Results 41 to 50 of about 13,384 (274)
Modular diffractive deep neural network metasurfaces encode and reconstruct holograms across layer combinations and wavelengths, enabling secure, multifunctional operation. Each layer acts independently yet composes jointly, yielding up to m(2N −1) channels for m wavelengths and N layers.
Cherry Park +4 more
wiley +1 more source
A novel carbon dots material (BUL‐CDs) with an initial afterglow brightness (406 cd m−2) far exceeding that of other afterglow luminescent materials was developed. Furthermore, the BUL‐CDs exhibited time‐dependent afterglow colors, excitation‐dependent afterglow colors, and thermochromic afterglow in response to triplet variables.
Yupeng Liu +13 more
wiley +2 more sources
The (n, n) Visual Multi-Secrets Sharing Scheme with Abilities of OR and XOR Decryption
Naor and Shamir introduced the fundamental concept of visual cryptography (VC) in 1994. In that model, the secret image is split into two meaningless shares, allowing the secret to be revealed and recognized by the human eye just by superimposing the two
An-Hui Lo, Justie Su-Tzu Juan
doaj +1 more source
An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core
Upcycling of Disposable Face Masks into Water‐Resistant and Flame Retardant Foams
Disposable mask waste is upcycled into lightweight polypropylene‐based foams with tunable porosity and composite architectures reinforced by ear‐loop fibers. The sustainable solvent‐based process enables upcycling rates of 91% and solvent recovery of >90%.
Jingjing Pan +3 more
wiley +1 more source
A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares ...
Irfan Alam +3 more
doaj +1 more source
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting.
Hossein Pilaram +2 more
doaj +1 more source
Multi-Factor Authentication: A Survey [PDF]
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication.
Andreev, Sergey +5 more
core +2 more sources
Unravelling the Secret of Sulfur Confinement and High Sulfur Utilization in Hybrid Sulfur‐Carbons
Thermal condensation of inverse vulcanized sulfur‐carbon hybrids enables a bottom‐up sulfur confinement strategy, in which a protective carbon phase is progressively constructed around sulfur species. The resulting carbon nanodomains covalently tether sulfur chains and stabilize radical intermediates. This integrated architecture effectively suppresses
Tim Horner +9 more
wiley +1 more source
On the basis of ensuring the quality and concealment of steganographic images, this paper proposes a double-matrix decomposition image steganography scheme with multi-region coverage, to solve the problem of poor extraction ability of steganographic ...
Ping Pan +3 more
doaj +1 more source

