-
21
Playing by the rules: Government regulation and consumer trust in the online poker industry
Published 2025-03-01Get full text
Article -
22
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
Published 2016-03-01Get full text
Article -
23
Performance rather than reputation affects humans’ trust towards an artificial agent
Published 2025-03-01Get full text
Article -
24
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
Published 2024-12-01Get full text
Article -
25
Automatic detection of fake reviews at marketplaces using expert-based features and consumers’ reactions
Published 2024-10-01Subjects: Get full text
Article -
26
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01Get full text
Article -
27
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01Get full text
Article -
28
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…Prospects of cloud computing as a technology that optimizes resources, reduces complexity, and provides cost-effective solutions to its consumers are well established. …”
Get full text
Article -
29
Factors influencing trust in algorithmic decision-making: an indirect scenario-based experiment
Published 2025-02-01Get full text
Article -
30
TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs
Published 2015-07-01Get full text
Article -
31
Trust-Centric and Economically Optimized Resource Management for 6G-Enabled Internet of Things Environment
Published 2024-12-01Get full text
Article -
32
Channel Selection Based on Trust and Multiarmed Bandit in Multiuser, Multichannel Cognitive Radio Networks
Published 2014-01-01Get full text
Article -
33
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…As traditional encryption methods face obsolescence due to the advent of quantum computing, there is an urgent need for more robust security solutions. qTrustNet VPN addresses this need by ensuring the confidentiality and integrity of data transmission through the WireGuard protocol, known for its simplicity and high performance. …”
Get full text
Article -
34
-
35
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01Get full text
Article -
36
-
37
-
38
Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks
Published 2016-07-01Get full text
Article -
39
Modeling Public Opinion Over Time and Space: Trust in State Institutions in Europe, 1989-2019
Published 2024-04-01Get full text
Article -
40