Results 91 to 100 of about 211,108 (260)
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares. However, the traditional scheme suffers from information leakage in decryption process since the amount of available ...
Keyao Li +8 more
doaj +1 more source
Investigating the differential impact of mining stress on roadways, we find that in horizontally stressed environments, the inner surrounding rock exhibits more pronounced macro‐meso damage compared to the outer side. ABSTRACT The control of surrounding rocks in dynamic pressure roadways has consistently been one of the challenging predicaments in the ...
Fan Lei +4 more
wiley +1 more source
Secret image sharing (SIS) possesses advantageous attributes such as loss tolerance, offering a promising solution for image protection. However, the issue remains unresolved, which is the trade-off between the transmission or storage overhead of shadow ...
Guozheng Yang +4 more
doaj +1 more source
Оптимальные протоколы множественного разделения секрета с многоадресным сообщением, основанные на линейных преобразованиях над кольцами вычетов [PDF]
Отримані достатні умови оптимальності (за критерієм максимуму інформаційних відношень) протоколів множинного розподілу секрету з багатоадресним повідомленням, що реалізують певні ієрархії доступу.
Алексейчук, Антон +1 more
core
Machine Learning Approaches for GC–MS Data Interpretation in Flavour and Fragrance Analysis
The review explores machine learning integration in GC‐MS data analysis for the fragrance and flavour industry, highlighting recent advances and techniques in a context constrained by data scarcity and intellectual property concerns. ABSTRACT This review explores the integration of machine learning (ML) in the analysis of mass spectrometry data ...
Jean‐Baptiste Coffin +3 more
wiley +1 more source
Efficient Multi Secret Sharing with Generalized Access Structures
arXiv admin note: substantial text overlap with arXiv:1406.5596, arXiv:1407 ...
Binu, V. P., Sreekumar, A.
openaire +2 more sources
Multifactorial Screening for Fine‐Scale Selection of CCS Industrial Clusters and Hubs in Brazil
ABSTRACT As Brazil moves toward implementing its decarbonization commitments, carbon capture and storage (CCS) hubs are emerging as a key pathway for large‐scale CO2 abatement in hard‐to‐abate sectors. This paper presents a multifactorial, data‐driven framework to screen and prioritize potential CCS industrial clusters and hubs across Brazilian regions,
Gustavo P. Oliveira +5 more
wiley +1 more source
How Signals of Silence Sustain Sexual Harassment and What to Do About It
ABSTRACT Sexual harassment has persisted for decades as an open secret within organizations, creating an ongoing challenge for Human Resource practitioners. Many employees experience or witness harassment yet say nothing. When they contemplate complaining, they are discouraged from doing so. Some still muster the courage to speak out about these abuses,
Angela L. Workman‐Stark +6 more
wiley +1 more source
Tailoring Spatial Correlations With Quantum Interference
Imposing spatial structure on interfering photons fundamentally reshapes their correlations. By controlling the mutual distinguishability of two photons, we write and edit these correlations, encoding information that is invisible to conventional intensity measurements and revealed only through their joint behavior.
Carlo Schiano +5 more
wiley +1 more source
Sillcom: A Communication-Efficient Privacy-Preserving Scheme for Indoor Localization
This paper presents Sillcom, a high-performance secure indoor localization scheme designed to minimize both communication and computational costs while preserving participants’ privacy.
Shang Song, Lin Liu, Wei Peng
doaj +1 more source

