A partial envelope approach for modelling multivariate spatial‐temporal data
Abstract In the new era of big data, modelling multivariate spatial‐temporal data is a challenging task due to both the high dimensionality of the features and complex associations among the responses across different locations and time points.
Reisa Widjaja +3 more
wiley +1 more source
Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang +3 more
doaj +1 more source
Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Ersoy, Oguzhan +4 more
core +1 more source
Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò +3 more
wiley +1 more source
Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8].
Anjaneyulu Endurthi +3 more
doaj
A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler +4 more
wiley +1 more source
This study investigates the effect of the reaction temperature (step 1) and reaction time (step 1 and 2) on the conversion efficiency and impurity profile of amphetamine synthesized via the Leuckart method. Conversion efficiency and impurity profile were assessed using gas chromatography–flame ionization detection (GC–FID) and GC–mass spectrometry (GC ...
Maartje C. M. Verhoeven +7 more
wiley +1 more source
An Efficient Quantum Secret Sharing Scheme Based on Restricted Threshold Access Structure. [PDF]
Li L, Li Z.
europepmc +1 more source
An efficient implementation of the Shamir secret sharing scheme [PDF]
Allyson Hineman, Mario Blaum
openalex +1 more source
Penerapan Secret Sharing Scheme Pada Joint Ownership Watermarking Untuk Citra Digital [PDF]
Digital watermarking merupakan metode untuk menyisipkan suatu informasi, yangbiasanya disebut sebagai watermark, pada suatu data digital penampung. Masalah yangdihadapi pada metode digital watermarking saat ini adalah semua metode yang telah adahanya ...
Kesiman, M. W. (Made) +1 more
core

