Military and Technical Cooperation of Russia in System of National Security of the Country
In the article, the role of the military and technical cooperation (MTC) of Russia with the foreign states in ensuring national security of the country is considered.
Igor Mikhailovich Levkin +1 more
doaj +1 more source
Political-military alliances in shaping the security of Poland in 1918-1939 [PDF]
Poland was forming allied relations in the twenties and thirties of the twentieth century due to the state’s weakness, mainly in military and economic terms. The Polish state’s situation regarding political and military security guarantees on the part of
Zdzisław Cutter
doaj +1 more source
A Hybrid Analysis for Security Protocols with State [PDF]
Cryptographic protocols rely on message-passing to coordinate activity among principals. Each principal maintains local state in individual local sessions only as needed to complete that session.
Dougherty, Daniel J. +3 more
core +3 more sources
Uncertainty Evaluation of Uranium Content Measurements by Redox Potential Titration Methods
Uranium content measurement is very important to nuclear material accounting and product quality control in nuclear bulk facilities. It needs high accuracy and precision.
TIAN Chuan +10 more
doaj +1 more source
Unconditional security at a low cost [PDF]
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\"{u}tkenhaus, and unconditional security analysis by ...
C. H. Bennett +9 more
core +3 more sources
Decoy State Quantum Key Distribution With Modified Coherent State
To beat PNS attack, decoy state quantum key distribution (QKD) based on coherent state has been studied widely. We present a decoy state QKD protocol with modified coherent state (MCS).
C. H. Bennett +6 more
core +1 more source
Security proof of a three-state quantum key distribution protocol without rotational symmetry [PDF]
Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry.
C. H. Bennett +10 more
core +2 more sources
Modernization of Institutional and Economic Management Tools for Environmental Safety of Enterprises
This study investigates the institutional and economic mechanisms employed for managing the environmental safety of enterprises in Ukraine and the European Union.
Arthur Amber
doaj +1 more source
The United Nations and 21st century security challenges in Colombia
Multifaceted 21st-century security challenges, such as terrorism, pandemics, illegal migration, and drug trafficking, permanently question the adequacy of both state and global organizations to guarantee general wellbeing, the rule of law, and the ...
Fredy Leonardo Galindo-García +1 more
doaj +1 more source
Measuring Entangled Qutrits and Their Use for Quantum Bit Commitment [PDF]
We produce and holographically measure entangled qudits encoded in transverse spatial modes of single photons. With the novel use of a quantum state tomography method that only requires two-state superpositions, we achieve the most complete ...
Bartlett, Stephen D. +7 more
core +2 more sources

