Results 91 to 100 of about 8,659,098 (325)

Survey of Quantum Key Application for Guaranteeing Content Security [PDF]

open access: yesJisuanji gongcheng, 2019
From the perspective of guaranteeing content security,a quantum key can enable secret communication with unconditional security.It can extremely improve the security of programs when applied to cryptographic applications.Considering that currently ...
LI Xiaoxing, MENG Kun
doaj   +1 more source

Completely Device Independent Quantum Key Distribution

open access: yes, 2016
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme.
Aguilar, E. A.   +3 more
core   +1 more source

On‐Demand Activation of Thin Alginate Shell Encapsulated Volatile Liquid for Untethered Pneumatic Soft Actuation

open access: yesAdvanced Engineering Materials, EarlyView.
Phase‐changing liquids enable untethered pneumatic actuation in soft robotics but suffer from volatility and storage challenges. This work reports a simple method to encapsulate Novec 7000 within micron‐thin alginate shells via in situ injection and ionic crosslinking.
Rayan A. M. Basodan   +3 more
wiley   +1 more source

Dielectric Barrier Discharge Plasma Deoxidation of Natively Oxide Layer of Copper Powders in a Fluidized Bed

open access: yesAdvanced Engineering Materials, EarlyView.
This paper presents a novel approach to reducing oxide layers on metal powders using low‐temperature hydrogen dielectric barrier discharge plasmas at atmospheric pressure. Unlike conventional hydrogen‐plasma reductions, the powders do not contact the plasma directly.
Shukang Zhang   +3 more
wiley   +1 more source

Detector-Device-Independent Quantum Key Distribution

open access: yes, 2014
Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all detector side-channel attacks.
Bussieres, Felix   +5 more
core   +2 more sources

Exploring Dipolar Dynamics and Ionic Transport in Metal‐Organic Frameworks: Experimental and Theoretical Insights

open access: yesAdvanced Functional Materials, EarlyView.
In this study, the interplay of dipolar dynamics and ionic charge transport in MOF compounds is investigated. Synthesizing the novel structure CFA‐25 with integrated freely rotating dipolar groups, local and macroscopic effects, including interactions with Cs cations are explored.
Ralph Freund   +6 more
wiley   +1 more source

Research on quantum key distribution technology in intelligent substation

open access: yesDianxin kexue, 2018
In order to improve the security of the communication data of the power system,the feasibility of the application of quantum key distribution technology in the monitoring system of the intelligent substation was analyzed and demonstrated by combining the
Xiaopeng YANG   +3 more
doaj  

Measurement-device-independent quantum key distribution with quantum memories

open access: yes, 2013
We generalize measurement-device-independent quantum key distribution [ H.-K. Lo, M. Curty, and B. Qi, Phys. Rev. Lett. 108, 130503 (2012) ] to the scenario where the Bell-state measurement station contains also heralded quantum memories.
Abruzzo, Silvestre   +2 more
core   +1 more source

Bias‐Free Highly Efficient and Stable Dye‐Sensitized Photoelectrochemical Cells via Cascade Charge Transfer

open access: yesAdvanced Functional Materials, EarlyView.
A buried‐junction DSPEC design is introduced that leverages cascade charge transfer to enhance efficiency, stability, and versatility. This approach facilitates effective charge transfer and minimizes recombination losses, leading to significant improvements.
Jun‐Hyeok Park   +8 more
wiley   +1 more source

Quantum Key Relay Scheme Based on Trusted Control Center

open access: yesDianxin kexue, 2014
A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay ...
Shaosheng Jiang, Ruinan Chi, Xiaojun Wen
doaj  

Home - About - Disclaimer - Privacy