Security of plug-and-play QKD arrangements with finite resources
نویسندگان
چکیده
منابع مشابه
Security of plug-and-play QKD arrangements with finite resources
The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed. It is assumed that the eavesdropper has full access to the channel so an unknown and untrusted source is assumed. To take into account the security of the BB84 protocol under collective attacks within the framework of quantum adversaries, a full treatment provides the well-known eq...
متن کاملکنترل توان منابع تولید پراکنده با قابلیت plug and play
در دو دهه گذشته، مسائلی مانند گرمایش زمین و آلودگی هوا و از طرف دیگر افزایش تقاضا برای انرژی برق، دست اندرکاران و تصمیم گیرندگان صنعت برق را براین داشته که به سوی تولید انرژی برق از منابع انرژی تجدید پذیر مانند انرژی خورشیدی، بادی و همچنین تکنولوژی های جدیدتر مانند پیل های سوختی گام بردارند. در این پایان نامه کنترل توان منابع تولید پراکنده مورد بررسی قرار گرفته است. کنترل توان پیل سوختی متصل به...
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI
We present the Plug-and-Play IP Security (PnP-IPsec) protocol. PnP-IPsec automatically establishes IPsec security associations between gateways, avoiding the need for manual administration and coordination between gateways, and the dependency on IPsec public key certificates the two problems which are widely believed to have limited the use of IPsec mostly to intra-organization communication. P...
متن کاملTRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis
Existing methods for security risk analysis typically estimate time, cost, or likelihood of success of attack steps. When the threat environment changes, such values have to be updated as well. However, the estimated values reflect both system properties and attacker properties: the time required for an attack step depends on attacker skill as well as the strength of a particular system compone...
متن کاملPlug-and-play Features
We propose a feature construct for deening features, and use it to provide a plug-and-play framework for exploring feature interactions. Our approach to the feature interaction problem has the following characteristics: Features are treated as rst-class objects during the development phase; A method for integrating a feature into a system description is described. It allows features to override...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Quantum Information and Computation
سال: 2013
ISSN: 1533-7146,1533-7146
DOI: 10.26421/qic13.9-10-8