ARTÍCULO
TITULO

Proof of Security of Quantum Key Distribution With Two-Way Classical Communications

Gottesman    
D. Lo    
H.-K.    

Resumen

No disponible

 Artículos similares

       
 
Xinyu Liu, Shan Ji, Xiaowan Wang, Liang Liu and Yongjun Ren    
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields of society and has set off a boom in the research and application of blockchain technology. However, blockchain technology faces t... ver más
Revista: Information

 
Abhay Singh, Ankush Ganesh, Rutuja Rajendra Patil, Sumit Kumar, Ruchi Rani and Sanjeev Kumar Pippal    
Voting is a democratic process that allows individuals to choose their leaders and voice their opinions. However, the current situation with physical voting involves long queues, paper-based ballots, and security challenges. Blockchain-based voting model... ver más

 
Joshua H. Tyler, Mohamed K. M. Fadul and Donald R. Reising    
Initially introduced almost thirty years ago for the express purpose of providing electronic warfare systems the capabilities to detect, characterize, and identify radar emitters, Specific Emitter Identification (SEI) has recently received a lot of atten... ver más
Revista: Information

 
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information

 
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis    
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ... ver más
Revista: Information