Results 211 to 220 of about 112,587 (333)
A JPEG Compressed Image Encryption Method Based on Shamir Secret Sharing Scheme [PDF]
Yulong Guan +3 more
openalex +1 more source
Capsicum chinense as an African traditional vegetable: Culture, resilience, and opportunity
Capsicum chinense is central to everyday diets, cultural identity, and smallholder livelihoods across Sub‐Saharan Africa, yet remains overlooked in agricultural research and policy. This paper reframes C. chinense as a traditional, climate‐resilient vegetable shaped by centuries of farmer stewardship and cultural selection.
Derek W. Barchenger +1 more
wiley +1 more source
A multi-authority attribute ring signature supporting dynamic policies and dual anonymity for zero-trust networks. [PDF]
Chen J, Zhou X, Fu W, Mao Y, Wang J.
europepmc +1 more source
ABSTRACT This work presents a non‐geometrical navigation approach based on a purely topological understanding of underground environments. By conceptualizing subterranean scenarios as a set of tunnels that intersect with each other, and taking a navigation approach based on topological instructions, we simplify the navigation problem to the sequential ...
Lorenzo Cano +2 more
wiley +1 more source
A Security-Enhanced Certificateless Aggregate Authentication Protocol with Revocation for Wireless Medical Sensor Networks. [PDF]
Fan Q, Wang Y, Li X.
europepmc +1 more source
Nonperfect Secret Sharing Schemes
identifier:oai:t2r2.star.titech.ac.jp ...
openaire
ABSTRACT Regulated rivers represent complex hydrological systems where groundwater–surface water interactions are governed by natural conditions and human interventions. This study investigates the spatiotemporal dynamics of groundwater–surface water exchanges in the Nechako River, British Columbia (Canada), using numerical simulations.
Milad Fakhari +4 more
wiley +1 more source
Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles. [PDF]
Zhang C +4 more
europepmc +1 more source
Asymptotically ideal Disjunctive Hierarchical Secret Sharing Scheme with an Explicit Construction
Jian M. Ding +4 more
openalex +1 more source
A Secure Secret Image Sharing Scheme Without Safeguarding a Key
Jingzhong Zhang +3 more
openalex +2 more sources

