Showing 201 - 220 results of 5,109 for search 'truTV~', query time: 4.10s Refine Results
  1. 201

    Trust in AI: progress, challenges, and future directions by Saleh Afroogh, Ali Akbari, Emmie Malone, Mohammadali Kargar, Hananeh Alambeigi

    Published 2024-11-01
    “…Abstract The increasing use of artificial intelligence (AI) systems in our daily lives through various applications, services, and products highlights the significance of trust and distrust in AI from a user perspective. …”
    Get full text
    Article
  2. 202
  3. 203
  4. 204
  5. 205
  6. 206
  7. 207
  8. 208
  9. 209
  10. 210
  11. 211
  12. 212
  13. 213

    More trust in networks, more secure keys by Guan-Jie Fan-Yuan, Shuang Wang

    Published 2025-01-01
    “…Abstract A novel continuous-variable quantum passive optical network is proposed in which a user can increase their key rate by trusting other users. This is because the keys, which would be discarded to remove correlations with untrusted users, can be retained when the users are trusted. …”
    Get full text
    Article
  14. 214
  15. 215

    ID-based signature without trusted PKG by ZHOU Liang1, LI Da-peng2, YANG Yi-xian1

    Published 2008-01-01
    “…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
    Get full text
    Article
  16. 216

    Application progress of SGX in trusted computing area by Bo ZHAO, Anqi YUAN, Yang AN

    Published 2021-12-01
    Subjects: “…trusted computing…”
    Get full text
    Article
  17. 217

    Comprehensive trust evaluation model in social networks by Xian-jia MENG, Jian-feng MA, Di LU, Yi-chuan WANG

    Published 2014-12-01
    “…A method was proposed to evaluate the user's attitude from the interaction experience and deduce the user's behavior pattern by employing the interactive time series.Further,a new trust evaluation model was constructed by con-sidering the following features:the user's attitude,the interaction experience and the behavior pattern.The experiment results show that the presented model can be adapted to dynamic and complex social networks,and can efficiently quan-tify the influence on the trust of three kinds of information,and enhance the availability and accuracy of direct trust evaluation model in social networks.…”
    Get full text
    Article
  18. 218
  19. 219
  20. 220

    A lightweight and trusted communication protocol for IoT by Junfeng MA, Zhiruo LIU, Guanwen LI, Fei YANG, Juanna DANG

    Published 2021-11-01
    “…With the era of the internet of things (IoT), the protocol stack conversion scheme based on the application-layer’s gateway has problems such as poor performance and end to end security that can’t be guaranteed.A lightweight and trusted IoT IP communication protocol was proposed, which was the main research direction of Protocol and Interface Group in Network 5.0 Industry and Technology Innovation Alliance, the deployment costs of protocol conversion gateways was decreased, the computing and storage overhead of IoT devices was reduced, and end to end communication security was ensured.…”
    Get full text
    Article