Results 41 to 50 of about 13,572 (291)
Inspired by natural silicified wood, a biomimetic mineralized chitin‐derived aerogel is constructed. It can withstand 81 000 times its own weight, and its backside temperature is 130.4°C after exposure to ∼1300°C butane flame for 600 s, exhibiting high‐strength, fire‐resistance, and super thermal‐insulation properties.
Kai Xu +11 more
wiley +1 more source
The (n, n) Visual Multi-Secrets Sharing Scheme with Abilities of OR and XOR Decryption
Naor and Shamir introduced the fundamental concept of visual cryptography (VC) in 1994. In that model, the secret image is split into two meaningless shares, allowing the secret to be revealed and recognized by the human eye just by superimposing the two
An-Hui Lo, Justie Su-Tzu Juan
doaj +1 more source
An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core +1 more source
Unravelling the Secret of Sulfur Confinement and High Sulfur Utilization in Hybrid Sulfur‐Carbons
Thermal condensation of inverse vulcanized sulfur‐carbon hybrids enables a bottom‐up sulfur confinement strategy, in which a protective carbon phase is progressively constructed around sulfur species. The resulting carbon nanodomains covalently tether sulfur chains and stabilize radical intermediates. This integrated architecture effectively suppresses
Tim Horner +9 more
wiley +1 more source
A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares ...
Irfan Alam +3 more
doaj +1 more source
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting.
Hossein Pilaram +2 more
doaj +1 more source
Improved Multi-secret Sharing Scheme Based on One-Way Function [PDF]
The weakness He-Dawson’s threshold multi-secret sharing scheme is presented and analyzed. By using the one-way function thought in the He-Dawson scheme, a new multi-use and multi-secret sharing scheme is proposed. The improved scheme is multi-time-use of
Li-Zheng, Guo +2 more
core +2 more sources
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
On the basis of ensuring the quality and concealment of steganographic images, this paper proposes a double-matrix decomposition image steganography scheme with multi-region coverage, to solve the problem of poor extraction ability of steganographic ...
Ping Pan +3 more
doaj +1 more source
Efficient location privacy-aware forwarding in opportunistic mobile networks [PDF]
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over ...
Benslimane, Abderrahim +2 more
core +2 more sources

