Results 101 to 110 of about 2,069,680 (303)

Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses

open access: yes, 2004
Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations.
A. S. Holevo   +10 more
core   +1 more source

Virtual or In‐Person: Does It Matter? Comparing Pain, Function, Quality of Life, Self‐Efficacy, and Physical Function Outcomes of Virtual, Hybrid, and In‐Person Education and Exercise Program Participants

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme   +7 more
wiley   +1 more source

Designing a Robust Quantum Signature Protocol Based on Quantum Key Distribution for E-Voting Applications

open access: yesMathematics
The rapid advancement of internet technology has raised attention to the importance of electronic voting in maintaining democracy and fairness in elections.
Sunil Prajapat   +4 more
doaj   +1 more source

A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System

open access: yesApplied Sciences, 2019
In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop.
Mutaz Y. Melhem, Laszlo B. Kish
doaj   +1 more source

Finite-key security against coherent attacks in quantum key distribution

open access: yes, 2010
The work by Christandl, K\"onig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols.
Acín A   +9 more
core   +1 more source

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, EarlyView.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie   +11 more
wiley   +1 more source

Kirchhoff meets Johnson: In pursuit of unconditionally secure communication

open access: yesEngineering Reports
Noise: an enemy to be dealt with and a major factor limiting communication system performance. However, what if there is gold in that garbage? In conventional engineering, our focus is primarily on eliminating, suppressing, combating, or even ignoring ...
Ertugrul Basar
doaj   +1 more source

Linear Subspace Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme [PDF]

open access: yesIranian Journal of Electrical and Electronic Engineering, 2023
Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes.
A. Rezapour, Z. Ahmadian
doaj  

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

Generalized Attack Protection in the Kirchhoff-Law-Johnson-Noise Secure Key Exchanger

open access: yesIEEE Access, 2016
The Kirchhoff-Law-Johnson-Noise unconditionally secure key exchanger is a promising, surprisingly simple, very low cost and efficient electronic alternative to quantum key distribution.
Gergely Vadai   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy