Results 101 to 110 of about 3,018,405 (324)
Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong +3 more
doaj +1 more source
Controlled Quantum Secret Sharing
We present a new protocol in which a secret multiqubit quantum state $\ket{\Psi}$ is shared by $n$ players and $m$ controllers, where $\ket{\Psi}$ is the encoding state of a quantum secret sharing scheme.
Bennett C H Brassard G +10 more
core +1 more source
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino +2 more
wiley +1 more source
Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs
Internet of Things (IoT) enables modern improvements in smart sensors, RFID, Internet technologies, and communication protocols. Sensor nodes are treated as smart devices and widely used to gather and forward sensed information.
K. Haseeb +5 more
semanticscholar +1 more source
Key distribution and recovery algorithm based on Shamir's secret sharing
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG +4 more
doaj +2 more sources
Nonlinear Secret Image Sharing Scheme
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj +1 more source
Waiting for a Release: The Expectation in Virtual Gaming Communities
ABSTRACT This study examines how virtual gaming communities influence and maintain player expectations before, during, and after a game's release. A mixed‐methods study was conducted, comprising a netnography followed by an experiment. First, a netnographic study was conducted over 12 months, tracking communities to understand player behavior and ...
Lucas Lopes Ferreira de Souza +4 more
wiley +1 more source
Practical Secret Image Sharing Based on the Chinese Remainder Theorem [PDF]
Longlong Li +4 more
openalex +1 more source
Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia +2 more
wiley +1 more source
Secret Image Sharing Scheme Based on a Boolean Operation
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava +3 more
doaj +1 more source

