|
|
|
Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi and Stian Underbekken
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask fo...
ver más
|
|
|
|
|
|
|
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc...
ver más
|
|
|
|
|
|
|
Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao and Hua Tang
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of...
ver más
|
|
|
|
|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Keundug Park and Heung-Youl Youm
The volume of the asset investment and trading market can be expanded through the issuance and management of blockchain-based security tokens that logically divide the value of assets and guarantee ownership. This paper proposes a service model to solve ...
ver más
|
|
|
|
|
|
|
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w...
ver más
|
|
|
|
|
|
|
Meng Li, Jiqiang Liu and Yeping Yang
Data governance is an extremely important protection and management measure throughout the entire life cycle of data. However, there are still data governance issues, such as data security risks, data privacy breaches, and difficulties in data management...
ver más
|
|
|
|
|
|
|
Xin Liao and Khoi D. Hoang
Distributed Constraint Optimization Problems (DCOPs) are an efficient framework widely used in multi-agent collaborative modeling. The traditional DCOP framework assumes that variables are discrete and constraint utilities are represented in tabular form...
ver más
|
|
|
|
|
|
|
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How...
ver más
|
|
|
|
|
|
|
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se...
ver más
|
|
|
|