Results 41 to 50 of about 48,172 (181)

Universal Entanglement and an Information‐Complete Quantum Theory

open access: yesAdvanced Physics Research, EarlyView.
This Perspective summarize an informationcomplete quantum theory which describes a fully quantum world without any classical systems and concepts. Here spacetime/gravity, having to be a physical quantum system, universally entangles matter (matter fermions and their gauge fields) as an indivisible trinity, and encodes information‐complete physical ...
Zeng‐Bing Chen
wiley   +1 more source

Unclear Intentions: Eavesdropping in Microbial and Plant Systems

open access: yesFrontiers in Ecology and Evolution, 2019
Eavesdropping, the interception of signals by unintended receivers, is an important component of the ecology and evolution of communication systems. Plants and microbes have complex communication systems with important consequences for agriculture, human
María Rebolleda-Gómez   +1 more
doaj   +1 more source

Improving the capacity of the ping-pong protocol

open access: yes, 2003
We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol.
A. Beige   +4 more
core   +1 more source

Full-field implementation of a perfect eavesdropper on a quantum cryptography system [PDF]

open access: yes, 2011
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation.
A Kerckhoffs   +26 more
core   +2 more sources

Initial State Privacy of Nonlinear Systems on Riemannian Manifolds

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley   +1 more source

Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack

open access: yesDigital Communications and Networks, 2022
Eavesdropping attacks have become one of the most common attacks on networks because of their easy implementation. Eavesdropping attacks not only lead to transmission data leakage but also develop into other more harmful attacks. Routing randomization is
Xiaoyu Xu   +5 more
doaj   +1 more source

Eavesdropping on the "ping-pong" quantum communication protocol

open access: yes, 2002
The proposed eavesdropping scheme reveals that the quantum communication protocol recently presented by Bostrom and Felbinger [Phys. Rev. Lett.
Antoni Wójcik   +2 more
core   +1 more source

Greedy Gossip With Eavesdropping [PDF]

open access: yesIEEE Transactions on Signal Processing, 2010
25 pages, 7 ...
Ustebay, Deniz   +3 more
openaire   +2 more sources

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Defeating Passive Eavesdropping with Quantum Illumination

open access: yes, 2009
Quantum illumination permits Alice and Bob to communicate at 50 Mbit/s over 50 km of low-loss fiber with error probability less than 10^(-6) while the optimum passive eavesdropper's error probability must exceed 0.28.Comment: 2 pages, 1 figure; new ...
Pirandola, Tan
core   +1 more source

Home - About - Disclaimer - Privacy