Results 241 to 250 of about 3,018,405 (324)
Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments. [PDF]
Lee DH, Lee IY.
europepmc +1 more source
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
Ronald Cramer, Serge Fehr
openalex +2 more sources
“There Are Places Full of Beauty”: Desettling High School Students' Scientific Writing
ABSTRACT This study contributes to desettling and expanding expectations about the forms of scientific language that belong in students' scientific writing. The primary empirical focus is the analysis of 52 high school student abstracts articulating community‐based investigations, submitted as part of their participation in a student conference in a ...
Alejandra Frausto Aceves
wiley +1 more source
ABSTRACT Chemical engineering faces an increasing imperative to integrate sustainability principles beyond traditional economic and environmental considerations. The social dimension—encompassing impacts on human well‐being, equity, community health, labor practices, and ethical governance—represents a critical yet often underdeveloped pillar within ...
José M. R. C. A. Santos
wiley +1 more source
Quantum secret sharing via local operations and classical communication. [PDF]
Yang YH +5 more
europepmc +1 more source
Micropolitics of Secrecy: Traders' Enactments of Expertise After the Failed Military Coup in Turkey
ABSTRACT Conducting ethnographic research in financial institutions is challenging because secrecy is pivotal for traders to maintain their expert image. It became more difficult in Turkey after the failed coup in 2016 as Turkish President Erdoğan increasingly weaponized conspiracies that are historically and politically rooted in Turkish society to ...
Deniz Coral‐Irwin
wiley +1 more source
ABSTRACT Since the early years of the 21st century, the city of Ruili has grown to be a major trade hub for Burmese jadeite on the China–Myanmar border. Starting from 2016 to 2017, Ruili's jadeite trade shifted heavily to online live streaming transactions through media platforms like Douyin, RedNote/Xiaohongshu, and Taobao/Tmall.
Yi Ma
wiley +1 more source
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing. [PDF]
Fujiwara M +5 more
europepmc +1 more source
ABSTRACT For decades, anthropologists have fought against the intrusion of neoliberal policies and norms into the university. We have lost. Today, neoliberal policies are ubiquitous within the university, forming the contours of our professional practice and informing our relationships with colleagues, administrators, and students.
Michael Scroggins
wiley +1 more source
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding. [PDF]
Lai H +6 more
europepmc +1 more source

