Results 41 to 50 of about 5,022 (206)

Universal Entanglement and an Information‐Complete Quantum Theory

open access: yesAdvanced Physics Research, EarlyView.
This Perspective summarize an informationcomplete quantum theory which describes a fully quantum world without any classical systems and concepts. Here spacetime/gravity, having to be a physical quantum system, universally entangles matter (matter fermions and their gauge fields) as an indivisible trinity, and encodes information‐complete physical ...
Zeng‐Bing Chen
wiley   +1 more source

Persistent asymmetric password-based key exchange

open access: yesJournal of Mathematical Cryptology, 2014
Asymmetric password based key exchange is a key exchange protocol where a client and a server share a low entropic password while the server additionally owns a high entropic secret with respect to a public key. There are simple solutions for this, e.g.,
Jiang Shaoquan
doaj   +1 more source

An Improved Key Agreement Protocol Based on Fractal Theory [PDF]

open access: yesEngineering and Technology Journal, 2014
A key agreement protocol is a key establishment technique which enables two or more communicating parities to agree on a key or exchange information over an open communication channel.
Nadia M. G. Al-Saidi
doaj   +1 more source

Multi-exponentiation (cryptographic protocols) [PDF]

open access: yesIEE Proceedings - Computers and Digital Techniques, 1994
In several cryptographic protocols the product of a small number of exponentiations is required, but the separate exponentiation results are not needed. A simultaneous exponentiation algorithm that takes advantage of this situation and that is substantially faster than the ordinary approach using separate exponentiations is presented.
S.-M. Yen, C.-S. Laih, A.K. Lenstra
openaire   +1 more source

Amplified Quantum Correlation via Dynamical Modulation in Qubit‐Qutrit System under Markovian and Non‐Markovian Noise

open access: yesAdvanced Physics Research, EarlyView.
This study proposes an innovative approach to strengthen and amplify entanglement in a hybrid qubit–qutrit system driven by a dynamic field. By analyzing the system's dynamics under both Markovian and non‐Markovian environments, we show that specific field values optimize entanglement.
Polislin Fabrice Wonang   +5 more
wiley   +1 more source

LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols

open access: yesIEEE Access, 2019
Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important.
Jiawen Song   +4 more
doaj   +1 more source

Cultivating Circularity: Harnessing Industry 4.0 and Stakeholder Engagement for a Sustainable Agrifood Future in Brazil

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study analyzed Industry 4.0 (I4.0) technology applications in agribusiness and the role of strategic stakeholders, engagement methods, and other critical aspects data sharing, confidentiality, integrity, decision‐making, and sector‐specific requirements in promoting circularity.
Simone Sehnem   +3 more
wiley   +1 more source

cryptographic Primitives: Insertions, Examples and Open Problems

open access: yesБезопасность информационных технологий, 2014
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev   +1 more
doaj  

Corporate Decarbonization via Technology and Management

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran   +2 more
wiley   +1 more source

Distributed Cryptographic Protocols

open access: yes, 2023
[ES] La confianza es la base de las sociedades modernas. Sin embargo, las relaciones basadas en confianza son difíciles de establecer y pueden ser explotadas fácilmente con resultados devastadores. En esta tesis exploramos el uso de protocolos criptográficos distribuidos para construir sistemas confiables donde la confianza se vea reemplazada por ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy