Results 111 to 120 of about 3,018,405 (324)
PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES [PDF]
Visual secret sharing schemes (VSS) represent an important concept of visual cryptography. They permit the sharing of a secret image between multiple participants so that only authorized groups can recover the secret.
Ruxandra Olimid
core
Abstract Hydrogen plays a crucial role across multiple industrial sectors and is increasingly recognized as a clean energy carrier with significant potential in decarbonization efforts. Methane pyrolysis (MP), particularly using molten metal catalysts, offers a promising pathway for hydrogen production with low CO2 emissions.
Adrian Paredes Bozzo, Zukui Li
wiley +1 more source
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient ...
Yuanju Gan +4 more
doaj +1 more source
Hotspots, trends, and regional focus on oil or gas exploration: A bibliometric comparative study
This paper explores the research trends in global oil and gas exploration through the bibliometric analysis of 3460 articles collected from the Web of Science database on oil and gas exploration published from 2013 to 2023. The research hotspots, objects, regional distribution, methods, and evaluation methods of oil and gas exploration are analyzed and
Jihong Wang +3 more
wiley +1 more source
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj +2 more sources
Based on acoustic emission response characteristics, it can be more accurate to identify the damage evolution process of coal under the combined dynamic and static loads, reveal the moment corresponding to coal damage, and identify the characteristics of coal failure. The research results are conducive to the further use of acoustic emission monitoring
Wei Zhang +10 more
wiley +1 more source
Upon conceptualization of structural behavior, foundations in terms of their form are divided into linear (1D), planar (2D), and volumetric (3D). Regarding the load transfer mechanisms, linear foundation systems are considered vector‐acting, planar foundations are divided into section and surface‐acting, and volumetric ones are recognized as block ...
Abolfazl Eslami +4 more
wiley +1 more source
In this article, the finite element method‐smoothed particle hydrodynamics adaptive coupling algorithm is applied to numerically simulate and analyze the dynamic response of the slit tube and the crack propagation under high in situ stress. The dynamic response of the slit tube mainly exhibits radial response in the vertical direction of the slit and ...
Zhe Sui +3 more
wiley +1 more source
The permeability variation of rocks during complete stress–strain processes was investigated. A mathematical model describing the influence of rock damage on permeability was constructed. The permeability–stress relationship between soft rock and hard rock was proposed.
Zhen Huang +6 more
wiley +1 more source

