Results 51 to 60 of about 6,885,434 (317)

Finite-key security against coherent attacks in quantum key distribution

open access: yes, 2010
The work by Christandl, K\"onig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols.
Acín A   +9 more
core   +1 more source

Towards Communication-Efficient Quantum Oblivious Key Distribution [PDF]

open access: yes, 2012
Oblivious Transfer, a fundamental problem in the field of secure multi-party computation is defined as follows: A database DB of N bits held by Bob is queried by a user Alice who is interested in the bit DB_b in such a way that (1) Alice learns DB_b and ...
C. Crépeau   +8 more
core   +2 more sources

Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors

open access: yesPopulation Ecology, EarlyView.
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley   +1 more source

Optimization of pipeline natural gas supply chain considering marketcompetition

open access: yesYou-qi chuyun, 2021
As a kind of clean and green energy, natural gas accounts for an increasing proportion in global energy consumption structure. So far, a large number of studies were carried out on the optimization of natural gas supply chain, but most of them focused on
Zhengbing LI   +6 more
doaj   +1 more source

Quantum Key Distribution [PDF]

open access: yesACM Computing Surveys, 2020
The convergence of quantum cryptography with applications used in everyday life is a topic drawing attention from the industrial and academic worlds. The development of quantum electronics has led to the practical achievement of quantum devices that are already available on the market and waiting for their first application on a broader scale.
Mehić, Miralem   +10 more
openaire   +3 more sources

Detector-Device-Independent Quantum Key Distribution

open access: yes, 2014
Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all detector side-channel attacks.
Bussieres, Felix   +5 more
core   +2 more sources

Speciation Through the Lens of Population Dynamics: A Theoretical Primer on How Small and Large Populations Diverge

open access: yesPopulation Ecology, EarlyView.
Population size and dynamics fundamentally shape speciation by influencing genetic drift, founder events, and adaptive potential. Small populations may speciate rapidly due to stronger drift, whereas large populations harbor more genetic diversity, which can alter divergence trajectories. We highlight theoretical models that incorporate population size
Ryo Yamaguchi   +3 more
wiley   +1 more source

Research on the Application of Laser Ablation in the Rapid Detection of Ablation Resistance on the Surface of AgNi Contact Materials

open access: yesApplied Sciences
The ablation resistance of electrical contact materials is a key factor in ensuring the long-term stable operation of electrical equipment. However, conventional electrical contact tests often suffer from long testing cycles, high resource consumption ...
Yun Wang   +9 more
doaj   +1 more source

A metaheuristic method for the multireturn-to-depot petrol truck routing problem with time windows

open access: yesPetroleum Science, 2019
The petrol truck routing problem is an important part of the petrol supply chain. This study focuses on determining routes for distributing petrol products from a depot to petrol stations with the objective of minimizing the total travel cost and the ...
Bohong Wang   +4 more
doaj   +1 more source

Key Distribution Scheme without Deployment Knowledge

open access: yes, 2009
Many basic key distribution schemes specifically tuned to wireless sensor networks have been proposed in the literature. Recently, several researchers have proposed schemes in which they have used group-based deployment models and assumed predeployment ...
Agrawal, Pranav, Kuri, Joy
core   +1 more source

Home - About - Disclaimer - Privacy