搜索结果: 1-8 共查到“物理学 Protocols”相关记录8条 . 查询时间(0.14 秒)
Critical Metadata Protocols in Hyperspectral Field Campaigns for Building Robust Hyperspectral Datasets
Databases Data mining Hyperspectral, Metadata Calibration Data Quality Interoperability Standards
2014/4/25
Field spectroscopic metadata is a central component in the quality and reliability of hyperspectral data and the products derived from it. The impact of the quantity and format of metadata created at ...
Optically Levitating Dielectrics in the Quantum Regime: Theory and Protocols
Optically Levitating Dielectrics Quantum Regime Theory Protocols
2010/11/5
We provide a general quantum theory to describe the coupling of light with the motion of a dielectric object inside a high finesse optical cavity. In particular, we derive the total Hamiltonian of the...
Insecurity of position-based quantum cryptography protocols against entanglement attacks
Insecurity position-based quantum cryptography protocols entanglement attacks
2010/10/19
Recently, position-based quantum cryptography has been claimed to be unconditionally secure.
On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in ...
On the Existence of Loss-Tolerant Quantum Oblivious Transfer Protocols
Existence Loss-Tolerant Quantum Oblivious Transfer Protocols
2010/10/20
Oblivious Transfer is the cryptographic primitive where Alice sends one of two bits to Bob but is oblivious to the bit received. Using quantum communication we can build oblivious transfer protocols w...
Optimal Protocols for Nonlocality Distillation
Nonlocality Nonlocal Boxes NLBs Distillation Quantum Information
2010/10/19
Forster, Winkler, and Wolf recently showed that weak nonlocality can be amplified by giving the
first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)].We ...
nse-Coding Attack on Three-Party Quantum Key Distribution Protocols
nse-Coding Attack Three-Party Quantum Key Distribution Protocols
2010/10/19
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key d...
Multi-mode states in decoy-based quantum key distribution protocols
Multi-mode states decoy-based quantum key distribution protocols
2010/4/12
Every security analysis of quantum key distribution (QKD) relies on a faithful modeling of the employed quantum states. Many photon sources, like for instance a parametric down conversion (PDC) source...
Numerical analysis of decoy state quantum key distribution protocols
Numerical analysis decoy state quantum key distribution protocols
2010/4/7
Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In...