Results 191 to 200 of about 112,314 (333)
Nonperfect secret sharing scheme
identifier:oai:t2r2.star.titech.ac.jp ...
openaire
A Secure and Efficient Authentication Scheme with Privacy Protection for Internet of Medical Things. [PDF]
Xu F, Wu J, An Q, Ziaur R.
europepmc +1 more source
Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme
Hinal M. Mudia, Pallavi Vijay Chavan
openalex +1 more source
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk +2 more
wiley +1 more source
An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on <i>W</i> State Sharing of Specific Bits. [PDF]
Xing K, Lu R, Liu S, Lan L.
europepmc +1 more source
Alpine flora of Kashmir Himalaya: floristic assessment, life history traits and threat status
Alpine ecosystems in the Himalaya are considered to be at a higher risk to anthropogenic global change drivers. The Kashmir Himalaya, located in the north‐western side of the Himalayan biodiversity hotspot, harbors a diverse alpine flora, which remains systematically little investigated.
Bilal A. Rasray +5 more
wiley +1 more source
ECACS: An Enhanced Certificateless Authentication Scheme for Smart Car Sharing. [PDF]
Shen Z, Kou X, Yang T.
europepmc +1 more source
The impact of COVID‐19 on public perceptions of wild meat in Central Africa
Abstract Wild meat is a significant source of food and income generation in Central Africa. However, there is little knowledge of how the assumed link between COVID‐19 and wild meat consumption has been discussed by the media and received by the public. In this study, we conducted media content analysis of 264 articles published in 2019–2020 related to
Yuhan Li +14 more
wiley +1 more source
Quantum teleportation of shared quantum secret in amplitude-damping channel. [PDF]
Aisan Y +4 more
europepmc +1 more source

