Results 111 to 120 of about 11,914 (236)
Optical secret sharing with cascaded metasurface holography. [PDF]
Georgi P +6 more
europepmc +1 more source
ABSTRACT Can emotional responses help explain public support for local environmental morality policies? As cities increasingly contend with complex interspecies conflicts in densely populated urban settings, understanding the drivers of policy support becomes essential.
Itai Beeri
wiley +1 more source
PQSF: post-quantum secure privacy-preserving federated learning
In federated learning, secret sharing is a key technology to maintain the privacy of participants’ local models. Moreover, with the rapid development of quantum computers, existing federated learning privacy protection schemes based on secret sharing ...
Xia Zhang +4 more
doaj +1 more source
Standard (3, 5)-threshold quantum secret sharing by maximally entangled 6-qubit states. [PDF]
Long Y, Zhang C, Sun Z.
europepmc +1 more source
How Changing Narratives About the Future Shape Policymaking for the Long Term
ABSTRACT How can we explain decisions by governments to engage in policy investments—accepting short‐term costs in return for anticipated gains in the longer term—after previously sustaining the status quo? Our article examines the role of narratives in changing expectations about the future as a key driver of intertemporal policymaking. In light of an
Pieter Tuytens, Charlotte Haberstroh
wiley +1 more source
Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction. [PDF]
Prasetyo H +2 more
europepmc +1 more source
Pathological Eating Patterns in Adults Displaying Obsessive‐Compulsive Symptoms: A Scoping Review
ABSTRACT Aim Numerous studies have now shown that those with eating disorders have statistically higher rates of obsessive‐compulsive disorder (OCD). However, much less is known about the eating behaviours of adults with OCD. This scoping review aimed to identify and synthesise the existing literature describing pathological eating behaviours in adults
Sonay Kucukterzi‐Ali +4 more
wiley +1 more source
Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm. [PDF]
Kumar P +6 more
europepmc +1 more source
This work reveals the “C‐Y,” double “Y,” “π,” and “Y” fracture modes of thick, hard strata and their progressive breaking process (O‐F‐R/S mode), providing a theoretical basis for controlling strong ground pressure in deep mining. ABSTRACT In response to the dynamic hazards caused by the fracture of thick‐hard strata in deep mining, this study ...
Meilu Yu, Jianping Zuo
wiley +1 more source
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication. [PDF]
Abdel Hakeem SA, Kim H.
europepmc +1 more source

