Results 201 to 210 of about 11,934 (254)

Illegal Gold Mining in the Brazilian Amazon: Environmental Degradation in Yanomami Indigenous Lands, and Regulatory Failures

open access: yesSustainable Development, EarlyView.
ABSTRACT Illegal gold mining has emerged as a major sustainability threat in the Amazon, eroding Indigenous rights, forest integrity, and climate mitigation efforts. This study examines how international market incentives relate to the expansion of illegal mining and associated deforestation within the Yanomami Indigenous Territory (YIT) from 2008 to ...
Shirléia Lago Santos   +2 more
wiley   +1 more source

The technological uniqueness paradox

open access: yesStrategic Management Journal, EarlyView.
Abstract Research summary We establish a new paradox surrounding technological uniqueness, defined as the degree to which a firm's patented technology portfolio differs from its competitors. On the one hand, technological uniqueness acts as a barrier to incoming technology spillovers and impedes firm performance.
Yang Fan   +3 more
wiley   +1 more source

Hierarchical secure key assignment scheme. [PDF]

open access: yesPLoS One
Celiktas B   +3 more
europepmc   +1 more source

Shared Secret Reconstruction

Designs, Codes and Cryptography, 1998
Traditional approaches to the secret sharing problem are focused to the problem of how to divide a secret into shares distributed among a set of users in such a way that only a qualified subset of users can reconstruct the secret while any unqualified group of users have no information about the secret.
He, Jingmin, Dawson, Ed
openaire   +1 more source

Secret Sharing System and Secret Sharing Matrix

2009 International Conference on Computational Intelligence and Security, 2009
To make the secret sharing management more effective and safe, based on the (k, n) threshold secret sharing scheme, this article propose a new concept of generalized (k, n)-secret sharing matrix, and proposed a more safe (t, k, n) threshold secret sharing scheme by generalizing the (t, k, n) threshold secret sharing matrix.
Guangliang Liu   +3 more
openaire   +1 more source

Overcoming security limitations of Secret Share techniques: the Nested Secret Share

2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021
Secret Share (SS) is becoming a very hot topic within the scientific community. It allows us to split a secret into fragments and to share them among parties in such a way that a subset can recompose the original information. SS techniques assure a high redundancy degree, but the security level is fixed.
Galletta A.   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy