Results 51 to 60 of about 10,496 (211)

Thinking and feeling about novelty: How cognition and emotion shape investment in novel ideas

open access: yesStrategic Management Journal, EarlyView.
Abstract While prior research on the strategic framing of innovation highlights the cognitive mechanisms underlying novelty evaluation, we know little about the corresponding emotional mechanisms. Drawing on appraisal theory, construal level theory, and the literature on emotions, we theorize two distinct appraisal‐emotion pathways through which the ...
Matthew P. Mount   +3 more
wiley   +1 more source

Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded

open access: yesEntropy, 2019
An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (
Tom Vergoossen   +3 more
doaj   +1 more source

Quantum key distribution based on private states: unconditional security over untrusted channels with zero quantum capacity

open access: yes, 2007
We prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) [quant-ph/0309110] from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify
Horodecki, Karol   +4 more
core   +2 more sources

Model‐Based Systems Engineering in Space Applications: A Comprehensive Literature Review

open access: yesSystems Engineering, EarlyView.
ABSTRACT The growing complexity of space engineering is driving the demand to embrace the adoption of Model‐Based Systems Engineering (MBSE). Although the MBSE is well‐practiced in the space industry, the level of effort and need required to obtain the benefits of MBSE vastly differ across enterprises; this disparity presents a significant challenge to
Rehobot Bekele Buruso   +4 more
wiley   +1 more source

Quantum secure communication network architecture and mobile application solution

open access: yesDianxin kexue, 2018
As the first practical representative technology in the new quantum revolution,quantum key distribution (QKD) brings a promising solution to achieve long-term security guarantee,which has made series of progress from research to practical deployment and ...
Jianquan WANG   +4 more
doaj   +2 more sources

Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction

open access: yes, 2018
The method of improving the performance of continuous-variable quantum key distribution protocols by post-selection has been recently proposed and verified.
Guo, Hong   +4 more
core   +1 more source

Incremental Shifts, Strategic Orbits: The Evolution of EU Space Policy Through Gradual Security Linkages

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolution of European Union (EU) space policy through the lens of historical institutionalism, highlighting how security and defence considerations have been incrementally integrated into a domain originally framed as civilian and scientific.
Gustavo G. Müller, Philip De Man
wiley   +1 more source

Free-space continuous-variable quantum key distribution under high background noise

open access: yesnpj Quantum Information
One of the difficulties in the application of quantum communication is the fragility of its encoded quantum states. Conventional quantum key distribution (QKD) requires strict filtering operations at the receiver.
Xue-Tao Zheng   +4 more
doaj   +1 more source

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

All-Fiber and Calibration-Free Intrinsically Stable Polarization-Modulated Units for Measurement-Device-Independent Quantum Key Distribution

open access: yesIEEE Photonics Journal, 2023
There are several groups have implemented polarization encoding measurement-device-independent quantum key distribution (MDI-QKD). However, these groups use manual polarization controller to achieve the initial polarization state for encoders, and some ...
Yongjie Chen   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy