Results 31 to 40 of about 7,167,168 (283)

SECURITY OF QUANTUM KEY DISTRIBUTION [PDF]

open access: yesInternational Journal of Quantum Information, 2008
Quantum Information Theory is an area of physics which studies both fundamental and applied issues in quantum mechanics from an information-theoretical viewpoint. The underlying techniques are, however, often restricted to the analysis of systems which satisfy a certain independence condition.
openaire   +2 more sources

Practical challenges in quantum key distribution [PDF]

open access: yes, 2016
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key ...
Diamanti, Eleni   +3 more
core   +3 more sources

Prediction of the apparent viscosity of non-Newtonian water-in-crude oil emulsions

open access: yesPetroleum Exploration and Development, 2013
On the basis of the effective medium theory and the classical viscosity prediction model proposed by Pal et al, the apparent viscosity and rheological properties of the water in crude oil emulsion with natural surface active components such as asphaltene
Wei WANG   +5 more
doaj   +1 more source

UV-activated permanganate process for micro-organic pollutant degradation: efficiency, mechanism and influencing factors

open access: yesWater Science and Technology, 2021
Ultraviolet-activated permanganate (UV/PM) process is a novel advanced oxidation process (AOP), but its application potential remains to be evaluated. This work investigates the degradation of refractory organic pollutant by UV/PM in terms of efficiency,
Miaomiao Ye   +4 more
doaj   +1 more source

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Mediated semiquantum key distribution [PDF]

open access: yesPhysical Review A, 2015
In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A semi-quantum user can only prepare and measure qubits in the computational basis and so must rely on this quantum server to produce qubits in alternative ...
openaire   +2 more sources

Decoy State Quantum Key Distribution

open access: yes, 2005
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all
Chen, Kai, Lo, Hoi-Kwong, Ma, Xiongfeng
core   +1 more source

Scenario-Based Comparative Analysis for Coupling Electricity and Hydrogen Storage in Clean Oilfield Energy Supply System

open access: yesEnergies, 2022
In response to the objective of fully attaining carbon neutrality by 2060, people from all walks of life are pursuing low-carbon transformation. Due to the high water cut in the middle and late phases of development, the oilfield’s energy consumption ...
Fengyuan Yan   +5 more
doaj   +1 more source

Finite-key security against coherent attacks in quantum key distribution

open access: yes, 2010
The work by Christandl, K\"onig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols.
Acín A   +9 more
core   +1 more source

Quantum Key Distribution Using Quantum Faraday Rotators [PDF]

open access: yes, 2007
We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against collective attacks for multi-photon source up to two photons on a noisy ...
Bae J Acin A   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy