Results 41 to 50 of about 48,172 (181)
Universal Entanglement and an Information‐Complete Quantum Theory
This Perspective summarize an informationcomplete quantum theory which describes a fully quantum world without any classical systems and concepts. Here spacetime/gravity, having to be a physical quantum system, universally entangles matter (matter fermions and their gauge fields) as an indivisible trinity, and encodes information‐complete physical ...
Zeng‐Bing Chen
wiley +1 more source
Unclear Intentions: Eavesdropping in Microbial and Plant Systems
Eavesdropping, the interception of signals by unintended receivers, is an important component of the ecology and evolution of communication systems. Plants and microbes have complex communication systems with important consequences for agriculture, human
María Rebolleda-Gómez +1 more
doaj +1 more source
Improving the capacity of the ping-pong protocol
We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol.
A. Beige +4 more
core +1 more source
Full-field implementation of a perfect eavesdropper on a quantum cryptography system [PDF]
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation.
A Kerckhoffs +26 more
core +2 more sources
Initial State Privacy of Nonlinear Systems on Riemannian Manifolds
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley +1 more source
Eavesdropping attacks have become one of the most common attacks on networks because of their easy implementation. Eavesdropping attacks not only lead to transmission data leakage but also develop into other more harmful attacks. Routing randomization is
Xiaoyu Xu +5 more
doaj +1 more source
Eavesdropping on the "ping-pong" quantum communication protocol
The proposed eavesdropping scheme reveals that the quantum communication protocol recently presented by Bostrom and Felbinger [Phys. Rev. Lett.
Antoni Wójcik +2 more
core +1 more source
Greedy Gossip With Eavesdropping [PDF]
25 pages, 7 ...
Ustebay, Deniz +3 more
openaire +2 more sources
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Defeating Passive Eavesdropping with Quantum Illumination
Quantum illumination permits Alice and Bob to communicate at 50 Mbit/s over 50 km of low-loss fiber with error probability less than 10^(-6) while the optimum passive eavesdropper's error probability must exceed 0.28.Comment: 2 pages, 1 figure; new ...
Pirandola, Tan
core +1 more source

