Results 31 to 40 of about 30,415 (268)
The k-nearest- neighbor (kNN) algorithm is crucial in data mining and machine learning, yet its deployment on large-scale datasets within cloud environments presents significant security and efficiency challenges. This paper is dedicated to advancing the
Jingyi Li +3 more
doaj +1 more source
Multikey Verifiable Homomorphic Encryption
A homomorphic encryption (HE) scheme is an advanced encryption technology which allows any user receiving ciphertexts to perform computations over them in a public manner. An important application of an HE scheme is a private delegating computation where
Yi Lu, Keisuke Hara, Keisuke Tanaka
doaj +1 more source
Trusty URIs: Verifiable, Immutable, and Permanent Digital Artifacts for Linked Data [PDF]
To make digital resources on the web verifiable, immutable, and permanent, we propose a technique to include cryptographic hash values in URIs. We call them trusty URIs and we show how they can be used for approaches like nanopublications to make not ...
A. Callahan +12 more
core +4 more sources
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election
Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we p verifiable,
Xukai Zou +4 more
doaj +1 more source
Verified Bytecode Verifiers [PDF]
Using the theorem prover Isabelle/HOL we have formalized and proved correct an executable bytecode verifier in the style of Kildall's algorithm for a significant subset of the Java Virtual Machine. First an abstract framework for proving correctness of data flow based type inference algorithms for assembly languages is formalized.
openaire +1 more source
The formal verification of programs has progressed tremendously in the last decade. In this talk, I review some of the obstacles that [6, 8, 15, 18] remain to be lifted before source-level verification tools can be taken really seriously in the critical software industry.
openaire +1 more source
Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server Setting
Plaintext-checkable encryption (PCE), first introduced by Canard et al., allows users searching on encrypted data through plaintexts. It provides a useful primitive in the cloud computing security.
Yijian Zhong, Sha Ma, Qiong Huang
doaj +1 more source
VeriFi: Towards Verifiable Federated Unlearning
Federated learning (FL) is a collaborative learning paradigm where participants jointly train a powerful model without sharing their private data. One desirable property for FL is the implementation of the right to be forgotten (RTBF), i.e., a leaving participant has the right to request to delete its private data from the global model.
Xiangshan Gao +7 more
openaire +2 more sources
Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley +1 more source
Modelling of Reliability Indicators of a Mining Plant
The evaluation and prediction of reliability and testability of mining machinery and equipment are crucial, as advancements in mining technology have increased the importance of ensuring the safety of both the technological process and human life.
Boris V. Malozyomov +6 more
doaj +1 more source

