Results 51 to 60 of about 12,080 (256)

Fair Verifiable Secret Sharing Driven by Smart Contracts [PDF]

open access: yesJisuanji gongcheng
Unfair issues arise in secret sharing owing to the insufficient consideration given to participants′self-interested behaviors, such as honest participants being unable to reconstruct the shared secret while dishonest participants are able to.
ZHANG Qianhui, YUAN Lingyun, XIE Tianyu, WU Jiaying
doaj   +1 more source

Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment

open access: yesBMEMat, EarlyView.
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan   +8 more
wiley   +1 more source

Almost-perfect secret sharing [PDF]

open access: yes2011 IEEE International Symposium on Information Theory Proceedings, 2011
Splitting a secret s between several participants, we generate (for each value of s) shares for all participants. The goal: authorized groups of participants should be able to reconstruct the secret but forbidden ones get no information about it. In this paper we introduce several notions of non- perfect secret sharing, where some small information ...
openaire   +3 more sources

Classifying avian drinking behaviour: ecological insights and implications in a changing world

open access: yesBiological Reviews, EarlyView.
ABSTRACT Water is a fundamental currency of life, and its availability significantly influences animal behaviour, physiology and distributions. However, our knowledge around the dependence on water for drinking and the direct and indirect mechanisms driving related behaviours remains partial in the context of changing climates. Here, we review patterns
Shannon R. Conradie, Marc T. Freeman
wiley   +1 more source

Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction

open access: yesApplied Sciences, 2019
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc.
Tao Liu, Bin Yan, Jeng-Shyang Pan
doaj   +1 more source

How wildlife respond to tropical cyclones: short‐term tactics and long‐term impacts

open access: yesBiological Reviews, EarlyView.
ABSTRACT From butterflies to lizards and from sharks to seabirds, wildlife exhibit tactics to survive the impacts of tropical cyclones, also known as hurricanes, cyclones, or typhoons depending on where they occur. Some species seek refuge during the storm by moving, some remain in place and ride it out, and others move longer distances, avoiding the ...
Erin L. Koen   +15 more
wiley   +1 more source

Essential Multi-Secret Image Sharing for Sensor Images

open access: yesJournal of Imaging
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj   +1 more source

Comparing Security Notions of Secret Sharing Schemes

open access: yesEntropy, 2015
Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes.
Songsong Dai, Donghui Guo
doaj   +1 more source

Green Innovation and Firm Efficiency: The Role of Institutional Quality in Italian High‐Tech Manufacturing Sectors

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino   +2 more
wiley   +1 more source

Controlled quantum secret sharing [PDF]

open access: yesPhysica Scripta, 2006
We present a new protocol in which a secret multiqubit quantum state $\ket $ is shared by $n$ players and $m$ controllers, where $\ket $ is the encoding state of a quantum secret sharing scheme. The players may be considered as field agents responsible for carrying out a task, using the secret information encrypted in $\ket $, while the controllers ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy