Results 51 to 60 of about 10,496 (211)
Thinking and feeling about novelty: How cognition and emotion shape investment in novel ideas
Abstract While prior research on the strategic framing of innovation highlights the cognitive mechanisms underlying novelty evaluation, we know little about the corresponding emotional mechanisms. Drawing on appraisal theory, construal level theory, and the literature on emotions, we theorize two distinct appraisal‐emotion pathways through which the ...
Matthew P. Mount +3 more
wiley +1 more source
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (
Tom Vergoossen +3 more
doaj +1 more source
We prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) [quant-ph/0309110] from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify
Horodecki, Karol +4 more
core +2 more sources
Model‐Based Systems Engineering in Space Applications: A Comprehensive Literature Review
ABSTRACT The growing complexity of space engineering is driving the demand to embrace the adoption of Model‐Based Systems Engineering (MBSE). Although the MBSE is well‐practiced in the space industry, the level of effort and need required to obtain the benefits of MBSE vastly differ across enterprises; this disparity presents a significant challenge to
Rehobot Bekele Buruso +4 more
wiley +1 more source
Quantum secure communication network architecture and mobile application solution
As the first practical representative technology in the new quantum revolution,quantum key distribution (QKD) brings a promising solution to achieve long-term security guarantee,which has made series of progress from research to practical deployment and ...
Jianquan WANG +4 more
doaj +2 more sources
The method of improving the performance of continuous-variable quantum key distribution protocols by post-selection has been recently proposed and verified.
Guo, Hong +4 more
core +1 more source
ABSTRACT This article examines the evolution of European Union (EU) space policy through the lens of historical institutionalism, highlighting how security and defence considerations have been incrementally integrated into a domain originally framed as civilian and scientific.
Gustavo G. Müller, Philip De Man
wiley +1 more source
Free-space continuous-variable quantum key distribution under high background noise
One of the difficulties in the application of quantum communication is the fragility of its encoded quantum states. Conventional quantum key distribution (QKD) requires strict filtering operations at the receiver.
Xue-Tao Zheng +4 more
doaj +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
There are several groups have implemented polarization encoding measurement-device-independent quantum key distribution (MDI-QKD). However, these groups use manual polarization controller to achieve the initial polarization state for encoders, and some ...
Yongjie Chen +7 more
doaj +1 more source

