Suggested Topics within your search.
Suggested Topics within your search.
- Trusts and trustees 9
- Equity 7
- Mass media 3
- Moral and ethical aspects 3
- Biochemistry 2
- Deception 2
- History 2
- History and criticism 2
- Information technology 2
- Internet in public administration 2
- Law 2
- Politics and government 2
- Public administration 2
- Semantics 2
- Trusts 2
- Truthfulness and falsehood 2
- Anesthetics 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Biography 1
- Christian life 1
- Classroom management 1
- Clinical psychology 1
- Context (Linguistics) 1
- Crimes against 1
- Desertions 1
- Disinformation 1
- Domestic relations 1
- Domestic relations courts 1
- Economic conditions 1
-
201
Trust in AI: progress, challenges, and future directions
Published 2024-11-01“…Abstract The increasing use of artificial intelligence (AI) systems in our daily lives through various applications, services, and products highlights the significance of trust and distrust in AI from a user perspective. …”
Get full text
Article -
202
-
203
Coastal Armoring Impacts on Beaches and Sea Turtles
Published 2023-03-01Subjects: Get full text
Article -
204
Non-interference trusted model based on processes
Published 2009-01-01Subjects: “…trusted…”
Get full text
Article -
205
The Effect of Trust in the Intention to Use m-banking
Published 2018-01-01Subjects: Get full text
Article -
206
Research on semantics of trust transitivity in cryptographic primitives
Published 2008-01-01Subjects: Get full text
Article -
207
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
208
Editorial: Trust, participation and pandemic politics in Africa
Published 2025-02-01Get full text
Article -
209
-
210
Trump and the Al Qaeda and ISIS Networks in Africa
Published 2018-09-01Subjects: Get full text
Article -
211
-
212
Analysis on the Noise for the Different Gearboxes of the Heavy Truck
Published 2015-01-01Get full text
Article -
213
More trust in networks, more secure keys
Published 2025-01-01“…Abstract A novel continuous-variable quantum passive optical network is proposed in which a user can increase their key rate by trusting other users. This is because the keys, which would be discarded to remove correlations with untrusted users, can be retained when the users are trusted. …”
Get full text
Article -
214
Provable secure trusted protocol for network storage
Published 2011-01-01Subjects: Get full text
Article -
215
ID-based signature without trusted PKG
Published 2008-01-01“…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
Get full text
Article -
216
Application progress of SGX in trusted computing area
Published 2021-12-01Subjects: “…trusted computing…”
Get full text
Article -
217
Comprehensive trust evaluation model in social networks
Published 2014-12-01“…A method was proposed to evaluate the user's attitude from the interaction experience and deduce the user's behavior pattern by employing the interactive time series.Further,a new trust evaluation model was constructed by con-sidering the following features:the user's attitude,the interaction experience and the behavior pattern.The experiment results show that the presented model can be adapted to dynamic and complex social networks,and can efficiently quan-tify the influence on the trust of three kinds of information,and enhance the availability and accuracy of direct trust evaluation model in social networks.…”
Get full text
Article -
218
Effects of Voluntary Product Recall on Consumer’s Trust
Published 2017-01-01Subjects: Get full text
Article -
219
Survey on trust evaluation mechanism in sensor-cloud
Published 2018-06-01Subjects: Get full text
Article -
220
A lightweight and trusted communication protocol for IoT
Published 2021-11-01“…With the era of the internet of things (IoT), the protocol stack conversion scheme based on the application-layer’s gateway has problems such as poor performance and end to end security that can’t be guaranteed.A lightweight and trusted IoT IP communication protocol was proposed, which was the main research direction of Protocol and Interface Group in Network 5.0 Industry and Technology Innovation Alliance, the deployment costs of protocol conversion gateways was decreased, the computing and storage overhead of IoT devices was reduced, and end to end communication security was ensured.…”
Get full text
Article