Results 71 to 80 of about 12,080 (256)
Nonlinear Secret Image Sharing Scheme
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj +1 more source
Secret Sharing and Shared Information [PDF]
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret. Thus, secret sharing schemes are systems of variables in which it is very clearly specified which subsets have
openaire +3 more sources
Fentanyl, hydromorphone, and oxycodone are metabolized by cytochrome P450 3A4 (CYP3A4). Co‐administration with CYP3A4‐inhibiting macrolides (clarithromycin or erythromycin) may increase opioid concentrations and overdose risk, but the clinical impact of these interactions is unknown.
Tony Antoniou +7 more
wiley +1 more source
Secret Image Sharing Scheme Based on a Boolean Operation
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava +3 more
doaj +1 more source
Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò +3 more
wiley +1 more source
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj +2 more sources
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient ...
Yuanju Gan +4 more
doaj +1 more source
A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler +4 more
wiley +1 more source
This study investigates the effect of the reaction temperature (step 1) and reaction time (step 1 and 2) on the conversion efficiency and impurity profile of amphetamine synthesized via the Leuckart method. Conversion efficiency and impurity profile were assessed using gas chromatography–flame ionization detection (GC–FID) and GC–mass spectrometry (GC ...
Maartje C. M. Verhoeven +7 more
wiley +1 more source
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza +3 more
wiley +1 more source

