Results 41 to 50 of about 924,524 (286)

A symmetrization technique for continuous-variable quantum key distribution

open access: yes, 2012
We introduce a symmetrization technique which can be used as an extra step in some continuous-variable quantum key distribution protocols. By randomizing the data in phase space, one can dramatically simplify the security analysis of the protocols, in ...
Anthony Leverrier   +3 more
core   +1 more source

Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation

open access: yes, 2019
Many security and privacy problems can be modeled as a graph classification problem, where nodes in the graph are classified by collective classification simultaneously. State-of-the-art collective classification methods for such graph-based security and
Gong, Neil Zhenqiang   +2 more
core   +1 more source

Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing

open access: yes, 2008
We derive a bound for the security of QKD with finite resources under one-way post-processing, based on a definition of security that is composable and has an operational meaning.
C. H. Bennett   +7 more
core   +1 more source

Security proof of differential phase shift quantum key distribution in the noiseless case [PDF]

open access: yes, 2008
Differential phase shift quantum key distribution systems have a high potential for achieving high speed key generation. However, its unconditional security proof is still missing, even though it has been proposed for many years.
Fung, Chi-Hang Fred   +3 more
core   +2 more sources

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Legislative Alert: Rokita Amendment [PDF]

open access: yes, 2011
[Excerpt] The AFL-CIO urges you to oppose the Rokita Amendment to the Homeland Security bill that would deny basic collective bargaining rights to Transportation Security Officers (TSOs). The Rokita Amendment would single out TSOs from among the hundreds
Samuel, William
core   +1 more source

Collective attacks and unconditional security in continuous variable quantum key distribution

open access: yes, 2004
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states.
Grosshans, Frederic
core   +1 more source

The skills required for transition to university and study in biological sciences: A student perspective

open access: yesFEBS Open Bio, EarlyView.
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley   +1 more source

BALTIC BLACK SEA UNION MODELING: FACTORS AND PERSPECTIVES

open access: yesBaltic Journal of Economic Studies, 2023
An important feature of the current stage of world development is the increase in turbulence and tension, the increase in threats and the actualization of security issues.
Antonina Djakona, Kaspars Kikste
doaj   +1 more source

Security of a new two-way continuous-variable quantum key distribution protocol

open access: yes, 2012
The original two-way continuous-variable quantum-key-distribution (CV QKD) protocols [S. Pirandola, S. Mancini, S. Lloyd, and S. L. Braunstein, Nature Physics 4, 726 (2008)] give the security against the collective attack on the condition of the ...
Grosshans F.   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy