Results 81 to 90 of about 3,018,405 (324)

Essential Multi-Secret Image Sharing for Sensor Images

open access: yesJournal of Imaging
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj   +1 more source

An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]

open access: yes, 2014
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core  

Information Flow in Secret Sharing Protocols

open access: yes, 2009
The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret ...
Damian Markham   +5 more
core   +3 more sources

Revisiting paravertebral muscles in European rabbits (Oryctolagus cuniculus) and European brown hares (Lepus europaeus) (Leporidae; Lagomorpha)

open access: yesThe Anatomical Record, EarlyView.
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen   +3 more
wiley   +1 more source

Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction

open access: yesApplied Sciences, 2019
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc.
Tao Liu, Bin Yan, Jeng-Shyang Pan
doaj   +1 more source

Secret Sharing and Shared Information

open access: yes, 2017
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret.
Rauh, Johannes
core   +2 more sources

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Advancing Cave Survey Methods: High‐Precision Mapping in Drakotrypa Cave, Greece

open access: yesArchaeological Prospection, EarlyView.
ABSTRACT Cave floor mapping plays a vital role across various scientific disciplines by enabling the identification and interpretation of features shaped by both natural processes and human activity. In cave archaeology, floor mapping is crucial to decode and reconstruct human‐induced morphological features.
Christos Pennos   +5 more
wiley   +1 more source

A global progressive image secret sharing scheme under multi-group joint management

open access: yesMathematical Biosciences and Engineering
Diverging from traditional secret sharing schemes, group secret sharing schemes enable the recovery of secret information through collaborative efforts among groups.
Lina Zhang   +3 more
doaj   +1 more source

Comparing Security Notions of Secret Sharing Schemes

open access: yesEntropy, 2015
Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes.
Songsong Dai, Donghui Guo
doaj   +1 more source

Home - About - Disclaimer - Privacy