Results 91 to 100 of about 65,060 (255)
Composable security in relativistic quantum cryptography
Relativistic protocols have been proposed to overcome certain impossibility results in classical and quantum cryptography. In such a setting, one takes the location of honest players into account, and uses the signalling limit given by the speed of light
V Vilasini +2 more
doaj +1 more source
Accreditation Against Limited Adversarial Noise
An upgraded accreditation (a variant of quantum verification) scheme is presented, significantly relaxing the assumptions, to allow adversarial noise, while preserving the suitability for near‐term / immediate usage. Abstract An accreditation protocol (a variety of quantum verification) is presented, where error is assumed to be adversarial (in ...
Andrew Jackson
wiley +1 more source
Digital Twin Simulations Toolbox of the Nitrogen‐Vacancy Center in Diamond
The Nitrogen‐vacancy (NV) center in diamond is a key platform within quantum technologies. This work introduces a Python based digital‐twin of the NV, where the spin dynamics of the system is simulated without relying on commonly used approximations, such as the adoption of rotating frame. The digital‐twin is validated through three different examples,
Lucas Tsunaki +3 more
wiley +1 more source
An optimistic fair e-commerce protocol for large e-goods [PDF]
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert +4 more
core
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye +8 more
wiley +1 more source
On the Design of Cryptographic Primitives
The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design.
Amparo Fúster-Sabater +10 more
core +1 more source
Abstracting cryptographic protocols with tree automata [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
Coin Tossing is Strictly Weaker Than Bit Commitment
We define cryptographic assumptions applicable to two mistrustful parties who each control two or more separate secure sites between which special relativity guarantees a time lapse in communication. We show that, under these assumptions, unconditionally
A. Kent +9 more
core +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source

