Search scope:
排序: Display mode:
Changes in public trust in physicians: empirical evidence from China
Dahai Zhao, Zhiruo Zhang
Frontiers of Medicine 2019, Volume 13, Issue 4, Pages 504-510 doi: 10.1007/s11684-018-0666-4
Keywords: trust in physicians public trust physician-patient relationship health system performance
Research of trust valuation based on cloud model
Lu Feng,Wu Huizhong
Strategic Study of CAE 2008, Volume 10, Issue 10, Pages 84-90
At present, the existing descriptions of trust by trust valuation modelsthis problem, this paper discusses the co-existence and integration of fuzziness and randomness of trustcloud, a trust evaluation model based on cloud theory.This model provides the algorithms of trust information transfer and combination described by digitalCompared with traditional trust valuation models, trust values obtained in this model contains more semantic
Keywords: trust valuation trust model cloud model cloud generator
Building trust networks in the absence of trust relations Article
Xin WANG, Ying WANG, Jian-hua GUO
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1591-1600 doi: 10.1631/FITEE.1601341
Keywords: Trust network Sparse learning Homophily effect Interaction behaviors
Clinical decision-making by the emergency department resident physicians for critically ill patients
Tengda Xu, Jun Xu, Xuezhong Yu, Sui Ma, Zhong Wang
Frontiers of Medicine 2012, Volume 6, Issue 1, Pages 89-93 doi: 10.1007/s11684-012-0183-9
Keywords: clinical decision-making emergency medicine critically ill patient resident methodology
Zongyu John CHEN,
Frontiers of Medicine 2010, Volume 4, Issue 4, Pages 473-476 doi: 10.1007/s11684-010-0290-4
Artificial Intelligence Could Revolutionize Science—If We Can Trust It
Mitch Leslie
Engineering 2024, Volume 35, Issue 4, Pages 4-6 doi: 10.1016/j.eng.2024.03.002
DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks Article
Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 4, Pages 559-569 doi: 10.1631/FITEE.1601535
Keywords: Mobile P2P networks Trust management Dynamic grouping Super peer
Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM
Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 1, Pages 1-4 doi: 10.15302/J-FASE-2016123
Keywords: culture food safety systems technology trust
Frontiers of Engineering Management 2022, Volume 9, Issue 4, Pages 563-576 doi: 10.1007/s42524-022-0198-0
Keywords: Internet hospitals physicians’ online counseling online reputation offline reputation
Frontiers of Medicine 2022, Volume 16, Issue 4, Pages 651-658 doi: 10.1007/s11684-021-0859-0
Keywords: coronary syndrome (ACS) throat discomfort (TD) throat pain cardiology departments non-cardiologic physicians
Dan Xiao, Nanshan Zhong, Chunxue Bai, Qingyu Xiu, Canmao Xie, Dayi Hu, Yun Mao, Roland Perfekt, Elisabeth Kruse, Qing Li, John Jiangnan Liu, Chen Wang
Frontiers of Medicine 2014, Volume 8, Issue 1, Pages 84-90 doi: 10.1007/s11684-014-0311-9
In China, around 23% of physicians (41% male, 3% female) currently smoke.
Keywords: nicotine replacement therapy smoking cessation Chinese physicians
Secure connectivity analysis in unmanned aerial vehicle networks None
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3, Pages 409-422 doi: 10.1631/FITEE.1700032
Keywords: Unmanned aerial vehicle networks (UAVNs) Trust model Secure connectivity Doppler shift
Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks Research Article
Wenbo ZHANG, Tao WANG, Chaoyang ZHANG, Jingyu FENG
Frontiers of Information Technology & Electronic Engineering 2024, Volume 25, Issue 4, Pages 540-554 doi: 10.1631/FITEE.2200505
Keywords: Blockchain Cross-chain Trust mechanism Multi-chain consensus
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 176-186 doi: 10.1631/FITEE.1700005
Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICS 2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the same subject will result in an immediate collapse of the signature system. A few potential applications of DAPS have been discussed by its inventors, such as providing a kind of self-enforcement to discourage certificate authority (CA) from misbehaving in public key infrastructure and offering CA some cryptographic arguments to resist legal coercion. In this study, we focus on some fundamental issues on DAPS. We propose a new definition, which is slightly weakened but still reasonable and strong enough to capture the DAPS concept. We develop the new notion of invertible chameleon hash functions with key exposure. Then we propose a generic DAPS scheme, which is provably secure if the underlying invertible chameleon hash function with key exposure is secure. We instantiate this general construction to obtain the DAPS schemes respectively based on the well-known assumptions of integer factorization, Rivest-Shamir-Adleman (RSA), and computational Diffie-Hellman (CDH). They are more efficient than previous DAPS schemes. Furthermore, unlike previous constructions, the trusted setup condition is not needed by our DAPS schemes based on RSA and CDH.
Keywords: Double-authentication-preventing signatures Chameleon hash function Digital signature Provable security Authority trust
Title Author Date Type Operation
Changes in public trust in physicians: empirical evidence from China
Dahai Zhao, Zhiruo Zhang
Journal Article
Building trust networks in the absence of trust relations
Xin WANG, Ying WANG, Jian-hua GUO
Journal Article
Clinical decision-making by the emergency department resident physicians for critically ill patients
Tengda Xu, Jun Xu, Xuezhong Yu, Sui Ma, Zhong Wang
Journal Article
Effectively cultivate the next generation of competent Chinese physicians: a perspective from a physician
Zongyu John CHEN,
Journal Article
DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks
Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU
Journal Article
Delivering food safety
Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM
Journal Article
Investigating the effect of online and offline reputation on the provision of online counseling services: A case study of the Internet hospitals in China
Journal Article
Atypical manifestations of acute coronary syndrome — throat discomfort: a multi-center observational study
Journal Article
gum or patch treatment for smoking cessation and smoking reduction: a multi-centre study in Chinese physicians
Dan Xiao, Nanshan Zhong, Chunxue Bai, Qingyu Xiu, Canmao Xie, Dayi Hu, Yun Mao, Roland Perfekt, Elisabeth Kruse, Qing Li, John Jiangnan Liu, Chen Wang
Journal Article
Secure connectivity analysis in unmanned aerial vehicle networks
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Journal Article
Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks
Wenbo ZHANG, Tao WANG, Chaoyang ZHANG, Jingyu FENG
Journal Article