Results 1 to 10 of about 2,499 (96)

A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability. [PDF]

open access: yesPLoS ONE
Ensuring both cast-as-intended (CAI) verifiability and coercion-resistance in e-voting remains a critical challenge. The e-voting scheme proposed by Finogina and Herranz in 2023 represents the first notable advancement in reconciling these conflicting ...
Yun-Xing Kho   +3 more
doaj   +2 more sources

Extensions for Apple-Google exposure notification mechanism [PDF]

open access: yesBulletin of the Polish Academy of Sciences: Technical Sciences, 2021
We analyze the Google-Apple exposure notification mechanism designed by the Apple-Google consortium and deployed on a large number of Corona-warn apps.
Adam Bobowski   +2 more
doaj   +1 more source

The Role of Internal Audit to Reduce the Effects of Creative Accounting on the Reliability of Financial Statements in the Jordanian Islamic Banks

open access: yesInternational Journal of Financial Studies, 2022
The purpose of this study is to look into the role of internal audit (IA) in reducing the effects of creative accounting (CA) on financial statement reliability in Jordanian Islamic Banks.
Baker Akram Falah Jarah   +3 more
doaj   +1 more source

Communication-Efficient and Privacy-Preserving Verifiable Aggregation for Federated Learning

open access: yesEntropy, 2023
Federated learning is a distributed machine learning framework, which allows users to save data locally for training without sharing data. Users send the trained local model to the server for aggregation.
Kaixin Peng   +4 more
doaj   +1 more source

A Verifiable Arbitrated Quantum Signature Scheme Based on Controlled Quantum Teleportation

open access: yesEntropy, 2022
In this paper, we present a verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. The five-qubit entangled state functions as a quantum channel.
Dianjun Lu   +3 more
doaj   +1 more source

Secure efficient and verifiable large linear equations solve outsourcing computing scheme

open access: yes网络与信息安全学报, 2017
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj   +3 more sources

Verifiability of diagnostic categories and work ability in the context of disability pension award: A survey on "gatekeeping" among general practitioners in Norway

open access: yesBMC Public Health, 2008
Background Disability benefits exist to redeem social and financial consequences of reduced work ability from medical conditions. Physicians are responsible for identifying the medical grounds for benefit claims.
Johansen Kristian   +3 more
doaj   +1 more source

G. Ryle. Unverifiability-by-Me / trans. from Engl. V. V. Ogleznev [PDF]

open access: yesОмский научный вестник: Серия "Общество. История. Современность"
The paper presents an analysis of the notions of ‘verifiability-in-principle’ and ‘(un)verifiability-byme’. Based on the distinction between logical and causal possibility, it is shown that the pronoun ‘I’ is not a demonstrative symbol lacking any ...
V. V. Ogleznev
doaj   +1 more source

Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing

open access: yesIEEE Access, 2020
Cloud storage, one of the most attractive services offered by cloud computing, can provide users with boundless storage capacity. Thus, users can outsource their data to the cloud server for greatly saving local storage overhead.
Changsong Yang   +3 more
doaj   +1 more source

SeVEP: Secure and Verifiable Electronic Polling System

open access: yesIEEE Access, 2019
Electronic polling systems promise benefits to voters such as accessibility and convenience that enable them to cast their votes at any time, from any Internet-connected computing device anywhere in the world.
Amna Qureshi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy