Results 41 to 50 of about 12,080 (256)
Leakage-Resilient Secret Sharing With Constant Share Size
We consider the leakage resilience of AG code-based ramp secret sharing schemes extending the leakage resilience of linear threshold secret sharing schemes over prime fields done by Benhamouda et al. Since there is not any explicit efficient construction of AG codes over prime fields, we consider constructions over prime fields with the help of ...
Ivan Tjuawinata, Chaoping Xing
openaire +3 more sources
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen +3 more
wiley +1 more source
Secret image sharing (SIS) belongs to but differs from secret sharing. In general, conventional (k,n) threshold SIS has the shortcoming of "all-or-nothing". In this article, first we introduce ramp SIS definition. Then we propose a (k1,k2,n) ramp SIS based on the Chinese remainder theorem (CRT).
Xuehu Yan +4 more
openaire +4 more sources
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley +1 more source
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea +1 more
doaj +1 more source
Redescription of the Triassic cynodont Cistecynodon parvus and reassessment of its phylogeny
Abstract Cynodontia is an important subclade of Therapsida that first occurred in the late Permian. It includes extinct subclades which are the non‐mammaliaform cynodonts and Mammaliaformes, with the latter ultimately giving rise to crown mammals. The systematics of non‐mammaliaform cynodonts has been extensively studied and is relatively well‐resolved,
Erin S. Lund +4 more
wiley +1 more source
Some Multisecret-Sharing Schemes over Finite Fields
A secret sharing scheme is a method of assigning shares for a secret to some participants such that only some distinguished subsets of these subsets can recover the secret while other subsets cannot.
Selda Çalkavur, Patrick Solé
doaj +1 more source
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least , from the set of all shares even if up to t players provide incorrect ...
Jhanwar Mahabir P. +1 more
doaj +1 more source

