Results 201 to 210 of about 11,934 (254)
ABSTRACT Illegal gold mining has emerged as a major sustainability threat in the Amazon, eroding Indigenous rights, forest integrity, and climate mitigation efforts. This study examines how international market incentives relate to the expansion of illegal mining and associated deforestation within the Yanomami Indigenous Territory (YIT) from 2008 to ...
Shirléia Lago Santos +2 more
wiley +1 more source
The technological uniqueness paradox
Abstract Research summary We establish a new paradox surrounding technological uniqueness, defined as the degree to which a firm's patented technology portfolio differs from its competitors. On the one hand, technological uniqueness acts as a barrier to incoming technology spillovers and impedes firm performance.
Yang Fan +3 more
wiley +1 more source
Fast and Secure Multiparty Querying over Federated Graph Databases. [PDF]
Aljuaid N, Lisitsa A, Schewe S.
europepmc +1 more source
DA34FL: a robust dynamic accumulator-based authentication and key agreement with preserving model training data integrity for federated learning. [PDF]
Li S, Zhang Y, Bai J, Fan K.
europepmc +1 more source
HCSS-GB and IBESS: Secret Image Sharing Schemes with Enhanced Shadow Management and Visual-Gradient Access Control. [PDF]
Pan H, Yan W, Wang R, Yu Y.
europepmc +1 more source
Quantum teleportation of shared quantum secret in amplitude-damping channel. [PDF]
Aisan Y +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Designs, Codes and Cryptography, 1998
Traditional approaches to the secret sharing problem are focused to the problem of how to divide a secret into shares distributed among a set of users in such a way that only a qualified subset of users can reconstruct the secret while any unqualified group of users have no information about the secret.
He, Jingmin, Dawson, Ed
openaire +1 more source
Traditional approaches to the secret sharing problem are focused to the problem of how to divide a secret into shares distributed among a set of users in such a way that only a qualified subset of users can reconstruct the secret while any unqualified group of users have no information about the secret.
He, Jingmin, Dawson, Ed
openaire +1 more source
Secret Sharing System and Secret Sharing Matrix
2009 International Conference on Computational Intelligence and Security, 2009To make the secret sharing management more effective and safe, based on the (k, n) threshold secret sharing scheme, this article propose a new concept of generalized (k, n)-secret sharing matrix, and proposed a more safe (t, k, n) threshold secret sharing scheme by generalizing the (t, k, n) threshold secret sharing matrix.
Guangliang Liu +3 more
openaire +1 more source
Overcoming security limitations of Secret Share techniques: the Nested Secret Share
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021Secret Share (SS) is becoming a very hot topic within the scientific community. It allows us to split a secret into fragments and to share them among parties in such a way that a subset can recompose the original information. SS techniques assure a high redundancy degree, but the security level is fixed.
Galletta A. +4 more
openaire +1 more source

