Search scope:
排序: Display mode:
Changes in public trust in physicians: empirical evidence from China
Dahai Zhao, Zhiruo Zhang
Frontiers of Medicine 2019, Volume 13, Issue 4, Pages 504-510 doi: 10.1007/s11684-018-0666-4
Keywords: trust in physicians public trust physician-patient relationship health system performance
Research of trust valuation based on cloud model
Lu Feng,Wu Huizhong
Strategic Study of CAE 2008, Volume 10, Issue 10, Pages 84-90
At present, the existing descriptions of trust by trust valuation modelsthis problem, this paper discusses the co-existence and integration of fuzziness and randomness of trustcloud, a trust evaluation model based on cloud theory.This model provides the algorithms of trust information transfer and combination described by digitalCompared with traditional trust valuation models, trust values obtained in this model contains more semantic
Keywords: trust valuation trust model cloud model cloud generator
Building trust networks in the absence of trust relations Article
Xin WANG, Ying WANG, Jian-hua GUO
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1591-1600 doi: 10.1631/FITEE.1601341
Keywords: Trust network Sparse learning Homophily effect Interaction behaviors
DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks Article
Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 4, Pages 559-569 doi: 10.1631/FITEE.1601535
Keywords: Mobile P2P networks Trust management Dynamic grouping Super peer
Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM
Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 1, Pages 1-4 doi: 10.15302/J-FASE-2016123
Keywords: culture food safety systems technology trust
Secure connectivity analysis in unmanned aerial vehicle networks None
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3, Pages 409-422 doi: 10.1631/FITEE.1700032
Keywords: Unmanned aerial vehicle networks (UAVNs) Trust model Secure connectivity Doppler shift
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 176-186 doi: 10.1631/FITEE.1700005
Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICS 2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the same subject will result in an immediate collapse of the signature system. A few potential applications of DAPS have been discussed by its inventors, such as providing a kind of self-enforcement to discourage certificate authority (CA) from misbehaving in public key infrastructure and offering CA some cryptographic arguments to resist legal coercion. In this study, we focus on some fundamental issues on DAPS. We propose a new definition, which is slightly weakened but still reasonable and strong enough to capture the DAPS concept. We develop the new notion of invertible chameleon hash functions with key exposure. Then we propose a generic DAPS scheme, which is provably secure if the underlying invertible chameleon hash function with key exposure is secure. We instantiate this general construction to obtain the DAPS schemes respectively based on the well-known assumptions of integer factorization, Rivest-Shamir-Adleman (RSA), and computational Diffie-Hellman (CDH). They are more efficient than previous DAPS schemes. Furthermore, unlike previous constructions, the trusted setup condition is not needed by our DAPS schemes based on RSA and CDH.
Keywords: Double-authentication-preventing signatures Chameleon hash function Digital signature Provable security Authority trust
Title Author Date Type Operation
Changes in public trust in physicians: empirical evidence from China
Dahai Zhao, Zhiruo Zhang
Journal Article
Building trust networks in the absence of trust relations
Xin WANG, Ying WANG, Jian-hua GUO
Journal Article
DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks
Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU
Journal Article
Delivering food safety
Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM
Journal Article
Secure connectivity analysis in unmanned aerial vehicle networks
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Journal Article
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Journal Article
Interpretation of Global Engineering Frontier and Engineering Management Frontier - Research on Man-Machine Trust
6 Jan 2022
Conference Videos