed Fibrin Network for Endogenous Tissue Regeneration

open access: yesAdvanced Healthcare Materials, EarlyView.
Coagulative granular hydrogels are composed of packed thrombin‐functionalized microgels that catalyze the conversion of fibrinogen into a secondary fibrin network, filling the interstitial voids. This bio‐inspired approach stabilizes the biomaterial to match the robustness of bulk hydrogels without compromising injectability, mimicking the initial ...
Zhipeng Deng   +16 more
wiley   +1 more source

Advertising Media and the Green Environmental Aspect [PDF]

open access: yes
Previous research has shown that consumer trust in advertising is low and continues to diminish. Researchers have also found that a big share of advertising investments is placed in less favorable media which can contribute to consumers’ increasing ...
Rademaker, Claudia A.
core  

A Conceptual Framework and Principles for Trusted Pervasive Health

open access: yesJournal of Medical Internet Research, 2012
Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept—pervasive health—which takes place in an open, unsecure, and highly dynamic environment
P. Ruotsalainen   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy