-
1
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01Subjects: “…secret sharing…”
Get full text
Article -
2
THE LANGUAGE OF THE “SECRET SENSE”: ON THE LINGUISTIC STUDY OF PROPRIOCEPTION
Published 2024-12-01“…Starting from the classical definition of proprioception as a “secret sense” proposed by Ch. Sherrington, the author identifies the factors that impede its cognitive processing, verbalization and scientific analysis. …”
Get full text
Article -
3
Assembly of the salt-secreting mangrove Avicennia rumphiana.
Published 2025-01-01“…Avicennia rumphiana, also known as Avicennia marina var. rumphiana or Avicennia lanata, is a mangrove species that has high salt tolerance and is one of the few species that secretes salt through the leaves, similar to Avicennia marina. …”
Get full text
Article -
4
Adventurer in ranks of the secret services? To the biography of Pyotr Vasilyevich Glinko– Appin
Published 2022-12-01Get full text
Article -
5
Female Genital Mutilation/Cutting: The Secret World of Women as Seen by Men
Published 2013-01-01“…Although the practice is generally confined to the secret world of women, it does not mean that men cannot be influential. …”
Get full text
Article -
6
The links between the banned Lithuanian press and the national identity
Published 2024-08-01“…The publishing was concentrated in Lithuanian Minor (Prussia, Germany) and the USA and secretly disseminated among Lithuanians in the Russian Empire. …”
Get full text
Article -
7
Cystatin C Secretion in Blood Derivatives and Cellular Models of Idiopathic Parkinson’s Disease
Published 2025-01-01“…Secreted cystatin C concentration was measured in each biospecimen tested. …”
Get full text
Article -
8
Light Regulates Secreted Metabolite Production and Antagonistic Activity in <i>Trichoderma</i>
Published 2024-12-01“…The 6-PP was purified, and its spectrum by nuclear magnetic resonance and mass spectroscopy was identical to that of commercial 6-PP. Light also induced or suppressed other unidentified metabolites in several other species of <i>Trichoderma</i>. …”
Get full text
Article -
9
Constructing Identities: Amos Tutuola and the Ibadan Literary Elite in the wake of Nigerian Independence
Published 2021-12-01“…Furthermore, educational experiences and sociocultural identities informed the ways in which independent Nigeria was envisioned by both Tutuola and the elite writers. …”
Get full text
Article -
10
Dynamic assignment and maintenance of positional identity in the ventral neural tube by the morphogen sonic hedgehog.
Published 2010-06-01“…Morphogens are secreted signalling molecules that act in a graded manner to control the pattern of cellular differentiation in developing tissues. …”
Get full text
Article -
11
-
12
Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network
Published 2020-06-01“…However, a challenging issue is the well-known identity-based online/offline encryption schemes unable to resist continual key leakage attacks of the secret keys. …”
Get full text
Article -
13
Recent advances in pancreatic α-cell transdifferentiation for diabetes therapy
Published 2025-01-01Get full text
Article -
14
A Function Private Attribute-Based Encryption
Published 2014-01-01“…It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext. …”
Get full text
Article -
15
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
Published 2024-01-01“…In this cryptosystem, a sender can encrypt a vector x→ into a ciphertext with a hierarchical identity, while a receiver who possesses a secret key corresponding to the same hierarchical identity and a vector y→ can decrypt the ciphertext and obtain the inner product x→,y→. …”
Get full text
Article -
16
Sages comme des images ? Les héroïnes sensationnalistes et le monde de la mode
Published 2006-12-01“…In Mary Elizabeth Braddon’s Lady Audley’s Secret (1861-1862), the detective must learn to read pictures, from a Pre-Raphaelite portrait to books of beauties, so as to unveil the identity of the eponymous heroine, discovering in the process the way consumer society breeds female duplicity.…”
Get full text
Article -
17
A New Data Coding Algorithm for Secure Communication of Image
Published 2024-11-01“…It successfully recovers secret images at the receiver’s side using secret code series derived from both the secret and reference images, instead of direct transmission of secret image. …”
Get full text
Article -
18
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
Published 2019-04-01“…A shared key can be effectively traced, and if the traced identity claims that it is innocent, an auditor can publicly audit who will be responsible for the shared key. …”
Get full text
Article -
19
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01“…The biometric templates are never identical thereby, this approach allows fuzziness in minutiae points by incorporating Bose–Chaudhuri–Hocquenghem (BCH) codes for error‐correction and secures random codeword of the error‐correcting scheme as secret key by SHA‐256 hash mapping. …”
Get full text
Article -
20
The Fake History: Soviet Totalitarianism and the Memory of the Guerrilla War
Published 2008-12-01“…There were also criminal cases initiated against Soviet secret agents and collaborators. However, these efforts did not help the tradition to evolve, as they were not accepted by society. …”
Get full text
Article