Results 81 to 90 of about 211,819 (273)

Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain

open access: yesMathematics, 2020
Blockchain systems store transaction data in the form of a distributed ledger where each node stores a copy of all data, which gives rise to storage issues.
Sihem Mesnager   +2 more
doaj   +1 more source

Unveiling spatial heterogeneity in urban underground space development patterns and mechanisms for differentiated planning: A points of interest‐based study of Shanghai

open access: yesDeep Underground Science and Engineering, EarlyView.
This study investigated the spatial patterns and development mechanisms of urban underground space (UUS) in Shanghai using underground points of interest data. It revealed distinct development mechanisms between the main city and suburbs, highlighting the need for differentiated UUS planning and policies to optimize underground space resources ...
Chenxiao Ma   +3 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Secret sharing and duality

open access: yesJournal of Mathematical Cryptology, 2020
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes which are known to have optimal complexity are multi-linear, thus are closely related to linear codes.
Csirmaz Laszlo
doaj   +1 more source

Universal share based quantum multi secret image sharing scheme

open access: yes
Image security for information has become increasingly critical as internet become more prevalent due to hacking and unauthorized access. To ensure the security of confidential image data, image encryption using visual cryptography plays a crucial role.
Rabari, Dipak K.   +2 more
openaire   +2 more sources

Over three‐quarters of earthworm species lack protection in China, a crisis exacerbated by climate change

open access: yesEcography, EarlyView.
Earthworms, as ‘ecosystem engineers', play a crucial role in regulating ecosystem functions and shaping community structures. Due to climate change, earthworms face severe survival pressures and extinction risks. However, whether conservation efforts targeting aboveground biodiversity can cover the long‐neglected earthworm diversity remains unknown. To
Yajie Zhou   +6 more
wiley   +1 more source

The method of intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement

open access: yesIET Networks, EarlyView., 2022
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley   +1 more source

Verifiable multi-secret sharing based on LFSR sequences

open access: yesTheoretical Computer Science, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hu, Chunqiang   +2 more
openaire   +1 more source

Stress Redistribution Mechanisms and Subsidence Control of Fluidized Gangue Backfilling in Underground Coal Mining: Integrated Experimental and Numerical Investigation

open access: yesEnergy Science &Engineering, EarlyView.
Fluidized gangue backfilling controls mining subsidence through stress redistribution in composite backfill‐pillar systems, reducing surface settlement and stress concentrations. Multi‐scale experimental and numerical analysis provides quantitative design parameters for optimizing ground control in sustainable underground coal mining operations ...
Weilong Zhang   +11 more
wiley   +1 more source

Оптимальные протоколы множественного разделения секрета с многоадресным сообщением, основанные на линейных преобразованиях над кольцами вычетов [PDF]

open access: yes, 2009
Отримані достатні умови оптимальності (за критерієм максимуму інформаційних відношень) протоколів множинного розподілу секрету з багатоадресним повідомленням, що реалізують певні ієрархії доступу.
Алексейчук, Антон   +1 more
core  

Home - About - Disclaimer - Privacy