Results 61 to 70 of about 162,835 (326)

Correction to: A lossless secret image sharing scheme using a larger finite field [PDF]

open access: bronze, 2022
Weitong Hu   +4 more
openalex   +1 more source

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Linear Subspace Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme [PDF]

open access: yesIranian Journal of Electrical and Electronic Engineering, 2023
Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes.
A. Rezapour, Z. Ahmadian
doaj  

Randomness Recoverable Secret Sharing Schemes

open access: yesJournal of Cryptology
The present article deals with the case study of particular models of sharing secrets as well as modal schemes treated from the informational-theoretical and computational perspectives. The main novelty brought by the authors refers to the demonstration of the conclusion that access structures can be treated with RR-SSS.
Hajiabadi, Mohammad   +2 more
openaire   +4 more sources

Framing National Education in Hong Kong: A frame analysis of power dynamics in stakeholders' competing narratives

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley   +1 more source

Anonymous secret sharing schemes

open access: yesDiscrete Applied Mathematics, 1997
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, C., Stinson, D.R.
openaire   +2 more sources

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images

open access: yesIEEE Access, 2019
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong   +3 more
doaj   +1 more source

Multipartite secret sharing schemes

open access: yes, 2023
This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods to share information in a secure way. The topics that are considered in the thesis are two of the main open problems in secret sharing: the characterization of the ideal access structures and the optimization of the length of the shares for general access ...
openaire   +4 more sources

Multi-Secret Sharing Schemes [PDF]

open access: yes, 1994
A multi-secret sharing scheme is a protocol to share m arbitrarily related secrets s1,..., sm among a set of participants P. In this paper we put forward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures.
Carlo Blundo   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy