نتایج جستجو برای: production sharing

تعداد نتایج: 688014  

2012
Changlu Lin Lein Harn

Abstract A (t, n) secret sharing scheme permits a secret to be divided into n shares in such a way that any t or more than t shares can reconstruct the secret, but fewer than t shares cannot reconstruct the secret. Verifiable secret sharing (VSS) has been proposed to allow each shareholder to verify the validity of his own share, but not other shareholders' shares. In this paper, we propose an ...

Journal: :IACR Cryptology ePrint Archive 2006
Feng Yi Daoshun Wang Yiqi Dai

Visual secret sharing scheme (VSSS) is a secret sharing method which decodes the secret by using the contrast ability of the human visual system. Autostereogram is a single two dimensional (2D) image which becomes a virtual three dimensional (3D) image when viewed with proper eye convergence or divergence. Combing the two technologies via human vision, this paper presents a new visual secret sh...

Journal: :Oil & Gas Science and Technology – Revue d’IFP Energies nouvelles 2020

Journal: :International Journal of Energy Economics and Policy 2023

Presently, there is little focus on the contractual agreement, particularly production sharing agreement by International Oil Companies in exploration of petroleum resources developing countries. The primary objective this paper to critically explore contract structure production-sharing agreements and development Content analysis was used as methodology study after examining several literature...

2007
Yi-Chun Wang Justie Su-tzu Juan

A secret sharing scheme is a method to distribute a secret among a set of participants, such that only qualified subsets of the participants can recover the secret. A secret sharing scheme is perfect if any unqualified subset obtains no information regarding the master key. The collection of qualified subsets is called access structure. In a hypergraph, if the size of edges is equal to r, the h...

2006
Michael P. Collins Carrie Gates Gaurav Kataria

We segregate attacks into two categories – targeted and opportunistic – based on whether the attacker compromises a specific target (targeted) or a number of intermediate targets to fulfill his end goal (opportunistic). We assume that opportunistic attackers consider targets indistinguishable except for their vulnerabilities, and are interested in acquiring as many targets as possible. We there...

2005
Tobias Hoßfeld Andreas Mäder Kurt Tutschku Frank-Uwe Andersen

Mobile networks differ from their wireline counterparts mainly by the high costs for air transmissions and by the mobility of the users. A new entity, denoted as the crawling peer, is suggested in order to optimize the resource mediation mechanism for a mobile P2P file sharing application. In [1], we have investigated the performance of a crawling peer by means of simulations. Now, we show a ti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید