Results 31 to 40 of about 1,111,411 (282)
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu +4 more
core +1 more source
User-Centric Interference Nulling in Downlink Multi-Antenna Heterogeneous Networks
In heterogeneous networks (HetNets), strong interference due to spectrum reuse affects each user's signal-to-interference ratio (SIR), and hence is one limiting factor of network performance. In this paper, we propose a user-centric interference nulling (
Clerckx, Bruno +3 more
core +1 more source
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains ...
A. Karlsson +23 more
core +1 more source
We propose a scheme for efficient cluster state quantum computation by using imperfect polarization-entangled photon-pair sources, linear optical elements and inefficient non-photon-number-resolving detectors.
D. Bouwmeester +6 more
core +1 more source
Fault-tolerant quantum computation against biased noise [PDF]
We formulate a scheme for fault-tolerant quantum computation that works effectively against highly biased noise, where dephasing is far stronger than all other types of noise.
Aliferis, Panos, Preskill, John
core +1 more source
Modified Shamir Threshold Scheme for Secure Storage of Biometric Data
The security of biometric data is a critical challenge in modern information security due to their uniqueness and non-revocability. Compromise of biometric characteristics leads to irreversible consequences; therefore, storing or transmitting them in ...
Saule Nyssanbayeva +2 more
doaj +1 more source
A Linear Algebraic Threshold Essential Secret Image Sharing Scheme
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the ...
Mohammad Ghebleh +2 more
doaj +1 more source
A Recursive Threshold Visual Cryptography Scheme [PDF]
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core +1 more source
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács +8 more
wiley +1 more source
Apply wavelet packet soft threshold noise reduction method to aviation gamma energy spectrum
BackgroundWith the continuous development of nuclear technology, radioactive material exploration requires higher and higher detection accuracy of aerial gamma energy spectrometer, meanwhile, the wavelet packet soft threshold noise reduction method has ...
ZHANG Song +7 more
doaj +1 more source

