Results 81 to 90 of about 211,819 (273)
Blockchain systems store transaction data in the form of a distributed ledger where each node stores a copy of all data, which gives rise to storage issues.
Sihem Mesnager +2 more
doaj +1 more source
This study investigated the spatial patterns and development mechanisms of urban underground space (UUS) in Shanghai using underground points of interest data. It revealed distinct development mechanisms between the main city and suburbs, highlighting the need for differentiated UUS planning and policies to optimize underground space resources ...
Chenxiao Ma +3 more
wiley +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Secret sharing is an important building block in cryptography. All explicit secret sharing schemes which are known to have optimal complexity are multi-linear, thus are closely related to linear codes.
Csirmaz Laszlo
doaj +1 more source
Universal share based quantum multi secret image sharing scheme
Image security for information has become increasingly critical as internet become more prevalent due to hacking and unauthorized access. To ensure the security of confidential image data, image encryption using visual cryptography plays a crucial role.
Rabari, Dipak K. +2 more
openaire +2 more sources
Earthworms, as ‘ecosystem engineers', play a crucial role in regulating ecosystem functions and shaping community structures. Due to climate change, earthworms face severe survival pressures and extinction risks. However, whether conservation efforts targeting aboveground biodiversity can cover the long‐neglected earthworm diversity remains unknown. To
Yajie Zhou +6 more
wiley +1 more source
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley +1 more source
Verifiable multi-secret sharing based on LFSR sequences
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hu, Chunqiang +2 more
openaire +1 more source
Fluidized gangue backfilling controls mining subsidence through stress redistribution in composite backfill‐pillar systems, reducing surface settlement and stress concentrations. Multi‐scale experimental and numerical analysis provides quantitative design parameters for optimizing ground control in sustainable underground coal mining operations ...
Weilong Zhang +11 more
wiley +1 more source
Оптимальные протоколы множественного разделения секрета с многоадресным сообщением, основанные на линейных преобразованиях над кольцами вычетов [PDF]
Отримані достатні умови оптимальності (за критерієм максимуму інформаційних відношень) протоколів множинного розподілу секрету з багатоадресним повідомленням, що реалізують певні ієрархії доступу.
Алексейчук, Антон +1 more
core

