Results 51 to 60 of about 13,572 (291)

Engineering Osteoimmune Responses with Functionalized Orthopedic Implants for Post‐Operative Osteosarcoma Treatment

open access: yesAdvanced Science, EarlyView.
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong   +6 more
wiley   +1 more source

A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

open access: yesIEEE Access, 2018
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and ...
Changlu Lin   +3 more
doaj   +1 more source

Оптимальные протоколы множественного разделения секрета с многоадресным сообщением, основанные на линейных преобразованиях над кольцами вычетов [PDF]

open access: yes, 2009
Отримані достатні умови оптимальності (за критерієм максимуму інформаційних відношень) протоколів множинного розподілу секрету з багатоадресним повідомленням, що реалізують певні ієрархії доступу.
Алексейчук, Антон   +1 more
core  

Updating the parameters of a threshold scheme by minimal broadcast [PDF]

open access: yes, 2005
Threshold schemes allow secret data to be protected among a set of participants in such a way that only a prespecified threshold of participants can reconstruct the secret from private information (shares) distributed to them on a system setup using ...
Barwick, S., Jackson, W., Martin, K.
core   +1 more source

Randomness in Multi-Secret Sharing Schemes

open access: yes, 1999
JUCS - Journal of Universal Computer Science Volume Nr.
BLUNDO, Carlo, MASUCCI, Barbara
openaire   +2 more sources

Beyond Extracellular Vesicle (EV) Hype: Practical Solutions and Remaining Hurdles in EV Research, Manufacturing, and Clinical Translation

open access: yesAdvanced Science, EarlyView.
ABSTRACT Extracellular vesicles (EVs) are nanoscale mediators of intercellular communication with diverse molecular cargoes that reflect their cell of origin. Advances in isolation, detection, and single‐particle analytics have revealed increasing molecular and functional heterogeneity, while exposing limitations in how EV identity and activity are ...
David J. Lundy   +8 more
wiley   +1 more source

Multi-Factor Authentication: A Survey [PDF]

open access: yes, 2018
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication.
Andreev, Sergey   +5 more
core   +2 more sources

Multi-secret Steganography in QR Codes

open access: yesWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS
This paper presents a steganographic scheme that conceals two independent secrets in a single QR code. The method uses two embedding algorithms which operate in separate domains. The first algorithm embeds the secret information into segments. The resulting code is then passed to the second method which modifies some modules to hide another secret ...
Katarzyna Koptyra, Marek R. Ogiela
openaire   +1 more source

Study of Free‐Space Optical Quantum Network: Review and Prospectives

open access: yesAdvanced Science, EarlyView.
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley   +1 more source

A Randomized Kernel-Based Secret Image Sharing Scheme

open access: yes, 2018
This paper proposes a ($k,n$)-threshold secret image sharing scheme that offers flexibility in terms of meeting contrasting demands such as information security and storage efficiency with the help of a randomized kernel (binary matrix) operation.
Akella, Ravi Tej   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy