Results 21 to 30 of about 30,415 (268)
Efficient certificateless searchable encryption scheme with verifiability
Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from ...
Xinhua CUI, Youliang TIAN, Qijia ZHANG
doaj +2 more sources
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain
As a very attractive computing paradigm, cloud computing makes it possible for resource-constrained users to enjoy cost-effective and flexible resources of diversity. Considering the untrustworthiness of cloud servers and the data privacy of users, it is
Yinghui Zhang +4 more
doaj +1 more source
Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt +2 more
doaj +1 more source
Privacy and Transparency in Blockchain-Based Smart Grid Operations
In the past few years, blockchain technology has emerged in numerous smart grid applications, enabling the construction of systems without the need for a trusted third party.
Pierpaolo Loreti +5 more
doaj +1 more source
Verification of multi-agent systems is a challenging task due to their dynamic nature, and the complex interactions between agents. An example of such a system is the RoboCup Soccer Simulator, where two teams of eleven independent agents play a game of football against each other.
Benac Earle C. +3 more
openaire +2 more sources
Verifying the Verifier: eBPF Range Analysis Verification
AbstractThis paper proposes an automated method to check the correctness of range analysis used in the Linux kernel ’s eBPF verifier. We provide the specification of soundness for range analysis performed by the eBPF verifier. We automatically generate verification conditions that encode the operation of the eBPF verifier directly from the Linux kernel
Vishwanathan, Harishankar +3 more
openaire +1 more source
Experimenting with the king of France: Topics, verifiability and definite descriptions
Definite descriptions with reference failure have been argued to give rise to different truth-value intuitions depending on the local linguistic context in which they appear.
Márta Abrusán, Kriszta Szendrői
doaj +1 more source
Comparing "challenge-based" and "code-based" internet voting verification implementations [PDF]
Internet-enabled voting introduces an element of invisibility and unfamiliarity into the voting process, which makes it very different from traditional voting.
A Kiayias +14 more
core +6 more sources
What did I really vote for? On the usability of verifiable e-voting schemes [PDF]
E-voting has been embraced by a number of countries, delivering benefits in terms of efficiency and accessibility. End-to-end verifiable e-voting schemes facilitate verification of the integrity of individual votes during the election process.
Kulyk, Oksana +3 more
core +2 more sources
Making Digital Artifacts on the Web Verifiable and Reliable [PDF]
The current Web has no general mechanisms to make digital artifacts --- such as datasets, code, texts, and images --- verifiable and permanent. For digital artifacts that are supposed to be immutable, there is moreover no commonly accepted method to ...
Dumontier, Michel, Kuhn, Tobias
core +4 more sources

