过去一年中添加的文章,按日期排序
SRAS: Self-governed Remote Attestation Scheme for Multi-party Collaboration
L Tian, Y Shen, Z Li - arXiv preprint arXiv:2407.03745, 2024 - arxiv.org
9 天前 - … SGX, a hardware-based trusted computing technology developed by Intel, serves
the critical purpose of safeguarding sensitive data and code from unauthorized access and …
the critical purpose of safeguarding sensitive data and code from unauthorized access and …
Exploring Social Media Use Among Young Adults for Health Information Acquisition
A Khursheed, S Rasul - Journalism, Politics and Society, 2024 - jpolas.com
13 天前 - … (Stanley, 2015) that is why this study aims to explore Cross-Platform use motivations,
Cross-Platform daily usage time, and Cross-Platform use intensity. The intensity scale for …
Cross-Platform daily usage time, and Cross-Platform use intensity. The intensity scale for …
(In) visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices
Y Choe, H Yu, T Kim, S Lee, H Lee, H Kim - … Conference on Computer …, 2024 - dl.acm.org
14 天前 - … notification bar when an application accesses the camera. … The first attack uses
screen overlay techniques with a … of the privacy indicator using trusted execution facilities. We …
screen overlay techniques with a … of the privacy indicator using trusted execution facilities. We …
Per-Pixel Forest Attribute Mapping and Error Estimation: The Google Earth Engine and R dataDriven Tool
S Francini, A Marcelli, G Chirici, RM Di Biase… - Sensors, 2024 - mdpi.com
24 天前 - … This paper introduces the dataDriven open access tool, a novel statistical design-based …
of the Google Earth Engine cloud computing platform, and the R programming …
of the Google Earth Engine cloud computing platform, and the R programming …
[HTML][HTML] 一种云环境中的虚拟机回滚安全模型
黄庆, 许阳光, 姜文超, 代炜琦 - Computer Science and Application, 2024 - hanspub.org
29 天前 - : 虚拟机(VM) 回滚可能会被滥用来对系统发动攻击, 导致无论是否使用可信计算技术(TPM),
云环境安全问题始终存在, 对云计算安全提出严峻挑战. 本文报告了在使用TPM 环境中和不…
云环境安全问题始终存在, 对云计算安全提出严峻挑战. 本文报告了在使用TPM 环境中和不…
Digital Flamenco with Video Pirates
G Doërr - Proceedings of the 2024 ACM Workshop on …, 2024 - dl.acm.org
29 天前 - … While early generations of such systems relied on playlist/manifest manipulation,
the rapid development of CDN edge compute capabilities led to more scalable designs where …
the rapid development of CDN edge compute capabilities led to more scalable designs where …
Revolutionizing E-Commerce With Consumer-Driven Energy-Efficient WSNs: A Multi-Characteristics Approach
33 天前 - … WSN application needs must be considered while designing the communication
technique, including deployment environment, network size, hardware, and data traffic designs…
technique, including deployment environment, network size, hardware, and data traffic designs…
An AI-Powered Computer Vision Module for Social Interactive Agents
FX Gaya Morey, C Manresa-Yee… - … on Human Computer …, 2024 - dl.acm.org
35 天前 - … are challenging to transfer across different platforms. In this study, we introduce a
general-purpose AI-powered computer vision module designed to address this challenge. Our …
general-purpose AI-powered computer vision module designed to address this challenge. Our …
TeTPCM: building endogenous trusted computing on trusted execution environment
J Li, C Huang, J Luo, J Kong, Y Ji, Y Liu… - … on Computer …, 2024 - spiedigitallibrary.org
37 天前 - … TPCM, which builds an endogenous trusted computing architecture by the … design
issues are discussed in TeTPCM: First, how to build a hardware-protected Trusted Computing …
issues are discussed in TeTPCM: First, how to build a hardware-protected Trusted Computing …
20 Trust in public sector AI The case of Finland's Aurora national program
39 天前 - … designed and implemented in practice in the complex world of public sector
organizations, which oftentimes lack citizens' trust… single case study research design. As the …
organizations, which oftentimes lack citizens' trust… single case study research design. As the …