نتایج جستجو برای: remainder preservation

تعداد نتایج: 88770  

Journal: :Electronic Communications in Probability 2020

Journal: :Integral Transforms and Special Functions 2019

Journal: :Journal of Functional Analysis 2014

Journal: :International Journal of Mathematical Education in Science and Technology 2007

Journal: :Mathematics of Computation 1971

Journal: :Arkiv för Matematik 1957

Journal: :Symmetry 2018
Yanjun Liu Chin-Chen Chang Peng-Cheng Huang Cheng-Yi Hsu

Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD) which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hi...

Journal: :IACR Cryptology ePrint Archive 2005
Sorin Iftene

A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) which are distributed to users. The secret may be recovered only by certain predetermined groups. In case of compartmented secret sharing, the set of users is partitioned into compartments and the secret can be recovered only if the number of participants from any compartment is greater than a fixe...

2015
Hidetsune Kobayashi L. Chen H. Murao

The theory of groups, rings and modules is developed to a great depth. Group theory results include Zassenhaus’s theorem and the Jordan-Hoelder theorem. The ring theory development includes ideals, quotient rings and the Chinese remainder theorem. The module development includes the Nakayama lemma, exact sequences and Tensor products.

2007
L.-C. Wuu T.-J. Liu J.-Y. Yang

IP traceback is a defense method to help a victim to identifying the sources of attacking packets. In this paper, we propose an IP traceback method based on the Chinese Remainder Theorem to require routers to probabilistically mark packets with partial path information when packets traverse routers through the Internet. The routers with the proposed IP traceback method can interoperate seamless...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید