Resource Type

Journal Article 7

Year

2019 2

2018 1

2017 3

2008 1

Keywords

Authority trust level 1

Chameleon hash function 1

Digital signature 1

Doppler shift 1

Double-authentication-preventing signatures 1

Dynamic grouping 1

Homophily effect 1

Interaction behaviors 1

Mobile P2P networks 1

Provable security 1

Secure connectivity 1

Sparse learning 1

Super peer 1

Trust management 1

Trust model 1

Trust network 1

Unmanned aerial vehicle networks (UAVNs) 1

cloud generator 1

cloud model 1

culture 1

open ︾

Search scope:

排序: Display mode:

Changes in public trust in physicians: empirical evidence from China

Dahai Zhao, Zhiruo Zhang

Frontiers of Medicine 2019, Volume 13, Issue 4,   Pages 504-510 doi: 10.1007/s11684-018-0666-4

Abstract: Studies examining the trends in public trust in physicians have provided a considerable amount of valuableThis study investigated changes in public trust in physicians in China based on two cross-sectional nationalThe results indicated 83.4% of respondents in 2011 reported trust or strong trust in physicians in ChinaThe results of ordinal logistic regression demonstrated that public trust in physicians in China had, self-rated happiness, and self-identified social class were all associated positively with public trust

Keywords: trust in physicians     public trust     physician-patient relationship     health system performance    

Research of trust valuation based on cloud model

Lu Feng,Wu Huizhong

Strategic Study of CAE 2008, Volume 10, Issue 10,   Pages 84-90

Abstract:

At present, the existing descriptions of trust by trust valuation modelsthis problem, this paper discusses the co-existence and integration of fuzziness and randomness of trustcloud, a trust evaluation model based on cloud theory.This model provides the algorithms of trust information transfer and combination described by digitalCompared with traditional trust valuation models, trust values obtained in this model contains more semantic

Keywords: trust valuation     trust model     cloud model     cloud generator    

Building trust networks in the absence of trust relations Article

Xin WANG, Ying WANG, Jian-hua GUO

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10,   Pages 1591-1600 doi: 10.1631/FITEE.1601341

Abstract: User-specified trust relations are often very sparse and dynamic, making them difficult to accuratelyIn addition, trust relations are usually unavailable for most social media platforms.These issues pose a great challenge for predicting trust relations and further building trust networksIn this study, we investigate whether we can predict trust relations via a sparse learning model, andpropose to build a trust network without trust relations using only pervasively available interaction

Keywords: Trust network     Sparse learning     Homophily effect     Interaction behaviors    

DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks Article

Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 4,   Pages 559-569 doi: 10.1631/FITEE.1601535

Abstract: Trust management becomes an essential component of MP2P networks to promote peer transactions.Thus, it is difficult to establish long-term and effective trust relationships among peers.In this paper, we propose a dynamic grouping based trust model (DGTM) to classify peers.Within a group, mobile peers share resources and tend to keep stable trust relationships.(intragroup trust and intergroup trust).

Keywords: Mobile P2P networks     Trust management     Dynamic grouping     Super peer    

Delivering food safety

Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM

Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 1,   Pages 1-4 doi: 10.15302/J-FASE-2016123

Abstract: Systems and technology provide the necessary base, on which culture and then trust can be built to facilitate

Keywords: culture     food safety     systems     technology     trust    

Secure connectivity analysis in unmanned aerial vehicle networks None

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3,   Pages 409-422 doi: 10.1631/FITEE.1700032

Abstract: In this study, we propose a novel trust model for UAVNs that is based on the behavior and mobility patternThe proposed trust model consists of four parts: direct trust section, indirect trust section, integratedtrust section, and trust update section.Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when thereis both a physical link and a trust link between two UAVs.

Keywords: Unmanned aerial vehicle networks (UAVNs)     Trust model     Secure connectivity     Doppler shift    

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash None

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 176-186 doi: 10.1631/FITEE.1700005

Abstract:

Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICS 2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the same subject will result in an immediate collapse of the signature system. A few potential applications of DAPS have been discussed by its inventors, such as providing a kind of self-enforcement to discourage certificate authority (CA) from misbehaving in public key infrastructure and offering CA some cryptographic arguments to resist legal coercion. In this study, we focus on some fundamental issues on DAPS. We propose a new definition, which is slightly weakened but still reasonable and strong enough to capture the DAPS concept. We develop the new notion of invertible chameleon hash functions with key exposure. Then we propose a generic DAPS scheme, which is provably secure if the underlying invertible chameleon hash function with key exposure is secure. We instantiate this general construction to obtain the DAPS schemes respectively based on the well-known assumptions of integer factorization, Rivest-Shamir-Adleman (RSA), and computational Diffie-Hellman (CDH). They are more efficient than previous DAPS schemes. Furthermore, unlike previous constructions, the trusted setup condition is not needed by our DAPS schemes based on RSA and CDH.

Keywords: Double-authentication-preventing signatures     Chameleon hash function     Digital signature     Provable security     Authority trust    

Title Author Date Type Operation

Changes in public trust in physicians: empirical evidence from China

Dahai Zhao, Zhiruo Zhang

Journal Article

Research of trust valuation based on cloud model

Lu Feng,Wu Huizhong

Journal Article

Building trust networks in the absence of trust relations

Xin WANG, Ying WANG, Jian-hua GUO

Journal Article

DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks

Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU

Journal Article

Delivering food safety

Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM

Journal Article

Secure connectivity analysis in unmanned aerial vehicle networks

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Journal Article

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Journal Article