Search Results - (( developing public trust algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- trust algorithm »
- public trust »
-
1
Rift: a high-performance consensus algorithm for Consortium Blockchain
Published 2019“…These technologies allow to have a distributed peer-to-peer network in which each external entity can be able to interact with other entities without any trusted intermediary in a verifiable manner. The existing consensus algorithms are mostly concerned with public blockchain having focused on public ledgers in general. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
-
5
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
A security payment model for financial payment using mykad
Published 2011“…However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Algorithmic fairness in AI-driven project management for post-conflict and developing regions: a critical review and framework for context-aware AI
Published 2026“…However, deploying AI uncritically in the data-poor and socially fragile environments of post-conflict and developing regions creates profound ethical risks. Standard technical solutions for algorithmic fairness, which require large, clean datasets, are fundamentally misaligned with these realities. …”
Get full text
Get full text
Get full text
Article -
8
A Comparative Study of Text Classifier for Mobile Crowdsensing Applications
Published 2024Proceedings Paper -
9
-
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
-
12
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
13
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…Moreover, it is a suitable technique for secure H.264 bitstreams that require transmission or storage in un-trusted intermediate devices.…”
Get full text
Get full text
Get full text
Article -
14
