Results 51 to 60 of about 11,914 (236)
Redescription of the Triassic cynodont Cistecynodon parvus and reassessment of its phylogeny
Abstract Cynodontia is an important subclade of Therapsida that first occurred in the late Permian. It includes extinct subclades which are the non‐mammaliaform cynodonts and Mammaliaformes, with the latter ultimately giving rise to crown mammals. The systematics of non‐mammaliaform cynodonts has been extensively studied and is relatively well‐resolved,
Erin S. Lund +4 more
wiley +1 more source
Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc.
Tao Liu, Bin Yan, Jeng-Shyang Pan
doaj +1 more source
Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using GHZ states. In the quantum case the presence of an eavesdropper will introduce errors so that his presence can be detected. We also show how GHZ
Hillery, Mark +2 more
openaire +2 more sources
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley +1 more source
Comparing Security Notions of Secret Sharing Schemes
Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes.
Songsong Dai, Donghui Guo
doaj +1 more source
Learning with Patient Campaigners About a German Drug Scandal
The West German drug Duogynon was internationally marketed as a “hormone pregnancy test” (HPT) between the 1950s and 1980s. In the late 1960s it came under suspicion for inducing miscarriage, spina bifida, and a spectrum of birth defects similar to those caused by the sedative thalidomide.
Jesse Olszynko‐Gryn +3 more
wiley +1 more source
Essential Multi-Secret Image Sharing for Sensor Images
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan +8 more
wiley +1 more source
Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang +3 more
doaj +1 more source

