Results 31 to 40 of about 1,111,411 (282)

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

User-Centric Interference Nulling in Downlink Multi-Antenna Heterogeneous Networks

open access: yes, 2016
In heterogeneous networks (HetNets), strong interference due to spectrum reuse affects each user's signal-to-interference ratio (SIR), and hence is one limiting factor of network performance. In this paper, we propose a user-centric interference nulling (
Clerckx, Bruno   +3 more
core   +1 more source

How to share a quantum secret

open access: yes, 1999
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains ...
A. Karlsson   +23 more
core   +1 more source

Linear optical quantum computation with imperfect entangled photon-pair sources and inefficient non-photon-number-resolving detectors

open access: yes, 2010
We propose a scheme for efficient cluster state quantum computation by using imperfect polarization-entangled photon-pair sources, linear optical elements and inefficient non-photon-number-resolving detectors.
D. Bouwmeester   +6 more
core   +1 more source

Fault-tolerant quantum computation against biased noise [PDF]

open access: yes, 2008
We formulate a scheme for fault-tolerant quantum computation that works effectively against highly biased noise, where dephasing is far stronger than all other types of noise.
Aliferis, Panos, Preskill, John
core   +1 more source

Modified Shamir Threshold Scheme for Secure Storage of Biometric Data

open access: yesComputers
The security of biometric data is a critical challenge in modern information security due to their uniqueness and non-revocability. Compromise of biometric characteristics leads to irreversible consequences; therefore, storing or transmitting them in ...
Saule Nyssanbayeva   +2 more
doaj   +1 more source

A Linear Algebraic Threshold Essential Secret Image Sharing Scheme

open access: yesMathematics, 2022
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the ...
Mohammad Ghebleh   +2 more
doaj   +1 more source

A Recursive Threshold Visual Cryptography Scheme [PDF]

open access: yes, 2008
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core   +1 more source

Personalized Selumetinib Dosing in Pediatric Neurofibromatosis Type 1: Insights From a Pilot Therapeutic Drug Monitoring Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács   +8 more
wiley   +1 more source

Apply wavelet packet soft threshold noise reduction method to aviation gamma energy spectrum

open access: yesHe jishu, 2022
BackgroundWith the continuous development of nuclear technology, radioactive material exploration requires higher and higher detection accuracy of aerial gamma energy spectrometer, meanwhile, the wavelet packet soft threshold noise reduction method has ...
ZHANG Song   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy