Results 71 to 80 of about 1,065 (175)
Efficient Quantum Information Hiding for Remote Medical Image Sharing
Information hiding aims to embed secret data into the multimedia, such as image, audio, video, and text. In this paper, two new quantum information hiding approaches are put forward.
Ahmed A. Abd El-Latif +5 more
doaj +1 more source
What is social science if not critical?
Abstract This short article represents a contribution to the debate on the motion “Social science is explanation, or it is nothing.” While in the format of parliamentary debating the contribution would fall on the side of the opposition, I will not be arguing against explanation as such.
Jana Bacevic
wiley +1 more source
Localizing and excluding quantum information; or, how to share a quantum secret in spacetime [PDF]
When can quantum information be localized to each of a collection of spacetime regions, while also excluded from another collection of regions? We answer this question by defining and analyzing the localize-exclude task, in which a quantum system must be
Patrick Hayden, Alex May
doaj +1 more source
Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley +1 more source
Is quantum secret sharing different to the sharing of a quantum secret? [PDF]
We present an experimental scheme to perform continuous variable (2,3) threshold quantum secret sharing on the quadratures amplitudes of bright light beams. It requires a pair of entangled light beams and an electro-optic feedforward loop for the reconstruction of the secret.
Andrew M. Lance +5 more
openaire +1 more source
Quantum Data Aggregation Using Secret Sharing and Genetic Algorithm
In the process of data aggregation, intruder nodes and compromised nodes may decrease the system performance. Hence, security plays an important role. Secret sharing is a method to find the compromised nodes.
Tai-Hoon Kim, Sanikommu Madhavi
doaj +1 more source
Ecology in Hartmut Rosa's Theory of Resonance: A Four‐Level Reconstruction
ABSTRACT This article discusses Hartmut Rosa's sociological theory of resonance with special emphasis on religion and ecology. In Rosa, resonance experiences refer to (always) participatory and (normally) enlivening world relations. I argue that Rosa's resonance theory is multi‐pronged and covers at least three interconnected levels.
Niels Henrik Gregersen
wiley +1 more source
May I pick your brain? Local minds as living cadastres in a Portuguese eleventh‐century lawsuit
In the context of a dispute with the monastery of Lorvão, in the late eleventh century, the monks of Vacariça, near Coimbra (modern Portugal), carried out a field enquiry in the village of Recardães. This was part of a failed attempt to repossess a number of land plots that they claimed were theirs, but had lost control of.
Julio Escalona
wiley +1 more source
Efficient Quantum Private Comparison Based on GHZ States
Quantum private comparison (QPC) is a fundamental cryptographic protocol that allows two parties to compare the equality of their private inputs without revealing any information about those inputs to each other.
Min Hou, Yue Wu, Shibin Zhang
doaj +1 more source
Continuous Variable Quantum Secret Sharing with Fairness
The dishonest participants have many advantages to gain others’ shares by cheating in quantum secret sharing (QSS) protocols. However, the traditional methods such as identity authentication and message authentication can not resolve this problem ...
Ye Kang +4 more
doaj +1 more source

