Results 11 to 20 of about 1,240,487 (287)

Secret-Sharing for NP [PDF]

open access: yes, 2014
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel   +20 more
core   +4 more sources

THE IMPACT OF GENERAL AIR CRYOTHERAPY ON OXYGEN TRANSPORTING FUNCTION OF THE PATIENTS’ BLOOD WITH METABOLIC SYNDROME

open access: yesМедицинский вестник Юга России, 2015
Purpose: studying of the impact of the general air cryotherapy on oxygen transporting function of the patients’ blood with metabolic syndrome.Materials and Мethods: 70 patients are included, average age is 45,3Ѓ}3,7 years.
N. V. Hodarev   +4 more
doaj   +1 more source

Quantum Strongly Secure Ramp Secret Sharing [PDF]

open access: yes, 2014
Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed.
Matsumoto, Ryutaroh, Zhang, Paul
core   +2 more sources

THE INFLUENCE OF INFRARED SAUNS ON OXYGEN-TRANSPORT FUNCTIONS OF BLOOD FOR PERSONS OF DANGEROUS PROFESSIONS

open access: yesМедицинский вестник Юга России, 2013
Purpose: it was researched the influence of the general infrared sauna on the oxygen transport function of a blood of practical healthy persons.Materials and methods: analysis of figures of gasotransport blood functions of 77 volunteers before and after ...
N. V. Hodarev   +3 more
doaj   +1 more source

Communication Efficient Secret Sharing [PDF]

open access: yes, 2015
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into $n$ shares, such that any set of at least $t_1$ shares suffice to decode the secret, and any set ...
Bruck, Jehoshua   +3 more
core   +4 more sources

L’ENFANT EXPOSE AUX VIOLENCES CONJUGALES : ENFANT TEMOIN OU ENFANT VICTIME ? [PDF]

open access: yesCahiers Africains des Droits de l’Homme et de la Démocratie ainsi que du Développement Durable, 2022
La famille constitue la garantie première, avant toute convention et toute charte, des droits de l’enfant. Pour cette simple et bonne raison que cette unité sociale de base n’est régie ni par la discipline, ni par l’adhésion intellectuelle, ni par l ...
Annie BAPU KASONGO
doaj  

Experimental demonstration of four-party quantum secret sharing [PDF]

open access: yes, 2006
Secret sharing is a multiparty cryptographic task in which some secret information is splitted into several pieces which are distributed among the participants such that only an authorized set of participants can reconstruct the original secret.
C. Kurtsiefer   +7 more
core   +2 more sources

INTELLECTUAL ABILITIES AND MOTIVATION OF ACHIEVEMENT IN THE PROFESSIONAL STRUCTURE COMPETENCIES IN THE LIGHT OF FOREIGN RESEARCH

open access: yesОсвітній вимір, 2009
The Article is devoted to the study of the intellectual abilities and motivation of the achievement in the structure of the professional competence from the standpoint of foreign scientists.
I.V. Secret
doaj   +1 more source

EPISTEMOLOGICAL FUNDAMENTALS OF STUDYING KNOWLEDGE AS SUBJECTIVE FORMATION

open access: yesОсвітній вимір, 2008
The article concerns the epistemological study of knowledge as the subjective unity viewed by native and abroad investigations. The epistemology as a branch of as well as the manifestation of subjective form of knowledge and knowing are under discussion.
I.V. Secret
doaj   +1 more source

FOREIGN RESEARCH OF PSYCHOLOGICAL AND PEDAGOGICAL PRINCIPLES OF DISTANCE EDUCATION

open access: yesОсвітній вимір, 2008
The author studies psychological and pedagogical theories which have comprised the methodological basis of distance education abroad Short history of the distance learning is presented.
I.V. Secret
doaj   +1 more source

Home - About - Disclaimer - Privacy