Results 81 to 90 of about 2,659 (196)

Classical Homomorphic Encryption for Quantum Circuits [PDF]

open access: yes, 2018
We present the first leveled fully homomorphic encryption scheme for quantum circuits with classical keys. The scheme allows a classical client to blindly delegate a quantum computation to a quantum server: an honest server is able to run the computation
Mahadev, Urmila
core   +2 more sources

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Polynomial Representations of Weak Inverse Property Quasigroups and Their Role in Cryptographic Primitives

open access: yesJournal of Mathematics, Volume 2026, Issue 1, 2026.
A connection between cryptography and polynomial functions is extremely significant. Mathematical performance of polynomials helps to enhance the cryptographic primitives, which are trustworthy as well as straightforward representation tools, in everyday use. In this research, explicit topological sequences Qf which correspond to degree‐based, distance‐
Mohammad Mazyad Hazzazi   +5 more
wiley   +1 more source

SOFIR: Securely Outsourced Forensic Image Recognition [PDF]

open access: yes, 2014
Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash
Bösch, Christoph   +3 more
core   +3 more sources

Morphology and function of pinniped necks: The long and short of it

open access: yesThe Anatomical Record, Volume 308, Issue 12, Page 3175-3185, December 2025.
Abstract Terrestrial vertebrates from at least 30 distinct lineages in both extinct and extant clades have returned to aquatic environments. With these transitions came numerous morphological adaptations to accommodate life in water. Relatively little attention has been paid to the cervical region when tracking this transition.
Justin Keller   +3 more
wiley   +1 more source

Mode coupling by scattering in chiral nematic liquid crystal ring lasing [PDF]

open access: yes, 2019
Lasing in dye-doped chiral nematic liquid crystal can be realized with low pump energy and relatively high efficiency, thanks to the high reflectivity of the periodic structure.
Beeckman, Jeroen   +4 more
core   +2 more sources

Amazonia Wetland Methane Emission Decrease in 2023: Seasonal Forecasting of Global Wetlands Highlights Monitoring Targets in Critical Ecosystems

open access: yesJournal of Advances in Modeling Earth Systems, Volume 17, Issue 12, December 2025.
Abstract In 2023, atmospheric methane (CH4) saw a decrease in the annual growth rate following record increases from 2020 to 2022. Recent changes in CH4 remain difficult to quantify due to delays in near‐real‐time (NRT) carbon cycle estimates. However, NRT models and subseasonal‐to‐seasonal (S2S) forecasting can provide the opportunity to analyze ...
Colin A. Quinn   +7 more
wiley   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers [PDF]

open access: yes, 2015
Homomorphic encryption (HE) systems enable computations on encrypted data, without decrypting and without knowledge of the secret key. In this work, we describe an optimized Ring Learning With Errors (RLWE) based implementation of a variant of the HE ...
Gulak, Glenn   +2 more
core   +2 more sources

Unlocking Tropical Forest Complexity: How Tree Assemblages in Secondary Forests Boost Biodiversity Conservation

open access: yesEcology and Evolution, Volume 15, Issue 11, November 2025.
Secondary forests are crucial for achieving COP15/16 conservation goals. An operational national approach was developed to identify and characterise forest ecosystems based on the dominant tree species in the canopy, serving as indicators for ecosystem extent and condition.
Maïri Souza Oliveira   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy