Results 111 to 120 of about 12,080 (256)
CFRV: A Decentralized Control-Flow Attestation Schema Using Mutual Secret Sharing. [PDF]
Li Y, Zhou Q, Li B, Zhuang Y.
europepmc +1 more source
Conspiracy Theory Endorsement Profiles: A Cluster Validation Study
ABSTRACT A substantial body of research has investigated the determinants of conspiratorial beliefs, yet little is known about different conspiracy theory endorsement profiles. The present study used cluster analysis on a set of 52 conspiratorial statements tapping into six conspiracy theory types to identify and validate conspiracy theory endorsement ...
Otto Mäki +6 more
wiley +1 more source
Enhanced (t, n) threshold d-level quantum secret sharing. [PDF]
Sutradhar K, Om H.
europepmc +1 more source
Fluidized gangue backfilling controls mining subsidence through stress redistribution in composite backfill‐pillar systems, reducing surface settlement and stress concentrations. Multi‐scale experimental and numerical analysis provides quantitative design parameters for optimizing ground control in sustainable underground coal mining operations ...
Weilong Zhang +11 more
wiley +1 more source
Optical secret sharing with cascaded metasurface holography. [PDF]
Georgi P +6 more
europepmc +1 more source
This graphical abstract summarizes the proposed framework for improving short‐term residential natural gas consumption forecasting by integrating a novel socioeconomic indicator, the subscription growth ratio (SGR), with conventional meteorological variables.
Ali Pirzad, Mostafa Khanzadi
wiley +1 more source
Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation. [PDF]
Wei W, Tang C, Chen Y.
europepmc +1 more source
Mine‐water immersion tests reveal pronounced coal weakening (vs. minor concrete degradation), identifying coal pillars as the stability‐limiting component in composite dams. A coupled FEINN framework quantifies extreme‐pressure stability and ranks multi‐parameter designs via a normalized multi‐indicator scheme, enabling optimized dam configuration for ...
He Wen +6 more
wiley +1 more source
PQSF: post-quantum secure privacy-preserving federated learning
In federated learning, secret sharing is a key technology to maintain the privacy of participants’ local models. Moreover, with the rapid development of quantum computers, existing federated learning privacy protection schemes based on secret sharing ...
Xia Zhang +4 more
doaj +1 more source
Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction. [PDF]
Prasetyo H +2 more
europepmc +1 more source

