Results 31 to 40 of about 3,117,544 (197)

Military and Technical Cooperation of Russia in System of National Security of the Country

open access: yesУправленческое консультирование, 2018
In the article, the role of the military and technical cooperation (MTC) of Russia with the foreign states in ensuring national security of the country is considered.
Igor Mikhailovich Levkin   +1 more
doaj   +1 more source

Political-military alliances in shaping the security of Poland in 1918-1939 [PDF]

open access: yesScientific Journal of the Military University of Land Forces, 2020
Poland was forming allied relations in the twenties and thirties of the twentieth century due to the state’s weakness, mainly in military and economic terms. The Polish state’s situation regarding political and military security guarantees on the part of
Zdzisław Cutter
doaj   +1 more source

A Hybrid Analysis for Security Protocols with State [PDF]

open access: yes, 2014
Cryptographic protocols rely on message-passing to coordinate activity among principals. Each principal maintains local state in individual local sessions only as needed to complete that session.
Dougherty, Daniel J.   +3 more
core   +3 more sources

Uncertainty Evaluation of Uranium Content Measurements by Redox Potential Titration Methods

open access: yesHe huaxue yu fangshe huaxue, 2023
Uranium content measurement is very important to nuclear material accounting and product quality control in nuclear bulk facilities. It needs high accuracy and precision.
TIAN Chuan   +10 more
doaj   +1 more source

Unconditional security at a low cost [PDF]

open access: yes, 2006
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\"{u}tkenhaus, and unconditional security analysis by ...
C. H. Bennett   +9 more
core   +3 more sources

Decoy State Quantum Key Distribution With Modified Coherent State

open access: yes, 2007
To beat PNS attack, decoy state quantum key distribution (QKD) based on coherent state has been studied widely. We present a decoy state QKD protocol with modified coherent state (MCS).
C. H. Bennett   +6 more
core   +1 more source

Security proof of a three-state quantum key distribution protocol without rotational symmetry [PDF]

open access: yes, 2006
Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry.
C. H. Bennett   +10 more
core   +2 more sources

Modernization of Institutional and Economic Management Tools for Environmental Safety of Enterprises

open access: yesIstanbul Management Journal
This study investigates the institutional and economic mechanisms employed for managing the environmental safety of enterprises in Ukraine and the European Union.
Arthur Amber
doaj   +1 more source

The United Nations and 21st century security challenges in Colombia

open access: yesRevista Científica General José María Córdova, 2021
Multifaceted 21st-century security challenges, such as terrorism, pandemics, illegal migration, and drug trafficking, permanently question the adequacy of both state and global organizations to guarantee general wellbeing, the rule of law, and the ...
Fredy Leonardo Galindo-García   +1 more
doaj   +1 more source

Measuring Entangled Qutrits and Their Use for Quantum Bit Commitment [PDF]

open access: yes, 2004
We produce and holographically measure entangled qudits encoded in transverse spatial modes of single photons. With the novel use of a quantum state tomography method that only requires two-state superpositions, we achieve the most complete ...
Bartlett, Stephen D.   +7 more
core   +2 more sources

Home - About - Disclaimer - Privacy