Results 71 to 80 of about 11,934 (254)

Nonlinear Secret Image Sharing Scheme

open access: yesThe Scientific World Journal, 2014
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj   +1 more source

Secret Sharing and Shared Information [PDF]

open access: yesEntropy, 2017
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret. Thus, secret sharing schemes are systems of variables in which it is very clearly specified which subsets have
openaire   +3 more sources

Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges

open access: yesNew Directions for Community Colleges, EarlyView.
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia   +2 more
wiley   +1 more source

Secret Image Sharing Scheme Based on a Boolean Operation

open access: yesCybernetics and Information Technologies, 2014
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava   +3 more
doaj   +1 more source

Sensitivity analysis and stochastic optimization of levelized cost of hydrogen production through methane pyrolysis

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract Hydrogen plays a crucial role across multiple industrial sectors and is increasingly recognized as a clean energy carrier with significant potential in decarbonization efforts. Methane pyrolysis (MP), particularly using molten metal catalysts, offers a promising pathway for hydrogen production with low CO2 emissions.
Adrian Paredes Bozzo, Zukui Li
wiley   +1 more source

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient ...
Yuanju Gan   +4 more
doaj   +1 more source

Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò   +3 more
wiley   +1 more source

Verifiable multi-secret sharing schemes applicable to arbitrary access structures

open access: yesTongxin xuebao, 2007
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj   +2 more sources

A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators

open access: yesInternational Journal of Circuit Theory and Applications, EarlyView.
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler   +4 more
wiley   +1 more source

Bromazolam Tablet Quantification and Analysis of Post‐Mortem Cases From the National Programme on Substance Use Mortality (NPSUM)

open access: yesDrug Testing and Analysis, EarlyView.
Tablets submitted to drug checking services that were found to contain bromazolam. Over half of these counterfeit tablets mimicked the appearance of licensed formulations (e.g., alprazolam Xanax bars and diazepam Roche 10 mg pills). Bromazolam is now the most commonly detected street benzodiazepine in drug poisoning deaths in the United Kingdom ...
Matthew Gardner   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy