Results 51 to 60 of about 211,819 (273)
A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management
With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy leakage. For example, more and more people choose to store
Zhen Wu, Yining Liu, Xingxing Jia
doaj +1 more source
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen +3 more
wiley +1 more source
DR-SISM: A dual reversible secret image sharing mechanism
Secret image sharing (SIS) technology has received wide attention from researchers due to its multi-party management of secret information. Traditional SIS algorithms usually convert secret information into the shares of noise-like images, which may ...
Ziye Yuan +5 more
doaj +1 more source
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley +1 more source
Optimal Improvement Ratios of Multi-Secret Sharing Schemes Can Be Achieved
Secret sharing schemes (SSS) deal with activities relative to the secure distribution of a secret among a group of participants who then securely reconstruct the secret by collecting the shares which are held by individuals in qualified sets.
Juan Justie Su-Tzu +2 more
doaj +1 more source
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants.
Bishoy K. Sharobim +5 more
doaj +1 more source
Quantum secret sharing between multiparty and multiparty with four states
An protocol of quantum secret sharing between multiparty and multiparty with four states is presented. We show that this protocol can make the Trojan horse attack with a multi-photon signal, the fake-signal attack with EPR pairs, the attack with single ...
FengLi Yan +4 more
core +1 more source
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley +1 more source
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and ...
Changlu Lin +3 more
doaj +1 more source
Undetermined states: how to find them and their applications
We investigate the undetermined sets consisting of two-level, multi-partite pure quantum states, whose reduced density matrices give absolutely no information of their original states. Two approached of finding these quantum states are proposed.
A.M. Steane +16 more
core +1 more source

