Showing 121 - 140 results of 7,540 for search 'process sharing', query time: 0.14s Refine Results
  1. 121

    Fair secret sharing scheme using asymmetric bivariate polynomial by Wenwei YANG, Yuqing XING

    Published 2019-02-01
    “…In Shamir's (t,n) secret sharing scheme,any m (m≥t) participants can reconstruct the secret,and any less than t participants can't get any information about the secret.However,if there are more than t participants in the secret reconstruction phase,Shamir's secret reconstruction phase can not prevent external attackers from knowing the secret,while internal attackers can release a fake share to deceive honest participants during the secret reconstruction process.A rational threshold secret sharing scheme using asymmetric bivariate polynomial with unknown rounds is proposed.Then it shows its fairness and security against non-cooperative attack with synchronization,non-cooperative attack with a synchronization,cooperative attack with synchronization and cooperative attack with a synchronization.…”
    Get full text
    Article
  2. 122
  3. 123
  4. 124

    Data sharing scheme for 5G IoT based on blockchain by Kang QIAO, Wei YOU, Lingwei WANG, Hongbo TANG

    Published 2020-08-01
    “…The massive amount of IoT data has great value,but the existing cloud-based data sharing mechanism faces problems such as single points of failure and internal leakage,which can not ensure the secure sharing of user data.In order to achieve efficient and reliable data sharing,the blockchain technology was used to propose a 5G IoT data sharing scheme based on blockchain.Firstly,the proposed scheme designed data sharing framework and data sharing process,based on the lightning network solution,an off-chain transaction mechanism for data sharing of the internet of things was proposed.Experimental analysis shows that the 5G IoT data sharing framework based on blockchain has strong anti-attack ability and the off-chain transaction mechanism based on lightning network can greatly increase transaction throughput and reduce transaction delay.…”
    Get full text
    Article
  5. 125
  6. 126

    Dividend-Based Labor Remuneration and Tradable Shares in Worker Cooperatives by Ermanno C. Tortia

    Published 2024-12-01
    “…In the presence of a financial market, cooperative shares would be issued and allocated to both members and non-member outside investors, thus addressing the problem of the under-capitalization of worker cooperatives. …”
    Get full text
    Article
  7. 127

    Application of Shared Decision-making in the Diagnosis and Treatment of Parotid Tumors by Rui ZHANG, Gang CHEN

    Published 2025-04-01
    “…In clinical practice, emphasizing SDM process can significantly enhance patient and family engagement while promoting the equitable SDM authority of SDM, thereby enabling the development of personalized and precise diagnostic and therapeutic strategies. …”
    Get full text
    Article
  8. 128

    Sovereignization of Home Stock Market and Redomiciliation of Shares of Russian Issuers by K. E. Kalinkina, E. V. Semenkova

    Published 2024-10-01
    “…Participants’ interests in the process of redomiciliation were specified and risks of its impact on price trends on Russian share market were highlighted. …”
    Get full text
    Article
  9. 129

    Spectrum Sharing in Cognitive Radio Using GSC with Suppressed Sidelobes by Syed Azmat Hussain, Aqdas Naveed Malik, Zafar Ullah Khan, Ijaz Mansoor Qureshi

    Published 2014-06-01
    “…The subtraction of the outputs of the two GSCs, results in the suppression of the highest pair of sidelobes. This process is repeated iteratively to result in an adaptive algorithm. …”
    Get full text
    Article
  10. 130
  11. 131
  12. 132

    Shared Decision-Making in Solid Organ Transplantation: A Review by Alessandra Agnese Grossi

    Published 2025-01-01
    “…This approach involves patients, caregivers, and healthcare professionals in the decision-making process, ensuring that clinical decisions align with patient preferences, values, and individual circumstances alongside clinical indications. …”
    Get full text
    Article
  13. 133

    Triadic shared decision making in emergency psychiatry: an explorative study by G. C.Roselie van Asperen, R. F.P. de Winter, C. L. Mulder

    Published 2025-03-01
    “…Abstract Background This study aims to understand the complex triadic shared decision-making process in psychiatric emergency services, focusing on the choice between inpatient and outpatient care post-triage. …”
    Get full text
    Article
  14. 134

    Piano performance: music communication and the performer-audience shared experience by Barbara James

    Published 2017-12-01
    “…The review concludes with an examination of the performance appraisal process. …”
    Get full text
    Article
  15. 135

    Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications by Zongye Zhang, Fucai Zhou, Shiyue Qin, Qiang Jia, Zifeng Xu

    Published 2020-01-01
    “…In order to reduce the key management overhead and the access control overhead in social applications, we process keys using secret sharing techniques to enable the users holding similar images to query and decrypt images independently. …”
    Get full text
    Article
  16. 136

    A retrial queueing system with processor sharing and impatient customers by V. I. Klimenok

    Published 2022-06-01
    “…The steady state operation of a queueing system with repeated calls, processor sharing and two types of customers arriving in a marked Markovian arrival process is studied. …”
    Get full text
    Article
  17. 137

    Health data sharing in Germany: individual preconditions, trust and motives by Elias Kühnel, Felix Wilke

    Published 2025-02-01
    “…In order to exploit the full potential of secondary data use in medical research, comprehensive information of the public about data sharing and use as well as transparent and open communication are required to strengthen trust in the actors involved and the data sharing process.…”
    Get full text
    Article
  18. 138

    Verifiable multi-secret sharing schemes applicable to arbitrary access structures by ZHANG Fu-tai1, WANG Yu-min2

    Published 2007-01-01
    “…Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the following properties: multiple secrets can be shared at the same time in a group of shareholders.The secret shares sent to shareholders are publicly verifiable.The public information with respect to each shared secret is publicly verifiable.And the supply of false shares in the process of secret recovery can be prevented.Analysis shows that the verifiable multi-secret sharing schemes constructed by our method are not only secure,but also efficient.…”
    Get full text
    Article
  19. 139

    Shared cognitive impairments and aetiology in ADHD symptoms and reading difficulties. by Celeste H M Cheung, Alexis C Frazier-Wood, Philip Asherson, Fruhling Rijsdijk, Jonna Kuntsi

    Published 2014-01-01
    “…<h4>Background</h4>Twin studies indicate that the frequent co-occurrence of attention deficit hyperactivity disorder (ADHD) symptoms and reading difficulties (RD) is largely due to shared genetic influences. Both disorders are associated with multiple cognitive impairments, but it remains unclear which cognitive impairments share the aetiological pathway, underlying the co-occurrence of the symptoms. …”
    Get full text
    Article
  20. 140