>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-14 共查到eavesdropping相关记录14条 . 查询时间(0.212 秒)
The ability to identify emotional arousal in heterospecific vocalizations may facilitate behaviors that increase survival opportunities. Crucially, this ability may orient inter-species interactions, ...
There have been many efforts to strengthen security of Instant Messaging (IM) system. One of the typical technologies is the conventional message encryption using a secret or private key. However, the...
What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators can not detect the eavesdropping. The gene...
The famous BB84 protocol relies on the conjugate bases $Z=\{|0\rangle$, $|1\rangle\}$ and $X=\left\{|+\rangle,|-\rangle\right\}$, where $|+\rangle = \frac{|0 \rangle + |1\rangle}{\sqrt{2}}$ and $|-\ra...
The famous BB84 protocol relies on the conjugate bases $Z=\{|0\rangle$, $|1\rangle\}$ and $X=\left\{|+\rangle,|-\rangle\right\}$, where $|+\rangle = \frac{|0 \rangle + |1\rangle}{\sqrt{2}}$ and $|-\ra...
The stated goal of quantum key distribution (QKD) is to grow a secret key securely between two parties with a minimum of additional assumptions. The number of assumptions has been continuously reduced...
We address the problem of securing distributed storage systems against eavesdropping and adversarial attacks. An important aspect of these systems is node failures over time, ecessitating, thus, a rep...
We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious errors. We provide polynomial-tim...
On 16 December 2005, the New York Times reported that the President had authorized the National Security Agency (NSA) to spy on Americans, inside the United States, without first obtaining a warrant f...
We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Physics 4, 726 (2008)]. This protocol consists in a two-way quantum communication betwee...
We find a resonance behavior in the disturbance when an eavesdropper chooses a near-optimal strategy intentionally or unintentionally when the usual Bennett-Brassard cryptographic scheme is performed ...
Eavesdropping on ET?     Astrophysics  Meeting       2007/2/6
SEATTLE -- On Wednesday, January 10, here at the American Astronomical Society Meeting, theorist Dr. Avi Loeb from Harvard Smithsonian Center for Astrophysics led a press conference on the search for ...
Music and speech both feature structured melodic patterns, yet these patterns are rarely compared using empirical methods. One reason for this has been a lack of tools which allow quantitative compa...
The composer Leo􀀅 Janá􀀆ek (1854-1928) has been noted for his interest in speech melodies. Little discussion has focused however on the field methods that he used in gathering them,...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...