As a nurse goes through the creation process they apply new and prior knowledge, organizing content to support intended use, and for the format required (e.g., poster, paper; care plan, practice guideline, procedure, or patient instruction) (ACRL, 2013). At the highest level, this may ...
Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, ProceedingsSepahi R., Steinfeld R., Pieprzyk J.: Lattice-based completely non-malleable PKE in the standard model (poster). In: Udaya P., Philip H. (eds.) Information Security...
This paper presents ongoing work toward employment of RSA encryption in PVSS. Two PVSS schemes are shown to be efficient only when very small RSA public keys like 3 are employed to encrypt the shares. However, too small RSA public keys like 3 are insecure in the PVSS schemes as they ...