Advances, Systems and Applications
From: An active and verifiable trust evaluation approach for edge computing
k | Results of XOR of k Data |
---|---|
1 | 001001, 010111, 011100, 101011, 111000 |
2 | 011110,010101,100010,110001,001011,111100,101111,110111,100100,010011 |
3 | 000010,110101,100110,100000,110011,001111,111110,101101,011010,000100 |
4 | 101001,111010,001101,000110,011000 |
5 | 010001 |