Results 101 to 110 of about 2,069,680 (303)
Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations.
A. S. Holevo +10 more
core +1 more source
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme +7 more
wiley +1 more source
The rapid advancement of internet technology has raised attention to the importance of electronic voting in maintaining democracy and fairness in elections.
Sunil Prajapat +4 more
doaj +1 more source
In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop.
Mutaz Y. Melhem, Laszlo B. Kish
doaj +1 more source
Finite-key security against coherent attacks in quantum key distribution
The work by Christandl, K\"onig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols.
Acín A +9 more
core +1 more source
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie +11 more
wiley +1 more source
Kirchhoff meets Johnson: In pursuit of unconditionally secure communication
Noise: an enemy to be dealt with and a major factor limiting communication system performance. However, what if there is gold in that garbage? In conventional engineering, our focus is primarily on eliminating, suppressing, combating, or even ignoring ...
Ertugrul Basar
doaj +1 more source
Linear Subspace Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme [PDF]
Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes.
A. Rezapour, Z. Ahmadian
doaj
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy +9 more
wiley +1 more source
Generalized Attack Protection in the Kirchhoff-Law-Johnson-Noise Secure Key Exchanger
The Kirchhoff-Law-Johnson-Noise unconditionally secure key exchanger is a promising, surprisingly simple, very low cost and efficient electronic alternative to quantum key distribution.
Gergely Vadai +2 more
doaj +1 more source

