Results 91 to 100 of about 162,835 (326)

A partial envelope approach for modelling multivariate spatial‐temporal data

open access: yesCanadian Journal of Statistics, EarlyView.
Abstract In the new era of big data, modelling multivariate spatial‐temporal data is a challenging task due to both the high dimensionality of the features and complex associations among the responses across different locations and time points.
Reisa Widjaja   +3 more
wiley   +1 more source

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

open access: yesIEEE Access, 2020
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang   +3 more
doaj   +1 more source

Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]

open access: yes, 2016
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Ersoy, Oguzhan   +4 more
core   +1 more source

Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò   +3 more
wiley   +1 more source

Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT

open access: yesJournal of Communications Software and Systems, 2015
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8].
Anjaneyulu Endurthi   +3 more
doaj  

A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators

open access: yesInternational Journal of Circuit Theory and Applications, EarlyView.
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler   +4 more
wiley   +1 more source

Effect of Reaction Time and Temperature on the Impurity Profile of Amphetamine in the Leuckart Method

open access: yesDrug Testing and Analysis, EarlyView.
This study investigates the effect of the reaction temperature (step 1) and reaction time (step 1 and 2) on the conversion efficiency and impurity profile of amphetamine synthesized via the Leuckart method. Conversion efficiency and impurity profile were assessed using gas chromatography–flame ionization detection (GC–FID) and GC–mass spectrometry (GC ...
Maartje C. M. Verhoeven   +7 more
wiley   +1 more source

Penerapan Secret Sharing Scheme Pada Joint Ownership Watermarking Untuk Citra Digital [PDF]

open access: yes, 2004
Digital watermarking merupakan metode untuk menyisipkan suatu informasi, yangbiasanya disebut sebagai watermark, pada suatu data digital penampung. Masalah yangdihadapi pada metode digital watermarking saat ini adalah semua metode yang telah adahanya ...
Kesiman, M. W. (Made)   +1 more
core  

Home - About - Disclaimer - Privacy