Results 51 to 60 of about 13,572 (291)
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong +6 more
wiley +1 more source
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and ...
Changlu Lin +3 more
doaj +1 more source
Оптимальные протоколы множественного разделения секрета с многоадресным сообщением, основанные на линейных преобразованиях над кольцами вычетов [PDF]
Отримані достатні умови оптимальності (за критерієм максимуму інформаційних відношень) протоколів множинного розподілу секрету з багатоадресним повідомленням, що реалізують певні ієрархії доступу.
Алексейчук, Антон +1 more
core
Updating the parameters of a threshold scheme by minimal broadcast [PDF]
Threshold schemes allow secret data to be protected among a set of participants in such a way that only a prespecified threshold of participants can reconstruct the secret from private information (shares) distributed to them on a system setup using ...
Barwick, S., Jackson, W., Martin, K.
core +1 more source
Randomness in Multi-Secret Sharing Schemes
JUCS - Journal of Universal Computer Science Volume Nr.
BLUNDO, Carlo, MASUCCI, Barbara
openaire +2 more sources
ABSTRACT Extracellular vesicles (EVs) are nanoscale mediators of intercellular communication with diverse molecular cargoes that reflect their cell of origin. Advances in isolation, detection, and single‐particle analytics have revealed increasing molecular and functional heterogeneity, while exposing limitations in how EV identity and activity are ...
David J. Lundy +8 more
wiley +1 more source
Multi-Factor Authentication: A Survey [PDF]
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication.
Andreev, Sergey +5 more
core +2 more sources
Multi-secret Steganography in QR Codes
This paper presents a steganographic scheme that conceals two independent secrets in a single QR code. The method uses two embedding algorithms which operate in separate domains. The first algorithm embeds the secret information into segments. The resulting code is then passed to the second method which modifies some modules to hide another secret ...
Katarzyna Koptyra, Marek R. Ogiela
openaire +1 more source
Study of Free‐Space Optical Quantum Network: Review and Prospectives
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley +1 more source
A Randomized Kernel-Based Secret Image Sharing Scheme
This paper proposes a ($k,n$)-threshold secret image sharing scheme that offers flexibility in terms of meeting contrasting demands such as information security and storage efficiency with the help of a randomized kernel (binary matrix) operation.
Akella, Ravi Tej +2 more
core +1 more source

