Results 51 to 60 of about 11,934 (254)

Fair Verifiable Secret Sharing Driven by Smart Contracts [PDF]

open access: yesJisuanji gongcheng
Unfair issues arise in secret sharing owing to the insufficient consideration given to participants′self-interested behaviors, such as honest participants being unable to reconstruct the shared secret while dishonest participants are able to.
ZHANG Qianhui, YUAN Lingyun, XIE Tianyu, WU Jiaying
doaj   +1 more source

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Almost-perfect secret sharing [PDF]

open access: yes2011 IEEE International Symposium on Information Theory Proceedings, 2011
Splitting a secret s between several participants, we generate (for each value of s) shares for all participants. The goal: authorized groups of participants should be able to reconstruct the secret but forbidden ones get no information about it. In this paper we introduce several notions of non- perfect secret sharing, where some small information ...
openaire   +3 more sources

Redescription of the Triassic cynodont Cistecynodon parvus and reassessment of its phylogeny

open access: yesThe Anatomical Record, EarlyView.
Abstract Cynodontia is an important subclade of Therapsida that first occurred in the late Permian. It includes extinct subclades which are the non‐mammaliaform cynodonts and Mammaliaformes, with the latter ultimately giving rise to crown mammals. The systematics of non‐mammaliaform cynodonts has been extensively studied and is relatively well‐resolved,
Erin S. Lund   +4 more
wiley   +1 more source

Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction

open access: yesApplied Sciences, 2019
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc.
Tao Liu, Bin Yan, Jeng-Shyang Pan
doaj   +1 more source

Framing National Education in Hong Kong: A frame analysis of power dynamics in stakeholders' competing narratives

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley   +1 more source

Comparing Security Notions of Secret Sharing Schemes

open access: yesEntropy, 2015
Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes.
Songsong Dai, Donghui Guo
doaj   +1 more source

Learning with Patient Campaigners About a German Drug Scandal

open access: yesBerichte zur Wissenschaftsgeschichte, EarlyView.
The West German drug Duogynon was internationally marketed as a “hormone pregnancy test” (HPT) between the 1950s and 1980s. In the late 1960s it came under suspicion for inducing miscarriage, spina bifida, and a spectrum of birth defects similar to those caused by the sedative thalidomide.
Jesse Olszynko‐Gryn   +3 more
wiley   +1 more source

Essential Multi-Secret Image Sharing for Sensor Images

open access: yesJournal of Imaging
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj   +1 more source

Controlled quantum secret sharing [PDF]

open access: yesPhysica Scripta, 2006
We present a new protocol in which a secret multiqubit quantum state $\ket $ is shared by $n$ players and $m$ controllers, where $\ket $ is the encoding state of a quantum secret sharing scheme. The players may be considered as field agents responsible for carrying out a task, using the secret information encrypted in $\ket $, while the controllers ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy