Showing 181 - 200 results of 249 for search 'computational trust', query time: 0.08s Refine Results
  1. 181
  2. 182
  3. 183
  4. 184

    Pain Management for Nerve Injury following Dental Implant Surgery at Tokyo Dental College Hospital by Ken-ichi Fukuda, Tatsuya Ichinohe, Yuzuru Kaneko

    Published 2012-01-01
    “…Moreover, if sensory damage does occur it is essential to avoid breaking the bond of trust between dentist and patient by giving false assurances of recovery. …”
    Get full text
    Article
  5. 185
  6. 186
  7. 187
  8. 188
  9. 189
  10. 190
  11. 191

    Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol by Yongkai Li, Shubo Liu, Jun Wang, Mengjun Liu

    Published 2016-07-01
    “…In this paper, we proposed an efficient aggregation protocol which tolerates up to k passive adversaries that do not try to tamper the computation. The proposed protocol does not require a trusted key dealer and needs only one initialization during the whole time-series data aggregation. …”
    Get full text
    Article
  12. 192

    Formal Verification of ERC-Based Smart Contracts: A Systematic Literature Review by Rim Ben Fekih, Mariam Lahami, Salma Bradai, Mohamed Jmaiel

    Published 2025-01-01
    “…Defined as an agreement between multiple parties and systematically executed by a computer code, smart contracts enable trust-less execution without a third party. …”
    Get full text
    Article
  13. 193

    Social diagnostics of information security of digital society: methodological and regulatory aspects by M. V. Kibakin

    Published 2020-02-01
    “…The essence of digital society as an object of protection from adverse effects at the technological level (computer, software and hardware base of digital communications), as well as at the level of content distributed in the information and communication network “Internet” has been stated. …”
    Get full text
    Article
  14. 194
  15. 195
  16. 196
  17. 197
  18. 198

    Investigating and prioritizing the factors affecting the success of e-commerce using the best and worst (BWM) technique. by shayan mohammadpour mir, shiba masoumi, seyed mojtaba kavoosi davoodi

    Published 2024-05-01
    “…For example, researchers in e-commerce have mentioned the skills and techniques of gaining customer trust as an essential factor (Murphy & Tocher, 2011). …”
    Get full text
    Article
  19. 199

    Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes by Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal

    Published 2021-01-01
    “…In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator. …”
    Get full text
    Article
  20. 200