Results 51 to 60 of about 13,384 (274)
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and ...
Changlu Lin +3 more
doaj +1 more source
Randomness in Multi-Secret Sharing Schemes
JUCS - Journal of Universal Computer Science Volume Nr.
BLUNDO, Carlo, MASUCCI, Barbara
openaire +2 more sources
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong +6 more
wiley +1 more source
Multi-secret Steganography in QR Codes
This paper presents a steganographic scheme that conceals two independent secrets in a single QR code. The method uses two embedding algorithms which operate in separate domains. The first algorithm embeds the secret information into segments. The resulting code is then passed to the second method which modifies some modules to hide another secret ...
Katarzyna Koptyra, Marek R. Ogiela
openaire +1 more source
Алгоритм формирования матриц над примарным кольцом вычетов для построения протоколов множественного разделения секрета, реализующих заданную иерархию доступа [PDF]
Perfect linear multi-secret sharing schemes over primary residue ring construction algorithm is proposed. Early known secret sharing schemes over finite field construction method is generalized by proposed algorithm.
Волошин, Андрей
core
Efficient location privacy-aware forwarding in opportunistic mobile networks [PDF]
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over ...
Benslimane, Abderrahim +2 more
core +2 more sources
BCR sequencing and subclone analysis correlated immunoglobulin (Ig) chain loss in dysfunctional hybridomas with disrupted monoclonal antibody homeostasis. Proteomics‐guided CRISPR/Cas9 editing revealed that the unfolded protein response (UPR) regulates aberrant Ig synthesis.
Rubing Zou +9 more
wiley +1 more source
A Randomized Kernel-Based Secret Image Sharing Scheme
This paper proposes a ($k,n$)-threshold secret image sharing scheme that offers flexibility in terms of meeting contrasting demands such as information security and storage efficiency with the help of a randomized kernel (binary matrix) operation.
Akella, Ravi Tej +2 more
core +1 more source
Contributions to secret sharing and other distributed cryptosystems [PDF]
The present thesis deals with primitives related to the eld of distributed cryptography. First, we study signcryption schemes, which provide at the same time the functionalities of encryption and signature, where the unsigncryption operation is ...
Ruiz Rodriguez, Alexandre
core +3 more sources

