Reversible data hiding in encrypted images using LWE-based secret sharing. [PDF]
Saeidi Z, Mirzakuchaki S.
europepmc +1 more source
The Non‐Professional Virtues of the Hospice Volunteer
ABSTRACT Volunteers have long played a significant role in hospice care. Much of the care volunteers provide consists of weekly hour‐long in‐home visits. Home‐visiting hospice volunteers are not professionals, nor are they strangers or intimates. Hospice volunteers will not typically face moral dilemmas, nor be called upon to make dramatic decisions ...
Michael B. Gill
wiley +1 more source
A novel cryptographic framework and mathematical modeling for secure transmission of Parkinson's disease data using RSA and block-based secret sharing. [PDF]
Sambandham T +5 more
europepmc +1 more source
Redacted Disclosures and Bank Loan Contract Terms
ABSTRACT We investigate the impact of redacting disclosures on bank loan contracts. Our findings indicate that firms that redact information have loans with significantly higher spreads, shorter maturities, and more restrictive covenants and face a greater likelihood they will be required to post collateral compared to firms that do not redact ...
Karel Hrazdil, Jiyuan Li, Yuzeng Li
wiley +1 more source
An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on <i>W</i> State Sharing of Specific Bits. [PDF]
Xing K, Lu R, Liu S, Lan L.
europepmc +1 more source
Authenticable quantum secret sharing based on special entangled state. [PDF]
Bai CM, Shu YX, Zhang S.
europepmc +1 more source
Future advances in the fields of meteorology and climate science will require scientists to increasingly strive towards the provision of new high‐resolution services. In this context, the development of new products and services along the weather chain may greatly benefit from the adoption of second‐and‐third‐party data (23PD) as a source of high ...
Irene Garcia‐Marti +5 more
wiley +1 more source
Security analysis of qutrit quantum secret sharing with linear optical correlation measurement. [PDF]
Jo Y +6 more
europepmc +1 more source
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
Cryptanalysis of efficient controlled semi-quantum secret sharing protocol with entangled state. [PDF]
Li S, Cai XQ, Song SJ, Wei CY, Wang TY.
europepmc +1 more source

