Results 71 to 80 of about 162,835 (326)

On the size of shares for secret sharing schemes [PDF]

open access: yesJournal of Cryptology, 1992
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
R. M. Capocelli   +3 more
openaire   +4 more sources

Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment

open access: yesBMEMat, EarlyView.
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan   +8 more
wiley   +1 more source

Reducing the quantum communication cost of quantum secret sharing

open access: yes, 2012
We demonstrate a new construction for perfect quantum secret sharing (QSS) schemes based on imperfect "ramp" secret sharing combined with classical encryption, in which the individual parties' shares are split into quantum and classical components ...
Fortescue, Ben, Gour, Gilad
core   +1 more source

Classifying avian drinking behaviour: ecological insights and implications in a changing world

open access: yesBiological Reviews, EarlyView.
ABSTRACT Water is a fundamental currency of life, and its availability significantly influences animal behaviour, physiology and distributions. However, our knowledge around the dependence on water for drinking and the direct and indirect mechanisms driving related behaviours remains partial in the context of changing climates. Here, we review patterns
Shannon R. Conradie, Marc T. Freeman
wiley   +1 more source

Secret-Sharing Schemes for Very Dense Graphs [PDF]

open access: yesJournal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Beimel, Amos   +2 more
openaire   +2 more sources

How wildlife respond to tropical cyclones: short‐term tactics and long‐term impacts

open access: yesBiological Reviews, EarlyView.
ABSTRACT From butterflies to lizards and from sharks to seabirds, wildlife exhibit tactics to survive the impacts of tropical cyclones, also known as hurricanes, cyclones, or typhoons depending on where they occur. Some species seek refuge during the storm by moving, some remain in place and ride it out, and others move longer distances, avoiding the ...
Erin L. Koen   +15 more
wiley   +1 more source

A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management

open access: yesMathematics, 2020
With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy leakage. For example, more and more people choose to store
Zhen Wu, Yining Liu, Xingxing Jia
doaj   +1 more source

Green Innovation and Firm Efficiency: The Role of Institutional Quality in Italian High‐Tech Manufacturing Sectors

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino   +2 more
wiley   +1 more source

S-box Implementation Scheme of SM4 Algorithm Based on Secret Sharing [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the current situation that the existing SM4 algorithm mask scheme cannot completely resist the Differential Power Analysis(DPA) attack,a scheme based on secret sharing resistance DPA attack is proposed.This method constructs a new S-box by ...
LI Xinchao,ZHONG Weidong,LIU Mingming,LI Dong
doaj   +1 more source

A Recursive Threshold Visual Cryptography Scheme [PDF]

open access: yes, 2008
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core   +1 more source

Home - About - Disclaimer - Privacy