منابع مشابه
Values and the Quantum Conception of Man
Classical mechanics is based upon a mechanical picture of nature that is fundamentally incorrect It has been replaced at the basic level by a radically di erent theory quantum mechanics This change entails an enormous shift in our basic conception of nature one that can profoundly alter the scienti c image of man himself Self image is the foundation of values and the replacement of the mechanis...
متن کاملQuantum password authentication against man-in-the-middle attack
Authentication with recently proposed quantum password protocol is secure against impersonation. Here we show that original version of the protocol is not secure against active malicious prover and verifier, however a slight modification provides a possibility for a legitimate party to detect the attacks. The password is reusable in the absence of the attacks. Otherwise the security of the auth...
متن کاملValues and the Quantum Conception of Man * Disclaimer
Classical mechanics is based upon a mechanical picture of nature that is fundamentally incorrect. It has been replaced at the basic level by a radically different theory: quantum mechanics. This change entails an enormous shift in our basic conception of nature, one that can profoundly alter the scientific image of man himself. Self-image is the foundation of values, and the replacement of the ...
متن کاملThe Man as a Quantum-wave Psychosomatic System
The author considers the Man from a position of the theory of wave–particle duality of a matter. It has opened existence in a nature of ways of interaction and information interchange between genes, cells, persons, about which we did not suspect or knew a little. The concept of duality has allowed understanding the riches of the information contained in the man that has enabled to consider him ...
متن کاملDefeating Man-in-the-Middle Attack in Quantum Key Distribution
Quantum cryptosystems use some properties of quantum mechanics to create secret shared cryptographic keys that remain secret even against an eavesdropper with an access to unlimited computational power. All quantum key distribution (QKD) protocols require that the parties have access to an authentic channel. Otherwise, QKD is vulnerable to man-in-the-middle attacks. This paper studies QKD from ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: STEAM
سال: 2013
ISSN: 2327-2074
DOI: 10.5642/steam.201301.20