Computationally secure threshold secret sharing scheme with minimal redundancy
Mikhail Babenko +4 more
openalex +1 more source
The Bazaar as a Model for Knowledge Work
ABSTRACT This paper presents fieldwork that extends existing metaphors of knowledge work as a process shaped by hierarchical or market forces. A qualitative, ethnographic study of six knowledge‐intensive businesses in two countries identifies striking parallels with the Middle Eastern bazaar in contrast to Western impersonal markets and hierarchies. We
Reed Elliot Nelson +2 more
wiley +1 more source
Implementing Quantum Secret Sharing on Current Hardware. [PDF]
Graves J, Nelson M, Chitambar E.
europepmc +1 more source
Visual Secret Sharing Scheme Using Encrypting Multiple Images
Isha Padiya +2 more
openalex +1 more source
An Easy-to-implement Construction for $(k,n)$-threshold Progressive Visual Secret Sharing Schemes [PDF]
Hongbin Chen +2 more
openalex +1 more source
Tailoring Spatial Correlations With Quantum Interference
Imposing spatial structure on interfering photons fundamentally reshapes their correlations. By controlling the mutual distinguishability of two photons, we write and edit these correlations, encoding information that is invisible to conventional intensity measurements and revealed only through their joint behavior.
Carlo Schiano +5 more
wiley +1 more source
Reversible data hiding in encrypted images using LWE-based secret sharing. [PDF]
Saeidi Z, Mirzakuchaki S.
europepmc +1 more source
Don't You Know That You're Toxic? How Influencer‐Driven Misinformation Fuels Online Toxicity
ABSTRACT Research on misinformation has focused on message content and cognitive bias, overlooking how source type shapes toxic engagement. This study addresses that gap by showing that influencer‐driven misinformation does not merely increase toxicity: it reconfigures its nature and persistence through relational and social influence mechanisms ...
Giandomenico Di Domenico +2 more
wiley +1 more source
HCSS-GB and IBESS: Secret Image Sharing Schemes with Enhanced Shadow Management and Visual-Gradient Access Control. [PDF]
Pan H, Yan W, Wang R, Yu Y.
europepmc +1 more source
A JPEG Compressed Image Encryption Method Based on Shamir Secret Sharing Scheme [PDF]
Y. H. Guan +3 more
openalex +1 more source

