Results 41 to 50 of about 1,240,487 (287)

An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]

open access: yes, 2014
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core  

Random coding for sharing bosonic quantum secrets [PDF]

open access: yes, 2019
We consider a protocol for sharing quantum states using continuous variable systems. Specifically we introduce an encoding procedure where bosonic modes in arbitrary secret states are mixed with several ancillary squeezed modes through a passive ...
Arzani, Francesco   +3 more
core   +4 more sources

Unravelling the Secret of Sulfur Confinement and High Sulfur Utilization in Hybrid Sulfur‐Carbons

open access: yesAdvanced Materials, EarlyView.
Thermal condensation of inverse vulcanized sulfur‐carbon hybrids enables a bottom‐up sulfur confinement strategy, in which a protective carbon phase is progressively constructed around sulfur species. The resulting carbon nanodomains covalently tether sulfur chains and stabilize radical intermediates. This integrated architecture effectively suppresses
Tim Horner   +9 more
wiley   +1 more source

New Protocols and Lower Bound for Quantum Secret Sharing with Graph States

open access: yes, 2011
We introduce a new family of quantum secret sharing protocols with limited quantum resources which extends the protocols proposed by Markham and Sanders and by Broadbent, Chouha, and Tapp.
A. Ekert   +14 more
core   +3 more sources

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Images of the dead (body) and the missing corpse in the Book of Job

open access: yesHTS Teologiese Studies/Theological Studies, 2022
The Song of Songs is regarding Eros, whereas the Book of Job seems to be about Thanatos. Despite the dominance of the theme of death in this biblical book, no word for a corpse or even a dead body occurs. Absence is, however, hermeneutically so important
Pieter van der Zwan
doaj   +1 more source

Quantum Steganography

open access: yes, 2010
Steganography is the process of hiding secret information by embedding it in an "innocent" message. We present protocols for hiding quantum information in a codeword of a quantum error-correcting code passing through a channel.
Brun, Todd A., Shaw, Bilal A.
core   +1 more source

Asymmetry in Skipping Enhances Viability Against Control Input Noise

open access: yesAdvanced Robotics Research, EarlyView.
Quadruped animals use asymmetric galloping gaits at high speeds, yet the functional role of this asymmetry remains unclear. This study shows that left–right asymmetry in touchdown angles enhances robustness to control noise. Using a simple two‐legged locomotion model and viability theory, it demonstrates that asymmetric skipping substantially enlarges ...
Yuichi Ambe, Alvin So, Shinya Aoi
wiley   +1 more source

Quantum secret sharing without entanglement

open access: yes, 2002
After analysing the main quantum secret sharing protocol based on the entanglement states, we propose an idea to directly encode the qubit of quantum key distributions, and then present a quantum secret sharing scheme where only product states are ...
Bagherinezhad   +17 more
core   +1 more source

Secrets du secret

open access: yesActa Fabula, 2003
Cet article est un compte-rendu du livre : Sigila, n° 11, « Tonalités secrètes », Gris-France, printemps-été 2003.
openaire   +1 more source

Home - About - Disclaimer - Privacy