Results 21 to 30 of about 30,415 (268)

Efficient certificateless searchable encryption scheme with verifiability

open access: yesTongxin xuebao, 2023
Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from ...
Xinhua CUI, Youliang TIAN, Qijia ZHANG
doaj   +2 more sources

TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain

open access: yesIEEE Access, 2018
As a very attractive computing paradigm, cloud computing makes it possible for resource-constrained users to enjoy cost-effective and flexible resources of diversity. Considering the untrustworthiness of cloud servers and the data privacy of users, it is
Yinghui Zhang   +4 more
doaj   +1 more source

Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing

open access: yesApplied Sciences, 2023
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt   +2 more
doaj   +1 more source

Privacy and Transparency in Blockchain-Based Smart Grid Operations

open access: yesIEEE Access, 2023
In the past few years, blockchain technology has emerged in numerous smart grid applications, enabling the construction of systems without the need for a trusted third party.
Pierpaolo Loreti   +5 more
doaj   +1 more source

Verifying Robocup Teams [PDF]

open access: yes, 2009
Verification of multi-agent systems is a challenging task due to their dynamic nature, and the complex interactions between agents. An example of such a system is the RoboCup Soccer Simulator, where two teams of eleven independent agents play a game of football against each other.
Benac Earle C.   +3 more
openaire   +2 more sources

Verifying the Verifier: eBPF Range Analysis Verification

open access: yes, 2023
AbstractThis paper proposes an automated method to check the correctness of range analysis used in the Linux kernel ’s eBPF verifier. We provide the specification of soundness for range analysis performed by the eBPF verifier. We automatically generate verification conditions that encode the operation of the eBPF verifier directly from the Linux kernel
Vishwanathan, Harishankar   +3 more
openaire   +1 more source

Experimenting with the king of France: Topics, verifiability and definite descriptions

open access: yesSemantics and Pragmatics, 2013
Definite descriptions with reference failure have been argued to give rise to different truth-value intuitions depending on the local linguistic context in which they appear.
Márta Abrusán, Kriszta Szendrői
doaj   +1 more source

Comparing "challenge-based" and "code-based" internet voting verification implementations [PDF]

open access: yes, 2019
Internet-enabled voting introduces an element of invisibility and unfamiliarity into the voting process, which makes it very different from traditional voting.
A Kiayias   +14 more
core   +6 more sources

What did I really vote for? On the usability of verifiable e-voting schemes [PDF]

open access: yes, 2018
E-voting has been embraced by a number of countries, delivering benefits in terms of efficiency and accessibility. End-to-end verifiable e-voting schemes facilitate verification of the integrity of individual votes during the election process.
Kulyk, Oksana   +3 more
core   +2 more sources

Making Digital Artifacts on the Web Verifiable and Reliable [PDF]

open access: yes, 2015
The current Web has no general mechanisms to make digital artifacts --- such as datasets, code, texts, and images --- verifiable and permanent. For digital artifacts that are supposed to be immutable, there is moreover no commonly accepted method to ...
Dumontier, Michel, Kuhn, Tobias
core   +4 more sources

Home - About - Disclaimer - Privacy