Results 111 to 120 of about 112,587 (333)
A New Security Measure in Secret Sharing Schemes and Secure Network Coding
Linear secret sharing schemes protect secret information from leakage and destruction by encoding secret information into multiple shares, where the secret information can be reconstructed by collecting a certain subsets of shares.
Itaru Kurihara +2 more
doaj +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source
A scientometric analysis of 2449 journal articles and a comprehensive review of 336 papers were conducted, discussing and identifying challenges and research gaps in rockburst prediction and prevention and proposing an ontology‐based framework for better decision‐making in underground excavations. Abstract With underground engineering projects becoming
Hongchuan Yan +6 more
wiley +1 more source
Secret Image Sharing Based on Encrypted Pixels
The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images.
Zhili Zhou +3 more
doaj +1 more source
Secret Sharing Schemes with a large number of players from Toric Varieties [PDF]
A general theory for constructing linear secret sharing schemes over a finite field $\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\geq 1$.
Hansen, Johan P.
core
A novel cavity contraction solution and multilayer shaft wall model were developed to analyze deep shaft stability, considering rock viscosity, support structures, and water pressure, with successful validation through a Hulusu Coal Mine case study.
Bin Chen +5 more
wiley +1 more source
A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))
In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret image sharing ...
Massoud Hadian Dehkordi +2 more
doaj +1 more source
Optimal information rate of secret sharing schemes on trees [PDF]
László Csirmaz, Gábor Tardos
openalex +1 more source
A novel verifiable weighted threshold quantum secret sharing scheme
Yumin Dong, Yi Luo, Yanying Fu
openalex +1 more source
This paper explores how climate‐resilient technologies, such as smart grids, digital twins, and self‐healing materials, can enhance urban resilience. It highlights the urgent need for proactive planning, public‐private collaboration, and data‐driven innovation to future‐proof underground infrastructure amid accelerating climate and urban pressures ...
Kai Chen Goh +12 more
wiley +1 more source

