Results 111 to 120 of about 112,314 (333)

Optimal Improvement Ratios of Multi-Secret Sharing Schemes Can Be Achieved

open access: yesMATEC Web of Conferences, 2016
Secret sharing schemes (SSS) deal with activities relative to the secure distribution of a secret among a group of participants who then securely reconstruct the secret by collecting the shares which are held by individuals in qualified sets.
Juan Justie Su-Tzu   +2 more
doaj   +1 more source

A New Visual Multi-Secrets Sharing Scheme by Random Grids

open access: yesCryptography, 2018
In (2, 2)-visual secret sharing (VSS) schemes, a common type of (k, n)-threshold VSS schemes, secret information can be decoded directly through only two shares by using a human vision system.
Joy Jo-Yi Chang   +2 more
doaj   +1 more source

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES [PDF]

open access: yes
Visual secret sharing schemes (VSS) represent an important concept of visual cryptography. They permit the sharing of a secret image between multiple participants so that only authorized groups can recover the secret.
Ruxandra Olimid
core  

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure

open access: yesJournal of Mathematical Cryptology, 2013
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least , from the set of all shares even if up to t players provide incorrect ...
Jhanwar Mahabir P.   +1 more
doaj   +1 more source

A review on rockburst prediction and prevention to shape an ontology‐based framework for better decision‐making for underground excavations

open access: yesDeep Underground Science and Engineering, EarlyView.
A scientometric analysis of 2449 journal articles and a comprehensive review of 336 papers were conducted, discussing and identifying challenges and research gaps in rockburst prediction and prevention and proposing an ontology‐based framework for better decision‐making in underground excavations. Abstract With underground engineering projects becoming
Hongchuan Yan   +6 more
wiley   +1 more source

Semi‐analytical solution for the stability of deep vertical shaft considering time‐dependent rock‐structure interaction

open access: yesDeep Underground Science and Engineering, EarlyView.
A novel cavity contraction solution and multilayer shaft wall model were developed to analyze deep shaft stability, considering rock viscosity, support structures, and water pressure, with successful validation through a Hulusu Coal Mine case study.
Bin Chen   +5 more
wiley   +1 more source

Interactive Verifiable Secret Sharing Scheme

open access: yesБезопасность информационных технологий, 2010
Commitment schemes, secret sharing schemes, interactive zero-knowledge proofs which underlie the offered interactive secrete sharing schemes are considered. Such schemes are one of the main computing primitives in the theory of secure computations.
O. V. Kazarin
doaj  

Strengthening urban resilience in China through underground infrastructures management: Addressing global climate challenges with technological solutions

open access: yesDeep Underground Science and Engineering, EarlyView.
This paper explores how climate‐resilient technologies, such as smart grids, digital twins, and self‐healing materials, can enhance urban resilience. It highlights the urgent need for proactive planning, public‐private collaboration, and data‐driven innovation to future‐proof underground infrastructure amid accelerating climate and urban pressures ...
Kai Chen Goh   +12 more
wiley   +1 more source

Study on the composite fracture characteristics of filling and reinforcing cracked rock mass after high temperature damage

open access: yesDeep Underground Science and Engineering, EarlyView.
Cement infill shares compressive and shear stresses during loading, while interfacial friction hinders crack propagation and reduces stress concentration, improving the rock's load‐bearing capacity. Failure modes vary with crack inclination. Unfilled specimens show four modes.
Shihao Yuan   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy