Investigating sources of inaccuracy in wearable optical heart rate sensors

B Bent, BA Goldstein, WA Kibbe, JP Dunn - NPJ digital medicine, 2020 - nature.com
As wearable technologies are being increasingly used for clinical research and healthcare,
it is critical to understand their accuracy and determine how measurement errors may affect …

[HTML][HTML] Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile

D Cooper, S Santesson, S Farrell, S Boeyen… - 2008 - rfc-editor.org
RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List
(CRL) Profile [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] PROPOSED …

Sigstore: Software signing for everybody

Z Newman, JS Meyers, S Torres-Arias - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Software supply chain compromises are on the rise. From the effects of XCodeGhost to
SolarWinds, hackers have identified that targeting weak points in the supply chain allows …

Accurate and decentralized timestamping using smart contracts on the Ethereum blockchain

G Estevam, LM Palma, LR Silva, JE Martina… - Information Processing & …, 2021 - Elsevier
Timestamps allow us to identify a date and time when a piece of data existed or an event
took place. For example, we use timestamps to establish the date when we grant a patent …

VeDB: A software and hardware enabled trusted relational database

X Yang, R Zhang, C Yue, Y Liu, BC Ooi, Q Gao… - Proceedings of the …, 2023 - dl.acm.org
Blockchain-like ledger databases emerge in recent years as a more efficient alternative to
permissioned blockchains. Conventional ledger databases mostly rely on authenticated …

Incentive mechanisms for time window dependent tasks in mobile crowdsensing

J Xu, J Xiang, D Yang - IEEE Transactions on Wireless …, 2015 - ieeexplore.ieee.org
Mobile crowdsensing can enable numerous attractive novel sensing applications due to the
prominent advantages such as wide spatiotemporal coverage, low cost, good scalability …

Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET

H Zhong, J Wen, J Cui, S Zhang - Tsinghua Science and …, 2016 - ieeexplore.ieee.org
Vehicle Ad hoc NETworks (VANET) can enhance traffic safety and improve traffic efficiency
through cooperative communication among vehicles, roadside infrastructure, and traffic …

AAAS: An anonymous authentication scheme based on group signature in VANETs

Y Jiang, S Ge, X Shen - IEEE Access, 2020 - ieeexplore.ieee.org
As special ad-hoc networks, vehicular ad-hoc networks (VANETs) support vehicles to
communicate with each other via opportunistic wireless links. In order to protect privacy of …

Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks

H Zhong, B Huang, J Cui, Y Xu, L Liu - Ieee Access, 2017 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have increased in popularity in recent years and play
an extremely important role in the intelligent transportation field. However, the demands of …

Location-based trust for mobile user-generated content: applications, challenges and implementations

V Lenders, E Koukoumidis, P Zhang… - Proceedings of the 9th …, 2008 - dl.acm.org
The recent explosion in shared media content and sensed data produced by mobile end-
users is challenging well-established principles and assumptions in data trust models. A …