Secure Indoor Localization Based on Extracting Trusted Fingerprint
Indoor localization based on WiFi has attracted a lot of research effort because of the widespread application of WiFi. Fingerprinting techniques have received much attention due to their simplicity and compatibility with existing hardware.
Juan Luo +3 more
doaj +2 more sources
Developing and Publishing Code for Trusted Research Environments: Best Practices and Ways of Working [PDF]
This report discusses 3 distinct, but overlapping topics. Firstly, it recommends the tools and best practices for research software engineering and data science that are most relevant to the researchers working on the Wales Multimorbidity Machine ...
Ed Chalstrey
semanticscholar +1 more source
GRAIMATTER Green Paper: Recommendations for disclosure control of trained Machine Learning (ML) models from Trusted Research Environments (TREs) [PDF]
TREs are widely, and increasingly used to support statistical analysis of sensitive data across a range of sectors (e.g., health, police, tax and education) as they enable secure and transparent research whilst protecting data confidentiality.
E. Jefferson +18 more
semanticscholar +1 more source
Background Trusted Research Environments provide a legitimate basis for data access along with a set of technologies to support implementation of the "five-safes" framework for privacy protection. Lack of standard approaches in achieving compliance with
Fatemeh Torabi +6 more
doaj +1 more source
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research [PDF]
Modern computer systems tend to rely on large trusted computing bases (TCBs) for operations. To address the TCB bloating problem, hardware vendors have developed mechanisms to enable or facilitate the creation of a trusted execution environment (TEE) in ...
Rabimba Karanjai +5 more
semanticscholar +1 more source
Research on the trusted environment of container cloud based on the TPCM
Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much ...
Guojie LIU +3 more
doaj +3 more sources
A Beginner\u27s Guide to Applied Educational Research using Thematic Analysis [PDF]
Interest in applied educational research methodology is growing as educators and researchers strive to seek empirical evidence about what is effective teaching within distinctive contexts.
Peel, Karen L.
core +3 more sources
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications [PDF]
Trusted Execution Environments (TEEs) are a feature of modern central processing units (CPUs) that aim to provide a high assurance, isolated environment in which to run workloads that demand both confidentiality and integrity.
Arttu Paju +5 more
semanticscholar +1 more source
Trusted Deep Neural Execution—A Survey
The growing use of deep neural networks (DNNs) in various applications has raised concerns about the security and privacy of model parameters and runtime execution. To address these concerns, researchers have proposed using trusted execution environments
Mohammad Fakhruddin Babar, Monowar Hasan
doaj +1 more source
Environmental pre-requisites and social interchange : the participation experience of adolescents with autism spectrum disorder in Zurich [PDF]
Aim: Participation of adolescents with autism spectrum disorder hardly occurs in settings outside of home and school. Little is known about how their participation is influenced by environmental factors.
Beurskens, Anna +4 more
core +1 more source

