Results 11 to 20 of about 564,681 (292)

Brakke’s inequality for the thresholding scheme [PDF]

open access: yesCalculus of Variations and Partial Differential Equations, 2020
AbstractWe continue our analysis of the thresholding scheme from the variational viewpoint and prove a conditional convergence result towards Brakke’s notion of mean curvature flow. Our proof is based on a localized version of the minimizing movements interpretation of Esedoğlu and the second author.
Laux, T., Otto, F.
openaire   +4 more sources

Dynamic Multi-threshold Metering Schemes [PDF]

open access: yes, 2001
A metering scheme is a protocol in which an audit agency is able to measure the interaction between clients and servers on the web during a certain number of time frames. Naor and Pinkas [7] considered metering schemes in which any server is able to construct a proof to be sent to the audit agency if and only if it has been visited by at least a number,
BLUNDO, Carlo   +3 more
openaire   +2 more sources

Theoretical Bounds on Performance in Threshold Group Testing Schemes

open access: yesMathematics, 2020
A threshold group testing (TGT) scheme with lower and upper thresholds is a general model of group testing (GT) which identifies a small set of defective samples. In this paper, we consider the TGT scheme that require the minimum number of tests.
Jin-Taek Seong
doaj   +1 more source

Signcryption schemes with threshold unsigncryption, and applications [PDF]

open access: yes, 2014
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier   +2 more
core   +2 more sources

Threshold Schemes with Disenrollment [PDF]

open access: yesProceedings. IEEE International Symposium on Information Theory, 2005
When a shadow of a threshold scheme is publicized, new shadows have to be reconstructed and redistributed in order to maintain the same level of security. In this paper we consider threshold schemes with disenrollment capabilities where the new shadows can be created by broadcasts through a public channel. We establish a lower bound on the size of each
B. Blakley   +3 more
openaire   +1 more source

Multisecret Threshold Schemes [PDF]

open access: yes, 2007
A threshold scheme is a system that protects a secret (key) among a group of participants in such a way that it can only be reconstructed from the joint information held by some predetermined number of these participants. In this paper we extend this problem to one where there is more than one secret that participants can reconstruct using the ...
Wen-Ai Jackson   +2 more
openaire   +1 more source

Apply wavelet packet soft threshold noise reduction method to aviation gamma energy spectrum

open access: yesHe jishu, 2022
BackgroundWith the continuous development of nuclear technology, radioactive material exploration requires higher and higher detection accuracy of aerial gamma energy spectrometer, meanwhile, the wavelet packet soft threshold noise reduction method has ...
ZHANG Song   +7 more
doaj   +1 more source

Postselection threshold against biased noise [PDF]

open access: yes, 2006
The highest current estimates for the amount of noise a quantum computer can tolerate are based on fault-tolerance schemes relying heavily on postselecting on no detected errors.
Reichardt, Ben W.
core   +2 more sources

A survey and refinement of repairable threshold schemes

open access: yesJournal of Mathematical Cryptology, 2018
We consider repairable threshold schemes (RTSs), which are threshold schemes that enable a player to securely reconstruct a lost share with help from their peers.
Laing Thalia M., Stinson Douglas R.
doaj   +1 more source

Electronic voting protocol from bilinear pairings

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2013
Electronic voting has been an active research area since two decades, which involves using information systems and cryptographic schemes in order to reduce costs and human mistakes as well as increase process speed, without discard its security.
Gina Gallegos García   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy