Results 201 to 210 of about 12,080 (256)
Rampage school shootings, where students go to their own school to randomly kill classmates, teachers, friends, and strangers, are among the most drastic types of human behavior. While research increasingly points to interaction dynamics as being key for the emergence of crime and violence, scholars have not yet systematically studied interaction ...
Anne Nassauer
wiley +1 more source
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley +1 more source
Embedded Interactions and Selective Disclosure: Network Effects on Conversations aboard Skylab
How do absent others influence our interactions? We argue in this paper that interactions are embedded within networks formed by chains of specific relationships between known third parties. The anticipation of future interactions with external others conditions our interpretation of the current situation and affects our behavior in the interaction. We
Michael Schultz +2 more
wiley +1 more source
Research on key technologies for privacy-preserving, regulatorily compliant, and cross-chain interoperability in heterogeneous blockchain systems. [PDF]
Chen Z, Liu H, Zhang L, Dai B, Shi Y.
europepmc +1 more source
Fast and Secure Multiparty Querying over Federated Graph Databases. [PDF]
Aljuaid N, Lisitsa A, Schewe S.
europepmc +1 more source
DA34FL: a robust dynamic accumulator-based authentication and key agreement with preserving model training data integrity for federated learning. [PDF]
Li S, Zhang Y, Bai J, Fan K.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Designs, Codes and Cryptography, 1998
Traditional approaches to the secret sharing problem are focused to the problem of how to divide a secret into shares distributed among a set of users in such a way that only a qualified subset of users can reconstruct the secret while any unqualified group of users have no information about the secret.
He, Jingmin, Dawson, Ed
openaire +1 more source
Traditional approaches to the secret sharing problem are focused to the problem of how to divide a secret into shares distributed among a set of users in such a way that only a qualified subset of users can reconstruct the secret while any unqualified group of users have no information about the secret.
He, Jingmin, Dawson, Ed
openaire +1 more source
Secret Sharing System and Secret Sharing Matrix
2009 International Conference on Computational Intelligence and Security, 2009To make the secret sharing management more effective and safe, based on the (k, n) threshold secret sharing scheme, this article propose a new concept of generalized (k, n)-secret sharing matrix, and proposed a more safe (t, k, n) threshold secret sharing scheme by generalizing the (t, k, n) threshold secret sharing matrix.
Guangliang Liu +3 more
openaire +1 more source

