A (t, n) multi-secret sharing scheme
In the (t,n) multi-secret sharing scheme, there are n participants in the system. At least t or
more participants can easily pool their secrets shadows and reconstruct p secrets at the same …
more participants can easily pool their secrets shadows and reconstruct p secrets at the same …
Band-resolved analysis of nonlinear optical properties of crystalline and molecular materials
Through three case studies, plane wave pseudopotential density functional theory calculations
are performed to investigate the mechanism of second harmonic generation (SHG) of the …
are performed to investigate the mechanism of second harmonic generation (SHG) of the …
[HTML][HTML] An allosteric inhibitor of the human Cdc34 ubiquitin-conjugating enzyme
In the ubiquitin-proteasome system (UPS), E2 enzymes mediate the conjugation of ubiquitin
to substrates and thereby control protein stability and interactions. The E2 enzyme hCdc34 …
to substrates and thereby control protein stability and interactions. The E2 enzyme hCdc34 …
[PDF][PDF] Dcn1 functions as a scaffold-type E3 ligase for cullin neddylation
Cullin-based E3 ubiquitin ligases are activated through modification of the cullin subunit
with the ubiquitin-like protein Nedd8. Dcn1 regulates cullin neddylation and thus ubiquitin …
with the ubiquitin-like protein Nedd8. Dcn1 regulates cullin neddylation and thus ubiquitin …
Secure authentication scheme for session initiation protocol
CC Yang, RC Wang, WT Liu - Computers & Security, 2005 - Elsevier
The Session Initiation Protocol provides an expandable and easy solution to the IP-based
telephony environment. When users ask to use an SIP service, they need to be authenticated …
telephony environment. When users ask to use an SIP service, they need to be authenticated …
Kondo lattice model in magic-angle twisted bilayer graphene
We systematically study emergent Kondo lattice models from magic-angle twisted bilayer
graphene using the topological heavy fermion representation. At the commensurate fillings, we …
graphene using the topological heavy fermion representation. At the commensurate fillings, we …
Support vector machine-based models for hourly reservoir inflow forecasting during typhoon-warning periods
GF Lin, GR Chen, PY Huang, YC Chou - Journal of hydrology, 2009 - Elsevier
In this paper, effective reservoir inflow forecasting models based on the support vector
machine (SVM), which is a novel kind of neural networks (NNs), are proposed. Based on …
machine (SVM), which is a novel kind of neural networks (NNs), are proposed. Based on …
Acoustic-phonon-mediated superconductivity in rhombohedral trilayer graphene
Motivated by the observation of two distinct superconducting phases in the moiréless AB C-stacked
rhombohedral trilayer graphene, we investigate the electron-acoustic-phonon …
rhombohedral trilayer graphene, we investigate the electron-acoustic-phonon …
[PDF][PDF] Phase-separated transcriptional condensates accelerate target-search process revealed by live-cell single-molecule imaging
Compartmentalization by liquid-liquid phase separation is implicated in transcription. It
remains unclear whether and how transcriptional condensates accelerate the search of …
remains unclear whether and how transcriptional condensates accelerate the search of …
Interaction quenches in the one-dimensional Bose gas
The nonequilibrium dynamics of integrable systems are highly constrained by the conservation
of certain charges. There is substantial evidence that after a quantum quench they do not …
of certain charges. There is substantial evidence that after a quantum quench they do not …