نتایج جستجو برای: کد alice

تعداد نتایج: 12588  

Journal: :American Anthropologist 1923

Journal: :Nature Methods 2017

Journal: :EPJ Web of Conferences 2013

Journal: :Acta Physica Polonica B 2014

2009
Philip Brunetti

This paper studies the mapping g → g 2 (mod p) by showing that it inherits its structure from the mapping x → x (mod ordp(g)). We first explore the context in which this mapping is important; specifically, we consider the Diffie-Hellman protocol, Diffie-Hellman problem, and the various problems that have spawned from these including the discrete logarithm and square exponent problems. We then d...

2011
Peter Høyer Jibran Rashid

Nonlocal boxes (NLBs) are devices that are used to generate correlated bits between two spatially separated parties. If the generated correlation is weak, it can sometimes be distilled into a stronger correlation by repeated applications of the nonlocal box. We initiate here a study of the distillation of correlations for nonlocal boxes that output quantum states rather than classical bits. We ...

2010
Pushkar Tripathi

Encryption in which “your name is your public key” is called Identity-Based Encryption (IBE). Shamir’s original motivation for identity-based encryption was to simplify the management of public keys. Frequently, this process can be unwieldy because of the following problem: if Bob obtains Alice’s public key over the network, how does Bob know that the key really belongs to Alice, and not to a m...

Journal: :Physical review. D, Particles and fields 1995
Dvali Senjanovic

We show that in certain theories with topologically trivial quotient space of spontaneously broken gauge symmetry there can exist topologically stable strings that carry nonabelian gauge flux. These objects result from the “accidental” global degeneracy of the vacuum which makes it topologically nontrivial. In particular, some models contain the semiglobal analog of the Alice strings. ∗Permanen...

2004
D. Evans S. Fedor I. Kralik G. T. Jones P. Jovanovic A. Jusko R. Lietava L. Sandor J. Urban O. Villalobos-Baillie

The ALICE Trigger System is made up of two independent parts: a Central Trigger Processor (CTP) and a Trigger Distribution Network. The CTP provides the trigger decision logic. It generates triggers for the readout detectors by evaluating inputs from triggering detectors. The Trigger Distribution Network delivers these triggers to the detectors; in addition it is capable of running in standalon...

2012
David Willetts

Access to journal content has been central to the open access (OA) debate. The European Commission has focused on ‘access and preservation’ in its planning for Horizon 2020; in the UK the Department of Business, Innovation and Skills (BIS) has set up the Finch Group (an independent working group that emerged from discussions at a round table meeting on transparency with the Rt Hon David Willett...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید