Results 61 to 70 of about 924,524 (286)
The Bishkek Protocol: a View from a Quarter of a Century Distance
Colleagues and parliamentarians need to think about the concentration of efforts in solving problems and conflicts that exist in the areas of interest and responsibility of integration associations. This is one of the conclusions of this article, in which,
Peter P. Ryabukhin
doaj
The present study is devoted to the analysis of the process of formation at the CS TO level of a system of collective actions to ensure information and psychological security.Aim.
R. S. Vykhodets
doaj +1 more source
Apply current exponential de Finetti theorem to realistic quantum key distribution
In the realistic quantum key distribution (QKD), Alice and Bob respectively get a quantum state from an unknown channel, whose dimension may be unknown.
Guo, Guang-Can +2 more
core +1 more source
A security proof of continuous-variable QKD using three coherent states [PDF]
We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this ...
Michael J. Hutchinson (4246234) +3 more
core +6 more sources
Geometry‐driven thermal behavior in wire‐arc additive manufacturing (WAAM) influences microstructural evolution during nonequilibrium solidification of a chemically complex Fe–Cr–Nb–W–Mo–C nanocomposite system. By comparing different deposits configurations, distinct entropy–cooling rate correlations, segregation, and carbide evolution are revealed ...
Blanca Palacios +5 more
wiley +1 more source
Characterization of Collective Gaussian Attacks and Security of Coherent-State Quantum Cryptography
We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states ...
S. L. Braunstein +4 more
core +1 more source
Bioinspired Shape‐Memory Hook Fasteners With Programmable Interlocking and Silent Release
Bioinspired hook fasteners made from epoxy shape‐memory polymers are shown to switch between strong, secure attachment and gentle, silent release when heated. By combining programmable geometry and material response, these adaptive fasteners outperform commercial systems in strength and noise control, enabling new solutions for robotics, medical ...
Maria I. Vallejo Ciro +3 more
wiley +1 more source
Scandium (Sc)‐doped AlCoCrFeMo HEA coatings are fabricated via flame spraying with 0.1, 0.3, and 0.5 wt% Sc additions. Among these, the HEA‐Sc0.3 coating exhibits the highest corrosion resistance, indicated by a more positive corrosion potential and lower current density.
Pankaj Kumar +7 more
wiley +1 more source
THE PATH TO SECURITY: MODELS AND MECHANISMS FOR MAINTAINING EUROPEAN AND INTERNATIONAL SECURITY
Security is a central theme in international relations and modern political science, particularly given the evolving security landscape in Europe and globally.
Mykola Gnatiuk
doaj +1 more source
GEO-STRATEGIC PREMISES FOR CONTEMPORARY CONFLICTS [PDF]
This article presents the authors’ views on the specific impact of geopolitical and geostrategic factors, conditions and tendencies of the contemporary security environment.
Georgi DIMOV, Valeri IVANOV
doaj

