Results 51 to 60 of about 95,937 (276)
Imaging of Biphoton States: Fundamentals and Applications
Quantum states of two photons exhibit a rich polarization and spatial structure, which provides a fundamental resource of strongly correlated and entangled states. This review analyzes the physics of these intriguing properties and explores the various techniques and technologies available to measure them, including the state of the art of their ...
Alessio D'Errico, Ebrahim Karimi
wiley +1 more source
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and
Willie K. Harrison +6 more
doaj +1 more source
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin +5 more
core +1 more source
An Elementary Completeness Proof for Secure Two-Party Computation Primitives
In the secure two-party computation problem, two parties wish to compute a (possibly randomized) function of their inputs via an interactive protocol, while ensuring that neither party learns more than what can be inferred from only their own input and ...
Ishwar, Prakash +2 more
core +1 more source
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
Information Theoretically Secure Databases
16 pages, 2 ...
Valiant, Gregory, Valiant, Paul
openaire +2 more sources
Information-Theoretic Security of Cryptographic Channels [PDF]
Information and Communications Security 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020 ...
Fischlin, Marc +2 more
openaire +2 more sources
On formal verification of arithmetic-based cryptographic primitives
Cryptographic primitives are fundamental for information security: they are used as basic components for cryptographic protocols or public-key cryptosystems.
A.C. Yao +11 more
core +1 more source
Bioprosthetic aortic valves have revolutionized the treatment of aortic stenosis, but their durability is limited by structural valve deterioration (SVD). This review focuses on the pericardial tissue at the heart of these valves, examining how its mechanical properties and calcification drive fatigue and failure.
Gabriele Greco +7 more
wiley +1 more source
We report a polymer‐chain insertion strategy to fabricate pore‐threaded MOF thin films with precisely tuned surface chemistry and wettability. Grafting n‐alkane chains into the pillared layer Cu2(bdc)2(dabco) MOF thin film's vertical nanochannels enhances water stability, and induces hydrophobicity and lubricant‐free, solid‐like slippery behavior ...
Angana Borbora +4 more
wiley +1 more source

