Results 21 to 30 of about 30,718 (224)
Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption
Federated learning, as one of the three main technical routes for privacy computing, has been widely studied and applied in both academia and industry.
Bingxue Zhang +4 more
doaj +1 more source
Efficient certificateless searchable encryption scheme with verifiability
Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from ...
Xinhua CUI, Youliang TIAN, Qijia ZHANG
doaj +2 more sources
Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt +2 more
doaj +1 more source
Privacy and Transparency in Blockchain-Based Smart Grid Operations
In the past few years, blockchain technology has emerged in numerous smart grid applications, enabling the construction of systems without the need for a trusted third party.
Pierpaolo Loreti +5 more
doaj +1 more source
Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol [PDF]
We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than ...
Giustolisi, Rosario +2 more
core +1 more source
Verification of multi-agent systems is a challenging task due to their dynamic nature, and the complex interactions between agents. An example of such a system is the RoboCup Soccer Simulator, where two teams of eleven independent agents play a game of football against each other.
Benac Earle C. +3 more
openaire +2 more sources
Verifying the Verifier: eBPF Range Analysis Verification
AbstractThis paper proposes an automated method to check the correctness of range analysis used in the Linux kernel ’s eBPF verifier. We provide the specification of soundness for range analysis performed by the eBPF verifier. We automatically generate verification conditions that encode the operation of the eBPF verifier directly from the Linux kernel
Vishwanathan, Harishankar +3 more
openaire +1 more source
Experimenting with the king of France: Topics, verifiability and definite descriptions
Definite descriptions with reference failure have been argued to give rise to different truth-value intuitions depending on the local linguistic context in which they appear.
Márta Abrusán, Kriszta Szendrői
doaj +1 more source
Interim Information in Long Term Contracts [PDF]
This paper studies the effectiveness of interim information in reducing inefficiencies in long term relationships. If the interim information is verifiable, it resolves all problems of asymmetric information.
Strausz, Roland
core +2 more sources
The k-nearest- neighbor (kNN) algorithm is crucial in data mining and machine learning, yet its deployment on large-scale datasets within cloud environments presents significant security and efficiency challenges. This paper is dedicated to advancing the
Jingyi Li +3 more
doaj +1 more source

