Search results for: SECURE CORRELATIONS - Bridge of Knowledge

Search

Search results for: SECURE CORRELATIONS

Filters

total: 2124
filtered: 1520

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: SECURE CORRELATIONS

  • Experimental Extraction of Secure Correlations from a Noisy Private State

    Publication
    • K. Dobek
    • M. Karpiński
    • R. Demkowicz-Dobrzański
    • K. Banaszek
    • P. Horodecki

    - PHYSICAL REVIEW LETTERS - Year 2011

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...

    Full text available to download

  • The concept of smart and secure laboratory.

    Publication

    - Year 2004

    W chwili obecnej, w erze globalizacji istnieje niezbędna konieczność rozwoju struktur gwarantujących zapewnienie bezpieczeństwa dla zasadniczych wyzwań stawianych przed ludzkością. Stąd potrzeba ujęcia aspektu bezpieczeństwa w kategoriach globalnych. Instytucje akademickie dostosowują się w tym zakresie stosunkowo szybko i zaczynają wyznaczać nowe trendy oraz prowadzą współpracę z instytucjami pozaakademickimi. Tego typu kooperacja,...

  • Global defensive secure structures

    Publication

    Let S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...

    Full text to download in external service

  • Secure Italian domination in graphs

    Publication

    - JOURNAL OF COMBINATORIAL OPTIMIZATION - Year 2021

    An Italian dominating function (IDF) on a graph G is a function f:V(G)→{0,1,2} such that for every vertex v with f(v)=0, the total weight of f assigned to the neighbours of v is at least two, i.e., ∑u∈NG(v)f(u)≥2. For any function f:V(G)→{0,1,2} and any pair of adjacent vertices with f(v)=0 and u with f(u)>0, the function fu→v is defined by fu→v(v)=1, fu→v(u)=f(u)−1 and fu→v(x)=f(x) whenever x∈V(G)∖{u,v}. A secure Italian dominating...

    Full text available to download

  • Secure key from bound entanglement

    Publication

    - Year 2005

    Scharakteryzowaliśmy zestaw dzielonych kwantowych stanów, który zawiera kryptograficznie prywatny klucz. Pozwala nam to przerobić teorię prywatności jako paradygmat blisko związany z tą, która jest używana w manipulacjach splątania.

  • Approaching Secure Industrial Control Systems

    Publication

    This study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...

    Full text available to download

  • The conception of secure and efficient process of migration into IPv6

    Ze względu na wady rozwiązań opartych o tunelowanie, w pracy zaproponowano koncepcję przejścia z IPv4 do IPv6 nie wymagającą od dostawców usług internetowych wzajemnej współpracy, nie narażoną na ataki związane z przekaźnikami, wzajemnym zaufaniem ISP. W koncepcji tej ograniczono tunelowanie do obszaru jednego ISP. W pracy wskazano istotne elementy ograniczające możliwość i zasadność wprowadzania mechanizmów tunelowania. Wskazano...

  • Secure Quaternion Feistel Cipher for DICOM Images

    An improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...

    Full text to download in external service

  • The methods of secure data transmission in the KNX system

    The article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.

    Full text to download in external service

  • Edge-Computing based Secure E-learning Platforms

    Publication

    - Year 2022

    Implementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...

    Full text available to download

  • The secure transmission protocol of sensor Ad Hoc network

    The paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

    Full text to download in external service

  • Are quantum correlations symmetric?

    Publication

    - QUANTUM INFORMATION & COMPUTATION - Year 2010

    We provide operational definition of symmetry of entanglement: An entangled state contains symmetric entanglement if its subsystems can be exchanged (swapped) by means of local operations and classical communication. We show that in general states have asymmetric entanglement. This allows to construct nonsymmetric measure of entanglement, and a parameter that reports asymmetry of entanglement contents of quantum state. We propose...

    Full text available to download

  • W-like bound entangled states and secure key distillation

    Publication

    We construct multipartite entangled states with underlying W-type structuresatisfying positive partial transpose (PPT) condition under any (N −1)|1 partition. Then we showhow to distill a N-partite secure key from the states using two different methods: direct applicationof local filtering and novel random key distillation scheme in which we adopt the idea from recentresults on entanglement distillation. Open problems and possible...

    Full text to download in external service

  • A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise

    Publication

    Without a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...

  • Quantum states representing perfectly secure bits are always distillable

    Publication

    W pracy pokazano, że ostatnio wprowadzone stany kwantowe reprezentujące perfekcyjnie bezpieczny bit klucza kryptograficznegooraz ich wielocząstkowe i wielowymiarowe uogólnienia zawsze reprezentują destylowalne splątanie. Podano ograniczenia dolne na wielkość destylowalnego splątania. Ponadto podano alternatywny dowód faktu, że koszt splątania jest ograniczeniem górnym na wielkość destylowalnego klucza kryptograficznego w dwucząstkowym...

    Full text available to download

  • Secure transmission of visual image in the VTS system using fingerprinting

    Publication

    Full text available to download

  • Hybrid no-signaling-quantum correlations

    Publication

    - NEW JOURNAL OF PHYSICS - Year 2022

    Fundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...

    Full text available to download

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • Broadcast copies reveal the quantumness of correlations

    Publication

    - PHYSICAL REVIEW A - Year 2009

    We study the quantumness of bipartite correlations by proposing a quantity that combines a measure of total correlations-mutual information-with the notion of broadcast copies-i.e., generally nonfactorized copies-of bipartite states. By analyzing how our quantity increases with the number of broadcast copies, we are able to classify classical, separable, and entangled states. This motivates the definition of the broadcast regularization...

    Full text available to download

  • Conjectured strong complementary-correlations tradeoff

    Publication
    • A. Grudka
    • M. Horodecki
    • P. Horodecki
    • R. Horodecki
    • W. Kłobus
    • Ł. Pankowski

    - PHYSICAL REVIEW A - Year 2013

    We conjecture uncertainty relations that restrict correlations between the results of measurements performed by two separate parties on a shared quantum state. The first uncertainty relation bounds the sum of two mutual informations when one party measures a single observable and the other party measures one of two observables. The uncertainty relation does not follow from the Maassen-Uffink uncertainty relation and is much stronger...

    Full text available to download

  • Bipartite correlations in quantum resonance states

    Publication

    Full text to download in external service

  • Thermodynamical approach to quantifying quantum correlations

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2002

    We consider the amount of work which can be extracted from a heat bath using a bipartite state ρ shared by two parties. In general it is less then the amount of work extractable when one party is in possession of the entire state. We derive bounds for this “work deficit” and calculate it explicitly for a number of different cases. In particuar, for pure states the work deficit is exactly equal to the distillable entanglement of...

    Full text to download in external service

  • Postulates for measures of genuine multipartite correlations

    Publication

    - PHYSICAL REVIEW A - Year 2011

    A lot of research has been done on multipartite correlations. However, it seems strange thatthere is no denition of so called genuine multipartite correlations. In this paper we propose threereasonable postulates which each measure or indicator of genuine multipartite correlations (or gen-uine multipartite entanglement) should satisfy. We also introduce degree of correlations which givespartial characterization of multipartite...

    Full text available to download

  • Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange

    Publication

    The Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...

    Full text available to download

  • Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile

    Publication

    The paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...

    Full text to download in external service

  • Secured wired BPL voice transmission system

    Publication

    - Scientific Journal of the Military University of Land Forces - Year 2020

    Designing a secured voice transmission system is not a trivial task. Wired media, thanks to their reliability and resistance to mechanical damage, seem an ideal solution. The BPL (Broadband over Power Line) cable is resistant to electricity stoppage and partial damage of phase conductors, ensuring continuity of transmission in case of an emergency. It seems an appropriate tool for delivering critical data, mostly clear and understandable...

    Full text available to download

  • Correlation Effects in the Moshinsky Model

    Publication

    - FEW-BODY SYSTEMS - Year 2013

    Full text to download in external service

  • Quantum correlations in one-dimensional Wigner molecules

    Publication

    Full text to download in external service

  • No-local-broadcasting theorem for multipartite quantum correlations

    Publication

    We prove that the correlations present in a multipartite quantum state have an operational quantum character even if the state is unentangled, as long as it does not simply encode a multipartite classical probability distribution. Said quantumness is revealed by the new task of local broadcasting, i.e., of locally sharing preestablished correlations, which is feasible if and only if correlations are stricly classical. Our operational...

    Full text to download in external service

  • The correlation-bound anion of p-chloroaniline

    Publication
    • S. Ciborowski
    • R. Harris
    • G. Liu
    • C. Martinez-Martinez
    • P. Skurski
    • K. Bowen

    - JOURNAL OF CHEMICAL PHYSICS - Year 2019

    Full text to download in external service

  • Correlation experiments in nonlinear quantum mechanics

    Publication

    - PHYSICS LETTERS A - Year 2002

    Pokazano w jaki sposób należy obliczać wieloczasowe i wielocząstkowe funkcje korelacyjne w nieliniowej mechanice kwantowej, aby zagwarantować lokalność formalizmu.

    Full text available to download

  • Objectivization of Audio-Visual Correlation analysis

    Publication

    Simultaneous perception of audio and visual stimuli often causes the concealment or misrepresentation of information actually contained in these stimuli. Such effects are called the ''image proximity effect'' or the ''ventriloquism effect'' in literature. Until recently, most research carried out to understand their nature was based on subjective assessments. The Authors of this paper propose a methodology based on both subjective...

    Full text available to download

  • Anomalous decay of quantum correlations of quantum-dot qubits

    Publication

    - PHYSICAL REVIEW A - Year 2013

    We study the evolution of quantum correlations, quantified by the geometric discord, of two excitonic quantum-dot qubits under the influence of the phonon environment. We show that the decay of these correlations differs substantially from the decay of entanglement. Instead of displaying sudden-death-type behavior, the geometric discord shows a tendency to undergo transitions between different types of decay, is sensitive to nonlocal...

    Full text available to download

  • Quantum Correlations of a Few Bosons within a Harmonic Trap

    Publication

    Full text to download in external service

  • Two-Boson Correlations in Various One-Dimensional Traps

    Publication

    - FEW-BODY SYSTEMS - Year 2009

    Full text to download in external service

  • Role of electronic correlations in the transport characteristics of molecular junctions

    Publication
    • T. Kostyrko
    • B. Bułka

    - PHYSICA B-CONDENSED MATTER - Year 2006

    Full text to download in external service

  • All Nonclassical Correlations Can Be Activated into Distillable Entanglement

    Publication
    • M. Piani
    • S. Gharibian
    • G. Adesso
    • J. Calsamigilia
    • P. Horodecki
    • A. Winter

    - PHYSICAL REVIEW LETTERS - Year 2011

    We devise a protocol in which general nonclassical multipartite correlations produce a physically relevant effect, leading to the creation of bipartite entanglement. In particular, we show that the relative entropy of quantumness, which measures all nonclassical correlations among subsystems of a quantum system, is equivalent to and can be operationally interpreted as the minimum distillable entanglement generated between the system...

    Full text to download in external service

  • Correlations between organic pollution indicators in municipal wastewater

    Publication
    • T. Siwiec
    • L. Reczek
    • M. M. Michel
    • B. Gut
    • P. Hawer-Strojek
    • J. Czajkowska
    • K. Jóźwiakowski
    • M. Gajewska
    • P. Bugajski

    - Archives of Environmental Protection - Year 2018

    The paper presents the results of a study of parameters used for determining the amount of organic pollutants in wastewater flowing into a collective wastewater treatment plant with a population equivalent of about 120 000 PE. The plant constituted part of a sewage system. Assays were performed for biochemical oxygen demand (BOD5), chemical oxygen demand (CODCr), permanganete index (CODMn) and total organic carbon (TOC). In addition,...

    Full text available to download

  • Free randomness amplification using bipartite chain correlations

    Publication
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • M. Pawłowski
    • R. Ramanathan

    - PHYSICAL REVIEW A - Year 2014

    A direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...

    Full text available to download

  • BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster

    Integrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...

    Full text to download in external service

  • Machinery for severe climate conditions

    Publication

    - Year 2008

  • Extending loophole-free nonlocal correlations to arbitrarily large distances

    Publication

    - npj Quantum Information - Year 2024

    Quantum theory allows spatially separated observers to share nonlocal correlations, which enable them to accomplish classically inconceivable information processing and cryptographic feats. However, the distances over which nonlocal correlations can be realized remain severely limited due to their high fragility to noise and high threshold detection efficiencies. To enable loophole- free nonlocality across large distances, we introduce...

    Full text available to download

  • The influence of intermolecular correlations on the infrared spectrum of liquid dimethyl sulfoxide

    Dimethyl sulfoxide (DMSO) is routinely applied as an excellent, water-miscible solvent and chemical reagent. Some of the most important data concerning its liquid structure were obtained using infrared (IR) spectroscopy. However, the actual extent of intermolecular correlations that connect the isolated monomer spectrum to the IR response of the bulk liquid is poorly studied thus far. Using ab initio molecular dynamics (AIMD) simulations,...

    Full text available to download

  • Can Communication Power of Separable Correlations Exceed That of Entanglement Resource?

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    The scenario of remote state preparation with a shared correlated quantum state and one bit of forward communication [B. Dakić et al., Nat. Phys. 8, 666 (2012)] is considered. Optimization of the transmission efficiency is extended to include general encoding and decoding strategies. The importance of the use of linear fidelity is recognized. It is shown that separable states cannot exceed the efficiency of entangled states by...

    Full text to download in external service

  • Objectivization of audio-video correlation assessment experiments

    Publication

    - Year 2010

    The purpose of this paper is to present a new method of conducting an audio-visual correlation analysis employing a head-motion-free gaze tracking system. First, a review of related works in the domain of sound and vision correlation is presented. Then assumptions concerning audio-visual scene creation are shortly described. The objectivization process of carrying out correlation tests employing gaze-tracking system is outlined....

    Full text to download in external service

  • Sensitivity study of correlation for flow boiling in tubes.

    Publication

    W referacie skupiono uwagę na szczegółowym zbadaniu wpływu wybranych typów modeli, opisujących współczynnik oporu przepływu oraz współczynnik przejmowania ciepła dla wrzenia w przepływie na korelację dla wrzenia w przepływie ( wyprowadzoną dla rur o konwencjonalnych wymiarach -półempiryczny model Mikielewicza ). Otrzymane wyniki porównano z danymi eksperymentalnymi.

  • An new method of audio-visual correlation analysis

    Publication

    - Year 2009

    This paper presents a new methodology of conducting the audio-visual correlation analysis employing the gaze tracking system. Interaction between two perceptual modalities, seeing and hearing, their interaction and mutual reinforcement in a complex relationship was a subject of many research studies. Earlier stage of the carried out experiments at the Multimedia Systems Department (MSD) showed that there exists a relationship between...

    Full text to download in external service

  • Correlation between shape errors in flat grinding

    Publication

    W pracy przedstawiono wyniki badań eksperymentalnych i symulacyjnych związanych z wpływem błędów kształtu narzędzia na błędy ksztaltu przedmiotu szlifowanego w układzie docierarki jednotarczowej. Szlifowanie realizowane było z wykorzystaniem specjalnych narzędzi z możliwością regulacji przekroju promieniowego.

    Full text available to download

  • Distributed measurement system with data transmission secured using XXTEA algorithm

    Publication

    - Przegląd Elektrotechniczny - Year 2016

    The paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...

    Full text available to download

  • Electronic correlations in coherent transport through a two quantum dot system

    Publication

    - PHYSICAL REVIEW B - Year 2004

    Full text to download in external service