Results 71 to 80 of about 1,065 (175)

Efficient Quantum Information Hiding for Remote Medical Image Sharing

open access: yesIEEE Access, 2018
Information hiding aims to embed secret data into the multimedia, such as image, audio, video, and text. In this paper, two new quantum information hiding approaches are put forward.
Ahmed A. Abd El-Latif   +5 more
doaj   +1 more source

What is social science if not critical?

open access: yesThe British Journal of Sociology, EarlyView.
Abstract This short article represents a contribution to the debate on the motion “Social science is explanation, or it is nothing.” While in the format of parliamentary debating the contribution would fall on the side of the opposition, I will not be arguing against explanation as such.
Jana Bacevic
wiley   +1 more source

Localizing and excluding quantum information; or, how to share a quantum secret in spacetime [PDF]

open access: yesQuantum, 2019
When can quantum information be localized to each of a collection of spacetime regions, while also excluded from another collection of regions? We answer this question by defining and analyzing the localize-exclude task, in which a quantum system must be
Patrick Hayden, Alex May
doaj   +1 more source

Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley   +1 more source

Is quantum secret sharing different to the sharing of a quantum secret? [PDF]

open access: yesSPIE Proceedings, 2004
We present an experimental scheme to perform continuous variable (2,3) threshold quantum secret sharing on the quadratures amplitudes of bright light beams. It requires a pair of entangled light beams and an electro-optic feedforward loop for the reconstruction of the secret.
Andrew M. Lance   +5 more
openaire   +1 more source

Quantum Data Aggregation Using Secret Sharing and Genetic Algorithm

open access: yesIEEE Access, 2020
In the process of data aggregation, intruder nodes and compromised nodes may decrease the system performance. Hence, security plays an important role. Secret sharing is a method to find the compromised nodes.
Tai-Hoon Kim, Sanikommu Madhavi
doaj   +1 more source

Ecology in Hartmut Rosa's Theory of Resonance: A Four‐Level Reconstruction

open access: yesDialog, EarlyView.
ABSTRACT This article discusses Hartmut Rosa's sociological theory of resonance with special emphasis on religion and ecology. In Rosa, resonance experiences refer to (always) participatory and (normally) enlivening world relations. I argue that Rosa's resonance theory is multi‐pronged and covers at least three interconnected levels.
Niels Henrik Gregersen
wiley   +1 more source

May I pick your brain? Local minds as living cadastres in a Portuguese eleventh‐century lawsuit

open access: yesEarly Medieval Europe, EarlyView.
In the context of a dispute with the monastery of Lorvão, in the late eleventh century, the monks of Vacariça, near Coimbra (modern Portugal), carried out a field enquiry in the village of Recardães. This was part of a failed attempt to repossess a number of land plots that they claimed were theirs, but had lost control of.
Julio Escalona
wiley   +1 more source

Efficient Quantum Private Comparison Based on GHZ States

open access: yesEntropy
Quantum private comparison (QPC) is a fundamental cryptographic protocol that allows two parties to compare the equality of their private inputs without revealing any information about those inputs to each other.
Min Hou, Yue Wu, Shibin Zhang
doaj   +1 more source

Continuous Variable Quantum Secret Sharing with Fairness

open access: yesApplied Sciences, 2019
The dishonest participants have many advantages to gain others’ shares by cheating in quantum secret sharing (QSS) protocols. However, the traditional methods such as identity authentication and message authentication can not resolve this problem ...
Ye Kang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy