Results 101 to 110 of about 112,314 (333)
A novel verifiable weighted threshold quantum secret sharing scheme
Yumin Dong, Yi Luo, Yanying Fu
openalex +1 more source
Generic Secure Repair for Distributed Storage [PDF]
This paper studies the problem of repairing secret sharing schemes, i.e., schemes that encode a message into $n$ shares, assigned to $n$ nodes, so that any $n-r$ nodes can decode the message but any colluding $z$ nodes cannot infer any information about ...
Bruck, Jehoshua, Huang, Wentao
core +2 more sources
Upon conceptualization of structural behavior, foundations in terms of their form are divided into linear (1D), planar (2D), and volumetric (3D). Regarding the load transfer mechanisms, linear foundation systems are considered vector‐acting, planar foundations are divided into section and surface‐acting, and volumetric ones are recognized as block ...
Abolfazl Eslami +4 more
wiley +1 more source
The permeability variation of rocks during complete stress–strain processes was investigated. A mathematical model describing the influence of rock damage on permeability was constructed. The permeability–stress relationship between soft rock and hard rock was proposed.
Zhen Huang +6 more
wiley +1 more source
Secret Image Sharing Based on Encrypted Pixels
The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images.
Zhili Zhou +3 more
doaj +1 more source
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza +3 more
wiley +1 more source
A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))
In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret image sharing ...
Massoud Hadian Dehkordi +2 more
doaj +1 more source
Optimal information rate of secret sharing schemes on trees [PDF]
László Csirmaz, Gábor Tardos
openalex +1 more source
Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth's second tower
Asymptotically good sequences of ramp secret sharing schemes were given in [Asymptotically good ramp secret sharing schemes, arXiv:1502.05507] by using one-point algebraic geometric codes defined from asymptotically good towers of function fields.
Geil, Olav +3 more
core
Aiming at the scientific frontiers of in situ fluidized mining of deep resources, a deep coal fluidized pipeline lifting system based on hydraulic conveying has been proposed. To solve the issue of particle sedimentation of large particles in horizontal connection sections, a solution involving the installation of guide vane‐type swirlers in the ...
Jiusheng Bao +5 more
wiley +1 more source

