Zobrazeno 1 - 10
of 8 347
pro vyhledávání: '"Verifiable"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-17 (2024)
Abstract In recent years, the rapid proliferation of digital services and resources on Industrial Internet has imposed higher demands on universality and privacy of identity management. Particularly with the advent of the digital economy, prudent use
Externí odkaz:
https://doaj.org/article/85fa578dcefb491586136fb9aade0dac
Autor:
Šeila Bećirović Ramić, Ehlimana Cogo, Irfan Prazina, Emir Cogo, Muhamed Turkanović, Razija Turčinhodžić Mulahasanović, Saša Mrdović
Publikováno v:
ICT Express, Vol 10, Iss 4, Pp 916-934 (2024)
Digital credentials represent digital versions of physical credentials. They are the cornerstone of digital identity on the Internet. In order to enhance privacy, different authors implement selective disclosure in digital credentials, allowing users
Externí odkaz:
https://doaj.org/article/b1885e33be644e57948ad7391429a515
Autor:
A. Yu. Lazutkina
Publikováno v:
Acta Biomedica Scientifica, Vol 9, Iss 3, Pp 188-202 (2024)
Background. Coronary heart disease (CHD) ranks first among the causes of death, morbidity, and disablement. The development of innovative methods for predicting CHD will reduce these losses.The aim of the work. To assess the quality of the screening
Externí odkaz:
https://doaj.org/article/1a2effde7d4d4eadaeb5aec0be67c2be
Publikováno v:
网络与信息安全学报, Vol 10, Pp 91-106 (2024)
Federated learning, capable of training models by sharing gradient parameters, faces the risk of dishonest data aggregation by malicious servers during the model aggregation process. Untrusted users participating in federated learning may also pose a
Externí odkaz:
https://doaj.org/article/4366724850b548969d78fe2a22e74e45
Publikováno v:
网络与信息安全学报, Vol 10, Iss 3, Pp 91-106 (2024)
Federated learning, capable of training models by sharing gradient parameters, faces the risk of dishonest data aggregation by malicious servers during the model aggregation process. Untrusted users participating in federated learning may also pose a
Externí odkaz:
https://doaj.org/article/39d2da9d994d4300881e1f96719f5001
Autor:
Zhou, Fucai a, Sun, Jintong a, b, ⁎, Wang, Qiang a, Zhang, Yun c, Hou, Ruiwei a, Wang, Chongyang a
Publikováno v:
In Computer Standards & Interfaces April 2025 93
Publikováno v:
网络与信息安全学报, Vol 10, Pp 121-132 (2024)
With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data priva
Externí odkaz:
https://doaj.org/article/ab20b10645a649198ed3a4ebc01ba87a
Publikováno v:
网络与信息安全学报, Vol 10, Iss 2, Pp 121-132 (2024)
With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data priva
Externí odkaz:
https://doaj.org/article/b6436dab140d4a239070fe1f7fb2b297
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-17 (2024)
Abstract Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models are plagued by critical flaws in fairness, security, privacy and regulation. To tackle the ab
Externí odkaz:
https://doaj.org/article/46a6f627de67407b892224751b59cd2d
Autor:
Braxton, Sherri Nicole
Publikováno v:
The International Journal of Information and Learning Technology, 2023, Vol. 40, Issue 5, pp. 373-387.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJILT-10-2022-0206