Results 21 to 30 of about 30,718 (224)

Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption

open access: yesEntropy, 2023
Federated learning, as one of the three main technical routes for privacy computing, has been widely studied and applied in both academia and industry.
Bingxue Zhang   +4 more
doaj   +1 more source

Efficient certificateless searchable encryption scheme with verifiability

open access: yesTongxin xuebao, 2023
Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from ...
Xinhua CUI, Youliang TIAN, Qijia ZHANG
doaj   +2 more sources

Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing

open access: yesApplied Sciences, 2023
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt   +2 more
doaj   +1 more source

Privacy and Transparency in Blockchain-Based Smart Grid Operations

open access: yesIEEE Access, 2023
In the past few years, blockchain technology has emerged in numerous smart grid applications, enabling the construction of systems without the need for a trusted third party.
Pierpaolo Loreti   +5 more
doaj   +1 more source

Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol [PDF]

open access: yes, 2017
We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than ...
Giustolisi, Rosario   +2 more
core   +1 more source

Verifying Robocup Teams [PDF]

open access: yes, 2009
Verification of multi-agent systems is a challenging task due to their dynamic nature, and the complex interactions between agents. An example of such a system is the RoboCup Soccer Simulator, where two teams of eleven independent agents play a game of football against each other.
Benac Earle C.   +3 more
openaire   +2 more sources

Verifying the Verifier: eBPF Range Analysis Verification

open access: yes, 2023
AbstractThis paper proposes an automated method to check the correctness of range analysis used in the Linux kernel ’s eBPF verifier. We provide the specification of soundness for range analysis performed by the eBPF verifier. We automatically generate verification conditions that encode the operation of the eBPF verifier directly from the Linux kernel
Vishwanathan, Harishankar   +3 more
openaire   +1 more source

Experimenting with the king of France: Topics, verifiability and definite descriptions

open access: yesSemantics and Pragmatics, 2013
Definite descriptions with reference failure have been argued to give rise to different truth-value intuitions depending on the local linguistic context in which they appear.
Márta Abrusán, Kriszta Szendrői
doaj   +1 more source

Interim Information in Long Term Contracts [PDF]

open access: yes, 2005
This paper studies the effectiveness of interim information in reducing inefficiencies in long term relationships. If the interim information is verifiable, it resolves all problems of asymmetric information.
Strausz, Roland
core   +2 more sources

PVkNN: A Publicly Verifiable and Privacy-Preserving Exact kNN Query Scheme for Cloud-Based Location Services

open access: yesModelling
The k-nearest- neighbor (kNN) algorithm is crucial in data mining and machine learning, yet its deployment on large-scale datasets within cloud environments presents significant security and efficiency challenges. This paper is dedicated to advancing the
Jingyi Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy