Results 61 to 70 of about 11,914 (236)
Counterfactual Quantum Secret Sharing
The emerging quantum technology has highlighted the necessity for secure and efficient secret sharing in quantum networks. In this paper, we introduce a verifiable multiparty counterfactual quantum secret sharing (QSS) protocol, enhancing security and efficiency. This QSS protocol utilizes a low-depth quantum circuit to encrypt and decrypt information,
Nomi Lae +6 more
openaire +2 more sources
Classifying avian drinking behaviour: ecological insights and implications in a changing world
ABSTRACT Water is a fundamental currency of life, and its availability significantly influences animal behaviour, physiology and distributions. However, our knowledge around the dependence on water for drinking and the direct and indirect mechanisms driving related behaviours remains partial in the context of changing climates. Here, we review patterns
Shannon R. Conradie, Marc T. Freeman
wiley +1 more source
Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong +3 more
doaj +1 more source
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino +2 more
wiley +1 more source
Key distribution and recovery algorithm based on Shamir's secret sharing
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG +4 more
doaj +2 more sources
A novel meaningful secret image sharing method based on Arabic letters
In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators.
Derya Avci
doaj
ABSTRACT Global net‐zero ambitions require transformative strategies to decarbonise carbon‐intensive global value chains (GVCs). This study examines how multinational enterprises (MNEs) in sunset industries integrate carbon capture technologies (CCT) with operational and supply chain dynamics (OSCD) to advance decarbonisation.
Muhammad Mustafa Kamal +6 more
wiley +1 more source
Nonlinear Secret Image Sharing Scheme
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj +1 more source
Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia +2 more
wiley +1 more source
Secret Image Sharing Scheme Based on a Boolean Operation
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava +3 more
doaj +1 more source

