نتایج جستجو برای: QoT

تعداد نتایج: 69  

2008
Tianming Bu Hong Zhu

Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of secure quantum bit c...

2008
Tianming Bu Hong Zhu

Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of the secure quantum b...

2008
Tianming Bu Hong Zhu

Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of secure quantum bit c...

Journal: :Photonics 2023

It is essential to estimate the quality of transmission (QoT) lightpaths before their establishment for efficient planning and operation optical networks. Due nonlinear effect fibers, deployed influence QoT each other; thus, multi-channel estimation necessary, which provides complete information network optimization. Moreover, different interfering channels have effects on channel under test. H...

2011
Piero Castoldi Luca Valcarenghi

Current implementations of GMPLS protocol suite are unaware of optical signal physical impairments and quality of transmission. In this paper, we present an overview of different approaches for implementing QoT estimation and QoT measurements in transparent networks and for encompassing sparse regeneration information in translucent networks.

2017
Sandeep M. D'Souza Ragunathan Rajkumar

Emerging Cyber-Physical Systems (CPS) such as connected vehicles and smart cities span large geographical areas. These systems are increasingly distributed and interconnected. Hence, a hierarchy of cloudlet and cloud deployments will be key to enable scaling, while simultaneously hosting the intelligence behind these systems. Given that CPS applications are often safety-critical, existing techn...

Journal: :Investigative ophthalmology 1970
J O'Rourke C Benson

This study was done to determine whether newer in vitro methods for measurement of uveal tissue respiration would corroborate QOt values previously obtained using such in vivo methods as isolated organ perfusion or sampling of ocular arteries and veins in the anesthetized dog. A good correlation exists among QOt values found with each of these three methods involving both iridociliary and choro...

1996
Dominic Mayers

We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally security of this QKD protocol to a proof that a corresponding Quantum String Oblivious Transfer (String-QOT) protocol would be unconditionally secu...

2016
Christoph Bischoff-Everding Ruediger Soeder Benno Neukirch

OBJECTIVE To evaluate the economic and clinical benefits of endometrial radiofrequency ablation (RFA) compared with other ablation techniques for the treatment of menorrhagia. METHODS Using German health claims data, women meeting defined inclusion criteria for the intervention group (RFA) were selected. A comparable control group (other endometrial ablations) was established using propensity...

2003
Zhide Chen Hong Zhu

In the m-out-of-n oblivious transfer (OT) model, one party Alice sends n bits to another party Bob, Bob can get only m bits from the n bits. However, Alice cannot know which m bits Bob received. Y.Mu[12] and Naor[8] presented classical m-out-of-n oblivious transfer based on discrete logarithm. As the work of Shor [9], the discrete logarithm can be solved in polynomial time by quantum computers,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید