Results 101 to 110 of about 3,018,405 (324)

Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images

open access: yesIEEE Access, 2019
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong   +3 more
doaj   +1 more source

Controlled Quantum Secret Sharing

open access: yes, 2006
We present a new protocol in which a secret multiqubit quantum state $\ket{\Psi}$ is shared by $n$ players and $m$ controllers, where $\ket{\Psi}$ is the encoding state of a quantum secret sharing scheme.
Bennett C H Brassard G   +10 more
core   +1 more source

Green Innovation and Firm Efficiency: The Role of Institutional Quality in Italian High‐Tech Manufacturing Sectors

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino   +2 more
wiley   +1 more source

Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs

open access: yesIEEE Access, 2019
Internet of Things (IoT) enables modern improvements in smart sensors, RFID, Internet technologies, and communication protocols. Sensor nodes are treated as smart devices and widely used to gather and forward sensed information.
K. Haseeb   +5 more
semanticscholar   +1 more source

Key distribution and recovery algorithm based on Shamir's secret sharing

open access: yesTongxin xuebao, 2015
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG   +4 more
doaj   +2 more sources

Nonlinear Secret Image Sharing Scheme

open access: yesThe Scientific World Journal, 2014
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj   +1 more source

Waiting for a Release: The Expectation in Virtual Gaming Communities

open access: yesJournal of Consumer Behaviour, EarlyView.
ABSTRACT This study examines how virtual gaming communities influence and maintain player expectations before, during, and after a game's release. A mixed‐methods study was conducted, comprising a netnography followed by an experiment. First, a netnographic study was conducted over 12 months, tracking communities to understand player behavior and ...
Lucas Lopes Ferreira de Souza   +4 more
wiley   +1 more source

Practical Secret Image Sharing Based on the Chinese Remainder Theorem [PDF]

open access: gold, 2022
Longlong Li   +4 more
openalex   +1 more source

Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges

open access: yesNew Directions for Community Colleges, EarlyView.
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia   +2 more
wiley   +1 more source

Secret Image Sharing Scheme Based on a Boolean Operation

open access: yesCybernetics and Information Technologies, 2014
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy