Results 101 to 110 of about 13,572 (291)

An efficient and secure RSA--like cryptosystem exploiting R\'edei rational functions over conics

open access: yes, 2016
We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can be efficiently evaluated through the use of R\'edei rational functions.
Bellini, Emanuele, Murru, Nadir
core  

Multi-secret Visual Cryptography Scheme with Tag Information

open access: yesDEStech Transactions on Computer Science and Engineering, 2017
Since that traditional tagged visual cryptography scheme (TVCS) can only hide only one secret image, this paper presents a multi-secret visual cryptography scheme with tag information. By adopting the concept of random grids (RG) to construct the basic share images of secret images and the tag images, and then combined them in the form of probability ...
Yan-yan HAN   +3 more
openaire   +2 more sources

Caving‐enhanced geothermal system overwhelms fracturing‐ and pipe‐enhanced geothermal system in heat extraction

open access: yesDeep Underground Science and Engineering, EarlyView.
Our study reveals that caving‐enhanced geothermal systems (C‐EGS) with adequately fractured reservoirs achieve optimal heat extraction by minimizing preferential flow paths, while conventional fracturing (F‐EGS) and pipe‐based (P‐EGS) systems suffer accelerated thermal drawdown.
Fangchao Kang   +4 more
wiley   +1 more source

Interference alignment based secure transmission scheme in multi-user interference networks

open access: yes物联网学报, 2023
Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was ...
Lin HU   +4 more
doaj   +2 more sources

Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature schemes based on multivariate quadratic equations, which is one of the most promising alternatives for post-quantum signature schemes, against side ...
Aesun Park   +3 more
doaj   +1 more source

Verifiable multi-secret sharing based on LFSR sequences

open access: yesTheoretical Computer Science, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hu, Chunqiang   +2 more
openaire   +1 more source

Multiple injection techniques to stimulate complex fracture networks in coal reservoirs: A case study on gas disaster reduction of subsurface coal mine in southwest China

open access: yesDeep Underground Science and Engineering, EarlyView.
An experimental device for physical simulation of hydraulic fracturing, comprising: a load‐bearing mechanism with multiple interconnected plates that collectively form an sample chamber; a load‐generating mechanisms, with multiple load‐generating mechanisms arranged within the experimental chamber.
Delei Shang   +5 more
wiley   +1 more source

Strengthening urban resilience in China through underground infrastructures management: Addressing global climate challenges with technological solutions

open access: yesDeep Underground Science and Engineering, EarlyView.
This paper explores how climate‐resilient technologies, such as smart grids, digital twins, and self‐healing materials, can enhance urban resilience. It highlights the urgent need for proactive planning, public‐private collaboration, and data‐driven innovation to future‐proof underground infrastructure amid accelerating climate and urban pressures ...
Kai Chen Goh   +12 more
wiley   +1 more source

Advancing mine pillar design: Evaluating traditional methods and integrating AI for enhanced stability of pillars in the Great Dyke, Zimbabwe

open access: yesDeep Underground Science and Engineering, EarlyView.
B1 is bord width 1, B2 is bord width 2, L is the pillar length, W is the pillar width, red color and letter A represent the pillars, and white color and number 1 represent excavated areas. Pstress is the average pillar stress; σv is the vertical component of the virgin stress, MPa; and e is the areal extraction ratio. e = B o B o + B P ${\rm{e}}=\frac{{
Tawanda Zvarivadza   +4 more
wiley   +1 more source

Research progress and current status of dynamic wave propagation characteristics in rock mass: A review

open access: yesDeep Underground Science and Engineering, EarlyView.
This review elucidates the velocity–dispersion–attenuation coupling mechanisms of wave propagation in rock masses, compares six representative models, and reveals how pressure, temperature, mineral composition, and anisotropy jointly control dynamic responses in complex geological media.
Jiajun Shu   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy