Results 51 to 60 of about 30,718 (224)

A Publicly Verifiable E-Voting System Based on Biometrics

open access: yesCryptography, 2023
Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transparency
Jinhui Liu   +5 more
doaj   +1 more source

Verifiability in Markets for Credence Goods [PDF]

open access: yes, 2009
Theory predicts that efficiency prevails on credence goods markets if customers are able to verify which quality they receive from an expert seller.
Dulleck, Uwe   +2 more
core   +2 more sources

Bacterial Outer Membrane Vesicles in Potentiating Cancer Vaccines: Progress and Prospects

open access: yesAdvanced Science, EarlyView.
Bacterial outer membrane vesicles (OMVs) have emerged as versatile platforms for cancer vaccine development owing to their intrinsic immunostimulatory properties and high engineering flexibility. This review summarizes OMV biology, immune mechanisms, and engineering strategies that enhance vaccine efficacy, discusses key translational challenges, and ...
Jiabeini Zhang   +9 more
wiley   +1 more source

GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning

open access: yesFuture Internet
Federated learning is a powerful tool for securing participants’ private data due to its ability to make data “available but not visible”. In recent years, federated learning has been enhanced by the emergence of multi-weight aggregation protocols, which
Yulin Kang   +5 more
doaj   +1 more source

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

V-MHESA: A Verifiable Masking and Homomorphic Encryption-Combined Secure Aggregation Strategy for Privacy-Preserving Federated Learning

open access: yesMathematics
In federated learning, secure aggregation is essential to protect the confidentiality of local model updates, ensuring that the server can access only the aggregated result without exposing individual contributions.
Soyoung Park, Jeonghee Chi
doaj   +1 more source

The Reality and the Verifiability of Reincarnation

open access: yesReligions, 2017
We investigate the topic of reincarnation by revisiting a recent debate from the pages of the journal Philosophy East and West between Whitley Kaufman, who presents five moral objections to karma and reincarnation as an explanation for human suffering ...
Ankur Barua
doaj   +1 more source

HandiVote: simple, anonymous, and auditable electronic voting [PDF]

open access: yes, 2009
We suggest a set of procedures utilising a range of technologies by which a major democratic deficit of modern society can be addressed. The mechanism, whilst it makes limited use of cryptographic techniques in the background, is based around objects and ...
Cockshott, W.P., Renaud, K.
core   +1 more source

Revisiting Target‐Aware de novo Molecular Generation with TarPass: Between Rational Design and Texas Sharpshooter

open access: yesAdvanced Science, EarlyView.
TarPass provides a rigorous benchmark for target‐aware de novo molecular generation by jointly evaluating protein‐ligand interactions, molecular plausibility, and drug‐likeness on 18 well‐studied targets. Results show that current models often fail to consistently surpass random baseline in target‐specific enrichment, while post hoc multi‐tier virtual ...
Rui Qin   +11 more
wiley   +1 more source

Public Evidence from Secret Ballots

open access: yes, 2017
Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct ...
A Kiayias   +32 more
core   +1 more source

Home - About - Disclaimer - Privacy