• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 930
  • 358
  • 270
  • 234
  • 128
  • 69
  • 64
  • 58
  • 46
  • 38
  • 34
  • 13
  • 12
  • 9
  • 9
  • Tagged with
  • 2711
  • 569
  • 397
  • 352
  • 286
  • 247
  • 242
  • 241
  • 238
  • 236
  • 234
  • 229
  • 222
  • 197
  • 197
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
471

NTRU over the Eisenstein Integers

Jarvis, Katherine 29 March 2011 (has links)
NTRU is a fast public-key cryptosystem that is constructed using polynomial rings with integer coefficients. We present ETRU, an NTRU-like cryptosystem based on the Eisenstein integers. We discuss parameter selection and develop a model for the probabilty of decryption failure. We also provide an implementation of ETRU. We use theoretical and experimental data to compare the security and efficiency of ETRU to NTRU with comparable parameter sets and show that ETRU is an improvement over NTRU in terms of security.
472

NTRU over the Eisenstein Integers

Jarvis, Katherine 29 March 2011 (has links)
NTRU is a fast public-key cryptosystem that is constructed using polynomial rings with integer coefficients. We present ETRU, an NTRU-like cryptosystem based on the Eisenstein integers. We discuss parameter selection and develop a model for the probabilty of decryption failure. We also provide an implementation of ETRU. We use theoretical and experimental data to compare the security and efficiency of ETRU to NTRU with comparable parameter sets and show that ETRU is an improvement over NTRU in terms of security.
473

日本的下一個重要產業 / Next Key Industries in Japan

河野宏, Kawano, Hiroshi Unknown Date (has links)
This paper refers to which industries Japan should develop for its growth in the future. The current key industries in Japan are Auto, Steel, and Electrical machinery. They generate more revenues than other different industries, and are surely the driving forces of the Japanese economy. In the last decades, however, they have been gradually losing their competitiveness in the global market. As the result of this, Japan has been stagnant last twenty years after having achieved great economical success. In this paper, three industries, Water related, Tourism, and Contents industries, are chosen as new key industries out of eight potential industries. Three conditions, vast scale of economy, future demand, and Japanese companies’ competitiveness, are regarded as the key factors for these new key industries to be chosen. These three industries will be the next driving forces for Japanese economy in the future.
474

On Free Space Quantum Key Distribution and its Implementation with a Polarization-Entangled Parametric Down Conversion Source

Erven, Chris 25 April 2007 (has links)
This thesis describes the deployment of a free-space quantum key distribution system across the University of Waterloo campus. The quantum key distribution system has the ability to provide unconditionally secure communication between two parties: Alice and Bob. The system exploits the quantum mechanical property of entanglement in order to generate a key. Security is then guaranteed by the No-Cloning theorem and the laws of quantum mechanics which prevent a quantum system from being measured without disturbing it. Polarization-entangled photon pairs are created using the non-linear optical process of type-II spontaneous parametric down-conversion. A free-space link of approximately $\mathrm{580~m}$ is used to distribute one-half of the pairs to Alice at a distant location, while the other half of the pairs are locally detected by Bob. The details of the detection apparatus necessary to measure the polarization of the photons and the software used to process the measurement data according to the BBM92 protocol are described. An experimental violation of the CHSH inequality (a derivative of the original Bell inequality) is demonstrated to show that polarization-entangled photon pairs are in fact being distributed to the two parties. Finally, the full BBM92 protocol is performed using the entangled photon pairs to generate a secure key and transmit an encrypted message between Alice and Bob. Currently, the system can only be operated at night because background light saturates the detectors during the day; however, future work will focus on making daylight operation feasible.
475

Squashing Models for Optical Measurements in Quantum Communication

Beaudry, Normand James January 2009 (has links)
Many protocols and experiments in quantum information science are described in terms of simple measurements on qubits. However, in an experimental implementation, the exact description of the measurement is usually more complicated. If there is a claim made from the results of an experiment by using the simplified measurement description, then do the claims still hold when the more realistic description is taken into account? We present a "squashing" model that decomposes the realistic measurement description into first a map, followed by a simplified measurement. The squashing model then provides a connection between a realistic measurement and an ideal measurement. If the squashing model exists for a given measurement, then all claims made about a measurement using the simplified description also apply to the complicated one. We give necessary and sufficient conditions to determine when this model exists. We show how it can be applied to quantum key distribution, entanglement verification, and other quantum communication protocols. We also consider several examples of detectors commonly used in quantum communication to determine if they have squashing models.
476

Change Management:Some preliminary key factors to succeed in leading people

LE JEAN, Pierre January 2011 (has links)
No description available.
477

On Free Space Quantum Key Distribution and its Implementation with a Polarization-Entangled Parametric Down Conversion Source

Erven, Chris 25 April 2007 (has links)
This thesis describes the deployment of a free-space quantum key distribution system across the University of Waterloo campus. The quantum key distribution system has the ability to provide unconditionally secure communication between two parties: Alice and Bob. The system exploits the quantum mechanical property of entanglement in order to generate a key. Security is then guaranteed by the No-Cloning theorem and the laws of quantum mechanics which prevent a quantum system from being measured without disturbing it. Polarization-entangled photon pairs are created using the non-linear optical process of type-II spontaneous parametric down-conversion. A free-space link of approximately $\mathrm{580~m}$ is used to distribute one-half of the pairs to Alice at a distant location, while the other half of the pairs are locally detected by Bob. The details of the detection apparatus necessary to measure the polarization of the photons and the software used to process the measurement data according to the BBM92 protocol are described. An experimental violation of the CHSH inequality (a derivative of the original Bell inequality) is demonstrated to show that polarization-entangled photon pairs are in fact being distributed to the two parties. Finally, the full BBM92 protocol is performed using the entangled photon pairs to generate a secure key and transmit an encrypted message between Alice and Bob. Currently, the system can only be operated at night because background light saturates the detectors during the day; however, future work will focus on making daylight operation feasible.
478

Squashing Models for Optical Measurements in Quantum Communication

Beaudry, Normand James January 2009 (has links)
Many protocols and experiments in quantum information science are described in terms of simple measurements on qubits. However, in an experimental implementation, the exact description of the measurement is usually more complicated. If there is a claim made from the results of an experiment by using the simplified measurement description, then do the claims still hold when the more realistic description is taken into account? We present a "squashing" model that decomposes the realistic measurement description into first a map, followed by a simplified measurement. The squashing model then provides a connection between a realistic measurement and an ideal measurement. If the squashing model exists for a given measurement, then all claims made about a measurement using the simplified description also apply to the complicated one. We give necessary and sufficient conditions to determine when this model exists. We show how it can be applied to quantum key distribution, entanglement verification, and other quantum communication protocols. We also consider several examples of detectors commonly used in quantum communication to determine if they have squashing models.
479

Study of realistic devices for quantum key-distribution

Narasimhachar, Varun January 2011 (has links)
Quantum key-distribution (QKD) is a scheme for establishing shared secret key between remote parties. In such a scheme, quantum preparation and measurement devices (sources and detectors) are used. In existing theoretical treatments of QKD, the device models used do not capture all the imperfections which might occur in realistic devices. This creates a gap between the practical implementations and theoretical descriptions of QKD. In the present work, we contribute in bridging this gap by three methods: 1) Advancing the study of squashing models of measurement devices, 2) Devising an alternative to squashing models using statistical estimation in optical QKD, and 3) Modifying the security proof formalism of QKD to account for imperfect devices.
480

Klivet in i hemmets trygga sfär : Mannen som hot och utopi hos Maria Sandel

Teglund, Matilda January 2012 (has links)
Denna uppsats har som syfte att undersöka hur mannen konstrueras hos Maria Sandel. Några noveller ur Vid svältgränsen och andra berättelser analyseras, liksom ett par kapitel ur Familjen Vinge, samt en episod ur Mannen som reste sig.Tesen är att mannen hos Sandel konstrueras i förhållande till hemmet. Vid detta kan man urskilja två roller. Den ena är mannen som sabotör, den andra är mannen som konstruktör. Mannen som konstruktör blir också, i sin kontext, till en utopi.Fokus för analysen är skötsamhetsbegreppet och hemmet. Dessutom diskuteras Ellen Keys inflytande över författarskapet och hur det yttrar sig i texterna. Slutsatsen är att Ellen Keys idéer är närvarande men att Sandel förhåller sig ambivalent till dem. Denna ambivalens kan i viss mån härledas till motsägelser hos Ellen Key själv. De utopiska mansrollerna, där mannen intar en omvårdande roll, utgör också exempel på detta.

Page generated in 0.0359 seconds