Showing 81 - 100 results of 249 for search 'computational trust', query time: 0.06s Refine Results
  1. 81

    Peering into the Heart: A Comprehensive Exploration of Semantic Segmentation and Explainable AI on the MnMs-2 Cardiac MRI Dataset by Ayoob Mohamed, Nettasinghe Oshan, Sylvester Vithushan, Bowala Helmini, Mohideen Hamdaan

    Published 2025-01-01
    “…Accurate and interpretable segmentation of medical images is crucial for computer-aided diagnosis and image-guided interventions. …”
    Get full text
    Article
  2. 82
  3. 83

    An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity by Yousheng Zhou, Junfeng Zhou, Feng Wang, Feng Guo

    Published 2016-01-01
    “…In addition, the shared key of encryption can be easily computed by the user and trusted server using the Chebyshev map without additional burdensome key management. …”
    Get full text
    Article
  4. 84

    An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection by Umair Maqsood, Saif Ur Rehman, Tariq Ali, Khalid Mahmood, Tahani Alsaedi, Mahwish Kundi

    Published 2023-01-01
    “…The e-mails that pretend to be from a trusted company to provide “financial or personal information” are phishing e-mails. …”
    Get full text
    Article
  5. 85
  6. 86
  7. 87
  8. 88
  9. 89
  10. 90
  11. 91
  12. 92

    Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks by Mei Sun, Yuyan Guo, Dongbing Zhang, MingMing Jiang

    Published 2021-01-01
    “…Many existing schemes suffer from high computational cost by using bilinear pairing operation or need the assistance of the trust authorities (TAs) during the authentication process or rely on an ideal tamper-proof device (TPD), which requires very strong security assumption. …”
    Get full text
    Article
  13. 93

    An efficient modified HS conjugate gradient algorithm in machine learning by Gonglin Yuan, Minjie Huang

    Published 2024-11-01
    “…The Hestenes-Stiefe (HS) conjugate gradient method is very effective in resolving larger-scale sophisticated smoothing optimization tasks due to its low computational requirements and high computational efficiency. …”
    Get full text
    Article
  14. 94

    Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms by Lei Wang, Ying Yuan, Yan Ding

    Published 2023-01-01
    “…Besides, the BA scheme uses the idea of trust domains and trust credentials to establish a master-slave connection between IoT devices. …”
    Get full text
    Article
  15. 95

    SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain by Mahesh Kumar Morampudi, Munaga V. N. K. Prasad, Surya Narayana Raju Undi

    Published 2022-01-01
    “…However, most of the existing privacy‐preserving biometric authentication systems using HE assume that the server performs computations honestly. In a malicious server setting, the server may return an arbitrary result to save computational resources, resulting in a false accept/reject. …”
    Get full text
    Article
  16. 96
  17. 97
  18. 98

    ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework by Hyeon Choe, Dongsu Kang

    Published 2025-01-01
    “…In soldier-to-drone communication, trust-based authentication is performed using a trust-anchor approach with the public key of the Certificate Authority. …”
    Get full text
    Article
  19. 99
  20. 100