Results 41 to 50 of about 13,384 (274)

Recomposable Layered Metasurfaces for Wavelength‐Multiplexed Optical Encryption via Modular Diffractive Deep Neural Networks

open access: yesAdvanced Functional Materials, EarlyView.
Modular diffractive deep neural network metasurfaces encode and reconstruct holograms across layer combinations and wavelengths, enabling secure, multifunctional operation. Each layer acts independently yet composes jointly, yielding up to m(2N −1) channels for m wavelengths and N layers.
Cherry Park   +4 more
wiley   +1 more source

Triple Matrix Confinement‐Induced Ultrabright Afterglow From Carbon Dots With Multivariate Responsive Afterglow Colors for Advanced Dynamic Information Encryption

open access: yesAngewandte Chemie, EarlyView.
A novel carbon dots material (BUL‐CDs) with an initial afterglow brightness (406 cd m−2) far exceeding that of other afterglow luminescent materials was developed. Furthermore, the BUL‐CDs exhibited time‐dependent afterglow colors, excitation‐dependent afterglow colors, and thermochromic afterglow in response to triplet variables.
Yupeng Liu   +13 more
wiley   +2 more sources

The (n, n) Visual Multi-Secrets Sharing Scheme with Abilities of OR and XOR Decryption

open access: yesEngineering Proceedings
Naor and Shamir introduced the fundamental concept of visual cryptography (VC) in 1994. In that model, the secret image is split into two meaningless shares, allowing the secret to be revealed and recognized by the human eye just by superimposing the two
An-Hui Lo, Justie Su-Tzu Juan
doaj   +1 more source

An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]

open access: yes, 2014
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core  

Upcycling of Disposable Face Masks into Water‐Resistant and Flame Retardant Foams

open access: yesAdvanced Functional Materials, EarlyView.
Disposable mask waste is upcycled into lightweight polypropylene‐based foams with tunable porosity and composite architectures reinforced by ear‐loop fibers. The sustainable solvent‐based process enables upcycling rates of 91% and solvent recovery of >90%.
Jingjing Pan   +3 more
wiley   +1 more source

A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

open access: yesAxioms
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares ...
Irfan Alam   +3 more
doaj   +1 more source

An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing

open access: yesIET Information Security, 2021
Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting.
Hossein Pilaram   +2 more
doaj   +1 more source

Multi-Factor Authentication: A Survey [PDF]

open access: yes, 2018
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication.
Andreev, Sergey   +5 more
core   +2 more sources

Unravelling the Secret of Sulfur Confinement and High Sulfur Utilization in Hybrid Sulfur‐Carbons

open access: yesAdvanced Materials, EarlyView.
Thermal condensation of inverse vulcanized sulfur‐carbon hybrids enables a bottom‐up sulfur confinement strategy, in which a protective carbon phase is progressively constructed around sulfur species. The resulting carbon nanodomains covalently tether sulfur chains and stabilize radical intermediates. This integrated architecture effectively suppresses
Tim Horner   +9 more
wiley   +1 more source

Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage

open access: yesEntropy, 2022
On the basis of ensuring the quality and concealment of steganographic images, this paper proposes a double-matrix decomposition image steganography scheme with multi-region coverage, to solve the problem of poor extraction ability of steganographic ...
Ping Pan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy