Results 221 to 230 of about 10,250 (292)
Corporate social responsibility and employee performance in China's manufacturing sector: Exploring the roles of altruistic values and organizational identification. [PDF]
Fu K, Ruanggoon J, Thavorn J.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem
Information Sciences, 2019A general (t, n) secret sharing (SS) scheme with fixed threshold allows a secret to be shared without considering the time dynamic nature of the security environment.
Xingxing Jia +4 more
semanticscholar +3 more sources
Frequency determination from truly sub-Nyquist samplers based on robust Chinese remainder theorem
Signal Processing, 2018In this paper, a truly sub-Nyquist sampling method for frequency estimation of sinusoidal signals in noise is presented. Basically speaking, sinusoidal signals are first sampled at multiple sampling rates lower than the Nyquist rate, and then a robust ...
Li Xiao, X. Xia
semanticscholar +3 more sources
IEEE Systems Journal, 2023
Mobile crowdsensing provides a large-scale reliable data, since sensing nodes support wide distribution, flexible mobility, and opportunistic connectivity. The generated data often contains the sensing node's sensitive information.
Boyao Zhu +3 more
semanticscholar +1 more source
Mobile crowdsensing provides a large-scale reliable data, since sensing nodes support wide distribution, flexible mobility, and opportunistic connectivity. The generated data often contains the sensing node's sensitive information.
Boyao Zhu +3 more
semanticscholar +1 more source
IEEE Systems Journal, 2023
In edge-fog computing networks, it is very crucial to ensure that group keys are secure and reliable. In recent years, there has been much interest in group key updating schemes based on Chinese remainder theorem (CRT).
Shu-Lin Wu, Aiqing Zhang, Huining Luo
semanticscholar +1 more source
In edge-fog computing networks, it is very crucial to ensure that group keys are secure and reliable. In recent years, there has been much interest in group key updating schemes based on Chinese remainder theorem (CRT).
Shu-Lin Wu, Aiqing Zhang, Huining Luo
semanticscholar +1 more source
SPIN, 2023
Secret-sharing techniques have become increasingly sophisticated over the years and now focus on generating random shares. These shares do not provide an attacker with any confidential information, however, the randomness of the shares can be suspicious.
A. Rawat, Maroti Deshmukh, Maheep Singh
semanticscholar +1 more source
Secret-sharing techniques have become increasingly sophisticated over the years and now focus on generating random shares. These shares do not provide an attacker with any confidential information, however, the randomness of the shares can be suspicious.
A. Rawat, Maroti Deshmukh, Maheep Singh
semanticscholar +1 more source
Cryptanalysis on Polynomial Congruence-Based Public Key with Chinese Remainder Theorem
2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), 2023Public key cryptography is an asymmetric cryptographic scheme that consists of two key pairs: a public key, which is publicly known, and a private key, which is kept secret.
Ikhwanul Hakim Masri, B. H. Susanti
semanticscholar +1 more source
International Conference on Mobile Ad-hoc and Sensor Networks, 2022
In wireless sensor networks (WSNs), to improve sensing accuracy and coverage, a large number of sensor nodes are usually deployed in the monitoring area.
Jinxin Zhang, Fuyou Miao
semanticscholar +1 more source
In wireless sensor networks (WSNs), to improve sensing accuracy and coverage, a large number of sensor nodes are usually deployed in the monitoring area.
Jinxin Zhang, Fuyou Miao
semanticscholar +1 more source
A reversible extended secret image sharing scheme based on Chinese remainder theorem
Signal processing. Image communication, 2021In a secret image sharing (SIS) scheme, a secret image is divided into n shadow images. Then, any t or more shadow images can recover the secret image.
Keju Meng +3 more
semanticscholar +1 more source
Chinese Remainder Theorem-based Essential Secret Image Sharing
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021It is well known that the shares generated by most secret image sharing (SIS) schemes are of equal importance. However, in some essential SIS (ESIS) schemes, the generated shares are divided into two groups of different importance. The shares in the more
Zuquan Liu, Jianquan Yang, Guopu Zhu
semanticscholar +1 more source

