Results 41 to 50 of about 20,376 (274)
No Signalling and Quantum Key Distribution
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key ...
A. Kent +9 more
core +1 more source
A mask‐free and cost‐effective UV‐pico‐second laser‐based microfabrication method is proposed to fabricate large‐area biodegradable microelectrode arrays and pressure sensors. These devices demonstrate low impedance, good conformability, excellent biocompatibility, and rapid degradation, providing a new route for next‐generation transient electronics ...
Bhavani Prasad Yalagala +5 more
wiley +1 more source
Strongly secure certificateless one-pass authenticated key agreement scheme
As certificateless public key cryptography (CLPKC) could solve the problem of keyescrow, recently it has been studied more and more. Certificateless authenticated keyagreement (CLAKA), as an important part of the CLPKC, also attracts ...
BAOJUN HUANG, HANG TU
doaj
Provably Secure and Practical Quantum Key Distribution over 307 km of Optical Fibre
Proposed in 1984, quantum key distribution (QKD) allows two users to exchange provably secure keys via a potentially insecure quantum channel. Since then, QKD has attracted much attention and significant progress has been made in both theory and practice.
Gisin, Nicolas +8 more
core +2 more sources
3D Printing of Soft Robotic Systems: Advances in Fabrication Strategies and Future Trends
Collectively, this review systematically examines 3D‐printed soft robotics, encompassing material selections, function integration, and manufacturing methodologies. Meanwhile, fabrication strategies are analyzed in order of increasing complexity, highlighting persistent challenges with proposed solutions.
Changjiang Liu +5 more
wiley +1 more source
A secure quantum identification system combining a classical identification procedure and quantum key distribution is proposed. Each identification sequence is always used just once and new sequences are ``refuelled'' from a shared provably secret key ...
A.K. Ekert +24 more
core +1 more source
Provable Secure Generalized Signcryption [PDF]
Generalized signcryption which proposed by Han is a new cryptographic primitive which can work as an en- cryption scheme, a signature scheme or a signcryption scheme[5]. However,the security proof in their paper is uncorrect. our contribution are as following:First we give security notions for this new primitive.Secnond,we give an attack to [4] which ...
Xu an Wang, Xiaoyuan Yang, Jindan Zhang
openaire +1 more source
Visual teach‐and‐repeat (VTR) navigation allows robots to learn and follow routes without building a full metric map. We show that navigation accuracy for VTR can be improved by integrating a topological map with error‐drift correction based on stereo vision.
Fuhai Ling, Ze Huang, Tony J. Prescott
wiley +1 more source
Provably secure rational delegation computation protocol
A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants ...
Youliang TIAN +3 more
doaj +2 more sources
Stochastic nanoscale physical cues induce glioblastoma (GBM)‐associated transcriptional traits in naïve astrocytes leading to spontaneous formation of spheroids. Cells within spheroids express activated‐MMP2 and a differential gene expression pattern involving P53 and NOTCH3, providing evidence for a role for changes in brain topography, as observed in
Laurent Starck +8 more
wiley +1 more source

