Search
Search Results
-
DNA codes over \(GR(2^{3},d)[X]/\langle X^{2},2X \rangle\)
The main results of this paper are in two directions. First, the family of finite local rings of length 4 whose annihilator of their maximal ideals...
-
-
Algebraic lattices coming from \({\mathbb {Z}}\)-modules generalizing ramified prime ideals in odd prime degree cyclic number fields
Lattice theory has shown to be useful in information theory, and rotated lattices with high modulation diversity have been extensively studied as an...
-
Stable coherent systems
We describe the notion of stability of coherent systems as a framework to deal with redundancy. We define stable coherent systems and show how this...
-
-
Doubly even self-orthogonal codes from quasi-symmetric designs
In this paper, we give a construction of doubly even self-orthogonal codes from quasi-symmetric designs. Especially, we study orbit matrices of...
-
On additive codes with one-rank hulls
We study additive codes with 1-rank hulls and examine their properties for various dualities of the finite field of order 4. We give several...
-
Card-Based Protocols for Private Set Intersection and Union
Card-based cryptography aims to realize secure multiparty computation with physical cards. This paper is the first to address Private Set...
-
Four development stages of collective intelligence
The new generation of artificial intelligence (AI) research initiated by Chinese scholars conforms to the needs of a new information environment...
-
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model
Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public...
-
Deterministic near-optimal distributed listing of cliques
The importance of classifying connections in large graphs has been the motivation for a rich line of work on distributed subgraph finding that has...
-
Printing Protocol: Physical ZKPs for Decomposition Puzzles
Decomposition puzzles are pencil-and-paper logic puzzles that involve partitioning a rectangular grid into several regions to satisfy certain rules....
-
Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
This paper shows new kinds of card-based cryptographic protocols with a standard deck of cards using private operations. They are multi-party secure...
-
An Intelligent Lightweight Signing Signature and Secured Jellyfish Data Aggregation (LS3JDA) Based Privacy Preserving Model in Cloud
Develo** a secured and accurate disease diagnosis framework in the healthcare cloud systems are still remains one of the crucial problems in recent...
-
Optimal Prognostic Accuracy: Machine Learning Approaches for COVID-19 Prognosis with Biomarkers and Demographic Information
The global emergence of the unprecedented COVID-19 pandemic in late 2019 has led to millions of infections and thousands of fatalities, profoundly...
-
-
On implementing SWMR registers from SWSR registers in systems with Byzantine failures
The implementation of registers from (potentially) weaker registers is a classical problem in the theory of distributed computing. Since Lamport’s...