Results 51 to 60 of about 13,384 (274)

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

open access: yesIEEE Access, 2018
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and ...
Changlu Lin   +3 more
doaj   +1 more source

Randomness in Multi-Secret Sharing Schemes

open access: yes, 1999
JUCS - Journal of Universal Computer Science Volume Nr.
BLUNDO, Carlo, MASUCCI, Barbara
openaire   +2 more sources

Engineering Osteoimmune Responses with Functionalized Orthopedic Implants for Post‐Operative Osteosarcoma Treatment

open access: yesAdvanced Science, EarlyView.
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong   +6 more
wiley   +1 more source

Multi-secret Steganography in QR Codes

open access: yesWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS
This paper presents a steganographic scheme that conceals two independent secrets in a single QR code. The method uses two embedding algorithms which operate in separate domains. The first algorithm embeds the secret information into segments. The resulting code is then passed to the second method which modifies some modules to hide another secret ...
Katarzyna Koptyra, Marek R. Ogiela
openaire   +1 more source

Алгоритм формирования матриц над примарным кольцом вычетов для построения протоколов множественного разделения секрета, реализующих заданную иерархию доступа [PDF]

open access: yes, 2007
Perfect linear multi-secret sharing schemes over primary residue ring construction algorithm is proposed. Early known secret sharing schemes over finite field construction method is generalized by proposed algorithm.
Волошин, Андрей
core  

Efficient location privacy-aware forwarding in opportunistic mobile networks [PDF]

open access: yes, 2014
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over ...
Benslimane, Abderrahim   +2 more
core   +2 more sources

Quantitative Proteomics and CRISPR/Cas9 Editing Reveal UPR‐Mediated Control of Immunoglobulin Homeostasis in Hybridomas

open access: yesAdvanced Science, EarlyView.
BCR sequencing and subclone analysis correlated immunoglobulin (Ig) chain loss in dysfunctional hybridomas with disrupted monoclonal antibody homeostasis. Proteomics‐guided CRISPR/Cas9 editing revealed that the unfolded protein response (UPR) regulates aberrant Ig synthesis.
Rubing Zou   +9 more
wiley   +1 more source

A Randomized Kernel-Based Secret Image Sharing Scheme

open access: yes, 2018
This paper proposes a ($k,n$)-threshold secret image sharing scheme that offers flexibility in terms of meeting contrasting demands such as information security and storage efficiency with the help of a randomized kernel (binary matrix) operation.
Akella, Ravi Tej   +2 more
core   +1 more source

Contributions to secret sharing and other distributed cryptosystems [PDF]

open access: yes, 2013
The present thesis deals with primitives related to the eld of distributed cryptography. First, we study signcryption schemes, which provide at the same time the functionalities of encryption and signature, where the unsigncryption operation is ...
Ruiz Rodriguez, Alexandre
core   +3 more sources

Home - About - Disclaimer - Privacy