Results 1 to 10 of about 1,164,606 (318)

On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel

open access: yes, 2015
We study oblivious transfer (OT) between Alice and Bob in the presence of an eavesdropper Eve over a degraded wiretapped binary erasure channel from Alice to Bob and Eve.
Dey, Bikash Kumar   +3 more
core   +1 more source

Juridical Narrative in Alice’s Worlds: the Dimension of the Possible

open access: yesBetween, 2012
Aim of this essay is to focus on possible links between Law and Literature, using two novels by Lewis Carroll: Alice in the Wonderland e Through the Looking-Glass and what Alice Found there. Analyzing the legal experiences made by Alice in the two novels
Francesca Scamardella
doaj   +1 more source

Quantum nonlocality via local contextuality with qubit-qubit entanglement

open access: yes, 2016
Quantum nonlocality can be revealed "via local contextuality" in qudit-qudit entangled systems with $d > 2$, that is, through the violation of inequalities containing Alice-Bob correlations that admit a local description, and Alice-Alice correlations ...
Cabello, Adán   +3 more
core   +1 more source

Weak randomness completely trounces the security of QKD [PDF]

open access: yes, 2012
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob).
C. H. Bennett   +8 more
core   +2 more sources

The Physics of ALICE HLT Trigger Modes [PDF]

open access: yes, 2002
We discuss different physics cases, mainly of the ALICE TPC, such as pile-up, jets in pp and PbPb, Bottonium and Charmonium spectroscopy, and there corresponding demands on the ALICE High Level Trigger (HLT) System.
Bramm, R.   +3 more
core   +3 more sources

Combination Therapy Strategies for the Treatment of Malaria

open access: yesMolecules, 2019
Malaria is a vector- and blood-borne infection that is responsible for a large number of deaths around the world. Most of the currently used antimalarial therapeutics suffer from drug resistance.
Sibusiso Alven, Blessing Aderibigbe
doaj   +1 more source

Experimental realization of large-alphabet quantum key distribution protocol using orbital angular momentum entanglement

open access: yes, 2012
We experimentally demonstrate a quantum key distribution (QKD) protocol using photon pairs entangled in orbit angular momentum (OAM). In our protocol, Alice and Bob modulate their OAM states on each entangled pair with spatial light modulators (SLMs ...
  +15 more
core   +1 more source

Evaluating Visual Conversational Agents via Cooperative Human-AI Games

open access: yes, 2017
As AI continues to advance, human-AI teams are inevitable. However, progress in AI is routinely measured in isolation, without a human in the loop. It is crucial to benchmark progress in AI, not just in isolation, but also in terms of how it translates ...
Batra, Dhruv   +7 more
core   +2 more sources

Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer [PDF]

open access: yes, 2017
This paper proposes to exploit the so-called reciprocity parameters (modelling non-reciprocal communication hardware) to use them as decision metric for binary hypothesis testing based authentication framework at a receiver node Bob.
Abbasi, Qammer H.   +2 more
core   +1 more source

Distillation of secret key and entanglement from quantum states [PDF]

open access: yes, 2003
We study and solve the problem of distilling secret key from quantum states representing correlation between two parties (Alice and Bob) and an eavesdropper (Eve) via one-way public discussion: we prove a coding theorem to achieve the "wire-tapper" bound,
Devetak, Igor, Winter, Andreas
core   +1 more source

Home - About - Disclaimer - Privacy