Location via proxy:
[ UP ]
[Report a bug]
[Manage cookies]
No cookies
No scripts
No ads
No referrer
Show this form
×
Please click
here
if you are not redirected within a few seconds.
All
Images
News
Books
Maps
Videos
Shopping
Search tools
Recent
Recent
Past hour
Past 24 hours
Past week
Past month
Past year
Archives
Sorted by relevance
Sorted by relevance
Sorted by date
Enhanced quantum secret sharing protocol for anonymous secure communication utilizing W states
ScienceDirect.com
Quantum secret sharing (QSS) represents the fusion of quantum mechanics principles with secret information sharing, allowing a sender to distribute a secret...
2 weeks ago
Verifying the security of a continuous variable quantum communication protocol via quantum metrology | npj Quantum ...
Nature
Quantum mechanics offers the possibility of unconditionally secure communication between multiple remote parties. Security proofs for such...
1 month ago
(PDF) SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier
ResearchGate
PDF | OAuth2.0 is a Single Sign-On approach that helps to authorize users to log into multiple applications without re-entering the...
7 months ago
'Quantum secret sharing' scheme allows 10 parties to communicate securely – Physics World
Physics World
A “quantum secret sharing” scheme that allows 10 parties to share information securely – the highest number so far – has been developed and...
45 months ago
SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier | Scientific Reports
Nature
OAuth2.0 is a Single Sign-On approach that helps to authorize users to log into multiple applications without re-entering the credentials.
7 months ago
CSRC Presentations
National Institute of Standards and Technology (.gov)
Joint work with: Peihan Miao (UC Berkeley, USA), Akshayaram Srinivasan (UC Berkeley, USA). Partial abstract. In this work, we present local...
62 months ago
The Secret IRS Files: Trove of Never-Before-Seen Records Reveal How the Wealthiest Avoid Income Tax
ProPublica
ProPublica has obtained a vast cache of IRS information showing how billionaires like Jeff Bezos, Elon Musk and Warren Buffett pay little in...
35 months ago
Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum ...
Nature
Secret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information...
38 months ago
Ukraine War Plans Leak Prompts Pentagon Investigation
The New York Times
WASHINGTON — Classified war documents detailing secret American and NATO plans for building up the Ukrainian military ahead of a planned...
13 months ago
Distributed Biomedical Scheme for Controlled Recovery of Medical Encrypted Images
ScienceDirect.com
With an advancement in biomedical applications, many images are communicated over the public networks. Therefore, these medical images are prone to various...
46 months ago