Evaluating link-based recommendations for Wikipedia

M Schwarzer, M Schubotz, N Meuschke… - Proceedings of the 16th …, 2016 - dl.acm.org
Literature recommender systems support users in filtering the vast and increasing number of
documents in digital libraries and on the Web. For academic literature, research has proven …

Unmanned Agricultural Tractors in Private Mobile Networks

M Heikkilä, J Suomalainen, O Saukko, T Kippola… - Network, 2021 - mdpi.com
The need for high-quality communications networks is urgent in data-based farming. A
particular challenge is how to achieve reliable, cost-efficient, secure, and broadband last …

Verifying a network configuration

LEPN Jacquin, A Shaw, CI Dalton - US Patent 10,425,282, 2019 - Google Patents
A computing device having instructions that when executed by a processor may: receive,
from a verifier, a request for attestation of a current network configuration of the computing …

Delegated device attestation for iot

J Julku, J Suomalainen… - 2021 8th International …, 2021 - ieeexplore.ieee.org
Cybersecurity and trustworthiness of IoT devices are becoming more and more vital. Device
attestation is one approach to increase trust through measured evidence of a device's …

[PDF][PDF] Analysis of open environment sign-in schemes-privacy enhanced & trustworthy approach

ZA Khattak, JA Manan, S Sulaiman - Journal of Advances in …, 2011 - researchgate.net
The third party based authentication possess users privacy concerns in an open
environment such as links and traces user identities across various services. The …

ZEKRO: Zero-Knowledge Proof of Integrity Conformance

HB Debes, T Giannetsos - … of the 17th International Conference on …, 2022 - dl.acm.org
In the race toward next-generation systems of systems, the adoption of edge and cloud
computing is escalating to deliver the underpinning end-to-end services. To safeguard the …

Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems

R Czerny, CP Kollmann, B Podgorelec… - … on Security and …, 2023 - graz.elsevierpure.com
The eIDAS regulation and its technical implementation successfully enabled cross-border
eID use cases within the European Union. Established in 2014 as part of an EU regulation …

Combining System Integrity Verification with Identity and Access Management

M Kylänpää, J Salonen - European Conference on Cyber Warfare …, 2022 - books.google.com
Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous
interconnected devices to factories increasing among others the challenge of managing …

Convincing Without Revealing: Strategies for Facilitating Remote Attestation under Weakened Trust Assumptions using Privacy-Enhancing Technologies

HB Debes - 2022 - orbit.dtu.dk
Remote attestation is the process in which one computing system, known as the prover,
supplies evidence about some claim to another computing system, known as the verifier …

[PDF][PDF] Secure data sharing using aggregate key for sensitive data

MR Sumalatha, MBR Begam, ED Priya… - Int Res J Eng Technol, 2015 - academia.edu
Security is essential for sharing sensitive data in the cloud. Using the aggregate key, makes
the system share the sensitive data without transferring keys for each and every file. This …