Results 101 to 110 of about 112,587 (333)
An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core +1 more source
Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery [PDF]
Yongjie Wang +4 more
openalex +1 more source
A partial envelope approach for modelling multivariate spatial‐temporal data
Abstract In the new era of big data, modelling multivariate spatial‐temporal data is a challenging task due to both the high dimensionality of the features and complex associations among the responses across different locations and time points.
Reisa Widjaja +3 more
wiley +1 more source
Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò +3 more
wiley +1 more source
A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler +4 more
wiley +1 more source
This study investigates the effect of the reaction temperature (step 1) and reaction time (step 1 and 2) on the conversion efficiency and impurity profile of amphetamine synthesized via the Leuckart method. Conversion efficiency and impurity profile were assessed using gas chromatography–flame ionization detection (GC–FID) and GC–mass spectrometry (GC ...
Maartje C. M. Verhoeven +7 more
wiley +1 more source
Generic Secure Repair for Distributed Storage [PDF]
This paper studies the problem of repairing secret sharing schemes, i.e., schemes that encode a message into $n$ shares, assigned to $n$ nodes, so that any $n-r$ nodes can decode the message but any colluding $z$ nodes cannot infer any information about ...
Bruck, Jehoshua, Huang, Wentao
core +2 more sources
An efficient implementation of the Shamir secret sharing scheme [PDF]
Allyson Hineman, Mario Blaum
openalex +1 more source
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza +3 more
wiley +1 more source
Aiming at the scientific frontiers of in situ fluidized mining of deep resources, a deep coal fluidized pipeline lifting system based on hydraulic conveying has been proposed. To solve the issue of particle sedimentation of large particles in horizontal connection sections, a solution involving the installation of guide vane‐type swirlers in the ...
Jiusheng Bao +5 more
wiley +1 more source

