Results 71 to 80 of about 11,934 (254)
Nonlinear Secret Image Sharing Scheme
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj +1 more source
Secret Sharing and Shared Information [PDF]
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret. Thus, secret sharing schemes are systems of variables in which it is very clearly specified which subsets have
openaire +3 more sources
Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia +2 more
wiley +1 more source
Secret Image Sharing Scheme Based on a Boolean Operation
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava +3 more
doaj +1 more source
Abstract Hydrogen plays a crucial role across multiple industrial sectors and is increasingly recognized as a clean energy carrier with significant potential in decarbonization efforts. Methane pyrolysis (MP), particularly using molten metal catalysts, offers a promising pathway for hydrogen production with low CO2 emissions.
Adrian Paredes Bozzo, Zukui Li
wiley +1 more source
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient ...
Yuanju Gan +4 more
doaj +1 more source
Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò +3 more
wiley +1 more source
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj +2 more sources
A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler +4 more
wiley +1 more source
Tablets submitted to drug checking services that were found to contain bromazolam. Over half of these counterfeit tablets mimicked the appearance of licensed formulations (e.g., alprazolam Xanax bars and diazepam Roche 10 mg pills). Bromazolam is now the most commonly detected street benzodiazepine in drug poisoning deaths in the United Kingdom ...
Matthew Gardner +9 more
wiley +1 more source

