Results 61 to 70 of about 13,572 (291)

Contributions to secret sharing and other distributed cryptosystems [PDF]

open access: yes, 2013
The present thesis deals with primitives related to the eld of distributed cryptography. First, we study signcryption schemes, which provide at the same time the functionalities of encryption and signature, where the unsigncryption operation is ...
Ruiz Rodriguez, Alexandre
core   +3 more sources

Volcano‐Inspired Dual‐Carbon Network Aerogel for High‐Performance Solar Evaporation With Edge‐Directed Salt Crystallization and Recovery

open access: yesAdvanced Science, EarlyView.
A volcano‐inspired dual‐carbon aerogel featuring hierarchical conduits and an outer carbon‐fiber shell directs rapid water transport, confines heat, and enables directional salt migration. Radial temperature gradients in the conical structure trigger Marangoni‐driven edge‐localized salt crystallization while maintaining an unobstructed photothermal ...
Shuyue Feng   +8 more
wiley   +1 more source

Optimal Improvement Ratios of Multi-Secret Sharing Schemes Can Be Achieved

open access: yesMATEC Web of Conferences, 2016
Secret sharing schemes (SSS) deal with activities relative to the secure distribution of a secret among a group of participants who then securely reconstruct the secret by collecting the shares which are held by individuals in qualified sets.
Juan Justie Su-Tzu   +2 more
doaj   +1 more source

Algorithms for multi-secret hierarchical sharing schemes of shamir type [PDF]

open access: yes, 2015
In this paper there are presented algorithms for multilevel hierarchical threshold secret sharing schemes based on the interpolation of Hermite type, which use either traditional Shamir's keys or polynomial and orthogonal polynomial keys.
Kapusta, Joanna, Smarzewski, Ryszard
core   +2 more sources

Controlling Photochromism of Donor‐Acceptor Stenhouse Adducts on Micro‐Dot Arrays Beyond Human‐Eyes Resolution for Dynamic Light Encryption

open access: yesAdvanced Science, EarlyView.
This study presents a micro‐dot array strategy for dynamic light encryption, utilizing DASA‐based photochromism with resolution beyond human‐eye capacity. By precisely controlling isomerization kinetics, the method reveals multi‐layered encrypted information under specific light irradiation, enhancing information security and anti‐counterfeiting ...
Hongtao Hu   +10 more
wiley   +1 more source

Алгоритм формирования матриц над примарным кольцом вычетов для построения протоколов множественного разделения секрета, реализующих заданную иерархию доступа [PDF]

open access: yes, 2007
Perfect linear multi-secret sharing schemes over primary residue ring construction algorithm is proposed. Early known secret sharing schemes over finite field construction method is generalized by proposed algorithm.
Волошин, Андрей
core  

Circularity, Sustainability, and the Quality of Coffee Sold via Vending Machines: What Do Italian Consumers Prefer?

open access: yesAgribusiness, EarlyView.
ABSTRACT Vending is an important sector in the daily lives of many people, and coffee is the most frequently consumed product in the European market. Like many other sectors, vending is responding to the challenge of sustainable development by taking various actions, such as offering increasingly ecologically sound coffee while maintaining/improving ...
Alberto Bertossi   +2 more
wiley   +1 more source

An Effective Private Data storage and Retrieval System using Secret sharing scheme based on Secure Multi-party Computation

open access: yes, 2015
Privacy of the outsourced data is one of the major challenge.Insecurity of the network environment and untrustworthiness of the service providers are obstacles of making the database as a service.Collection and storage of personally identifiable ...
Binu, V. P.   +2 more
core   +1 more source

Revisiting paravertebral muscles in European rabbits (Oryctolagus cuniculus) and European brown hares (Lepus europaeus) (Leporidae; Lagomorpha)

open access: yesThe Anatomical Record, EarlyView.
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen   +3 more
wiley   +1 more source

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Home - About - Disclaimer - Privacy