搜索结果: 1-15 共查到“Trust”相关记录142条 . 查询时间(0.078 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Trust and Contracts: Empirical Evidence
信托与合同 经验证据 决策论
2023/4/19
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
distributed homomorphic cryptosystems threshold cryptography secure multiparty computation
2019/8/26
In this work, we advance the conceptual and technical aspects of Secure Multiparty Computation (SMC). We approach SMC as a computational problem and propose a novel formulation of this problem in term...
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Compromised Platforms control systems
2019/7/31
Security and safety-critical remote applications such as e-voting, online banking, industrial control systems, medical devices, and home automation systems rely upon user interaction that is typically...
IoT systems are vulnerable to various cyber attacks as they form a subset of the In- ternet. Insider attacks find more significance since many devices are configured to access the Internet without int...
Minimizing Trust in Hardware Wallets with Two Factor Signatures
digital signatures threshold cryptography
2019/1/9
We introduce the notion of two-factor signatures (2FS), a generalization of a two-out-of-two threshold signature scheme in which one of the parties is a hardware token which can store a high-entropy s...
Authentication with weaker trust assumptions for voting systems
voting systems cryptographic protocols
2018/3/5
Some voting systems are reliant on external authentication services. Others use cryptography to implement their own. We combine digital signatures and non-interactive proofs to derive a generic constr...
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
trust management social secret sharing applied cryptography
2017/8/1
In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shar...
Trust models are widely used in various computer science disciplines. The main purpose of a trust model is to continuously measure trustworthiness of a set of entities based on their behaviors. In thi...
第三届国际物联网隐私,信任和安全研讨会(3rd International Workshop on IoT Privacy, Trust, and Security)
第三届 国际物联网隐私 信任和安全 研讨会
2017/3/31
The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend s...
2017物联网信任管理专题会议(Special Session on Trust Management in the Internet of Things)(TrustIoT)
物联网信任管理专题 会议
2017/3/30
Internet of Things (IoT) is an emerging computational paradigm based on the cooperation among physical objects connected by infrastructure networks, with the goal of providing users and objects themse...
PST2017, the fifteenth International Conference on Privacy, Security and Trust (PST), will be held in Calgary, Alberta, Canada. The conference will continue the tradition of bringing together researc...
第三届IEEE国际无线传感器网络信任与安全研讨会(The 3rd IEEE International Workshop on Trust and Security in Wireless Sensor Networks)
第三届 IEEE 国际无线传感器网络 全研讨会
2017/3/30
The third IEEE International Workshop on Trust and Security in Wireless Sensor Networks (TrustWSN 2017), in conjunction with "The 16th IEEE International Conference on Trust, Security and Privacy in C...
第16届IEEE计算和通信信任,安全和隐私国际会议(16th IEEE International Conference on Trust, Security And Privacy In Computing And Communications)(TrustCom2017)
第16届 IEEE计算和通信 信任 国际会议
2017/3/30
With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, ...
Centralized reputation systems use stars and reviews and thus require algorithm secrecy to avoid manipulation. In autonomous open source decentralized systems this luxury is not available. We create a...