Results 71 to 80 of about 211,819 (273)

Quantum secret sharing between m-party and n-party with six states

open access: yes, 2006
We propose a quantum secret sharing scheme between $m$-party and $n$-party using three conjugate bases, i.e. six states. A sequence of single photons, each of which is prepared in one of the six states, is used directly to encode classical information in
A. Karlsson   +26 more
core   +1 more source

A review on rockburst prediction and prevention to shape an ontology‐based framework for better decision‐making for underground excavations

open access: yesDeep Underground Science and Engineering, EarlyView.
A scientometric analysis of 2449 journal articles and a comprehensive review of 336 papers were conducted, discussing and identifying challenges and research gaps in rockburst prediction and prevention and proposing an ontology‐based framework for better decision‐making in underground excavations. Abstract With underground engineering projects becoming
Hongchuan Yan   +6 more
wiley   +1 more source

Dynamic hierarchical quantum information sharing protocol

open access: yes网络与信息安全学报, 2016
Quantum secret sharing (QSS) is one important branch of quantum cryptography.Based on the studies of multi-shared quantum bits,a new dynamic quantum bit sharing protocol was proposed.The participation of the shared members is hierarchical in this ...
Heng-yue JIA   +4 more
doaj   +3 more sources

Generic Secure Repair for Distributed Storage [PDF]

open access: yes, 2017
This paper studies the problem of repairing secret sharing schemes, i.e., schemes that encode a message into $n$ shares, assigned to $n$ nodes, so that any $n-r$ nodes can decode the message but any colluding $z$ nodes cannot infer any information about ...
Bruck, Jehoshua, Huang, Wentao
core   +2 more sources

Improving the security of multiparty quantum secret sharing against Trojan horse attack

open access: yes, 2006
We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li and Man [Phys. Rev. A \textbf{71}, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob ...
Deng, Fu-Guo   +3 more
core   +1 more source

Strengthening urban resilience in China through underground infrastructures management: Addressing global climate challenges with technological solutions

open access: yesDeep Underground Science and Engineering, EarlyView.
This paper explores how climate‐resilient technologies, such as smart grids, digital twins, and self‐healing materials, can enhance urban resilience. It highlights the urgent need for proactive planning, public‐private collaboration, and data‐driven innovation to future‐proof underground infrastructure amid accelerating climate and urban pressures ...
Kai Chen Goh   +12 more
wiley   +1 more source

Advancing mine pillar design: Evaluating traditional methods and integrating AI for enhanced stability of pillars in the Great Dyke, Zimbabwe

open access: yesDeep Underground Science and Engineering, EarlyView.
B1 is bord width 1, B2 is bord width 2, L is the pillar length, W is the pillar width, red color and letter A represent the pillars, and white color and number 1 represent excavated areas. Pstress is the average pillar stress; σv is the vertical component of the virgin stress, MPa; and e is the areal extraction ratio. e = B o B o + B P ${\rm{e}}=\frac{{
Tawanda Zvarivadza   +4 more
wiley   +1 more source

Алгоритм формирования матриц над примарным кольцом вычетов для построения протоколов множественного разделения секрета, реализующих заданную иерархию доступа [PDF]

open access: yes, 2007
Perfect linear multi-secret sharing schemes over primary residue ring construction algorithm is proposed. Early known secret sharing schemes over finite field construction method is generalized by proposed algorithm.
Волошин, Андрей
core  

An Effective Private Data storage and Retrieval System using Secret sharing scheme based on Secure Multi-party Computation

open access: yes, 2015
Privacy of the outsourced data is one of the major challenge.Insecurity of the network environment and untrustworthiness of the service providers are obstacles of making the database as a service.Collection and storage of personally identifiable ...
Binu, V. P.   +2 more
core   +1 more source

Performance assessment of a potential underground thermal storage facility: Case study of the closed mine Prosper‐Haniel in the Ruhr coal mining area in Germany

open access: yesDeep Underground Science and Engineering, EarlyView.
This study demonstrates the feasibility of an underground closed‐loop thermal storage facility at a post‐mining site, intended for seasonal heat energy storage. Its principal design shows water flow directions in winter and summer (1, 2), heat pumps (3), an upper water reservoir (4), and connecting pipes (5).
Dmytro Rudakov, Oleksandr Inkin
wiley   +1 more source

Home - About - Disclaimer - Privacy