搜索结果: 1-13 共查到“decoy”相关记录13条 . 查询时间(0.062 秒)
Setting up a decoy network may help deflect a hacker's hits
decoy network deflect a hacker hits
2016/9/29
Computer networks may never float like a butterfly, but Penn State information scientists suggest that creating nimble networks that can sense jabs from hackers could help deflect the stinging blows o...
Decoy-state quantum key distribution with biased basis choice
Decoy-state quantum distribution biased basis choice
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Source attack of decoy-state quantum key distribution using phase information
Source attack decoy-state quantum key distribution phase information
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Yao's millionaires' problem and decoy-based public key encryption by classical physics
Yao's millionaires' problem decoy-based cryptography computationally unbounded adversary
2016/1/9
We use various laws of classical physics to offer several solutions
of Yao’s millionaires’ problem without using any one-way functions.
We also describe several informationally secure public key enc...
In this survey, we discuss an emerging concept of decoybased
information security, or security without computational assumptions.
In particular, we show how this concept can be implemented
to provi...
Passive Decoy State Quantum Key Distribution with Coherent Light
Quantum communications Quantum cryptography Photon statistics.
2015/6/9
We propose a simple method for passive preparation of decoy states in quantum key distribution with coherent light. It involves linear optics together with a photo-detector. The performance is compara...
Passive scheme with a photon-number-resolving detector for decoy-state quantum key distribution with an untrusted source
photon-number-resolving decoy-state quantum
2010/3/10
A passive scheme with a photon-number-resolving (PNR) detector and a beam splitter which are used to monitor the statistical characteristics of photon source, is proposed to verify the security of vac...
CRE-decoy ODN对慢性吗啡诱导SK-N-SH细胞CCK及fosB mRNA表达上调的抑制作用
吗啡 SK-N-SH细胞 CRE-decoy oligodeoxynucleotide 胆囊收缩素 基因 fosB
2009/10/28
目的:研究以转录因子cAMP反应元件结合蛋白 (CREB) 为靶点的 CRE-decoy ODN对慢性吗啡诱导SK-N-SH细胞胆囊收缩素 (CCK) 及fosB mRNA表达上调的抑制作用。 方法: 体外合成含cAMP反应元件CRE 序列TGACGTCA的单链寡核苷酸,将自身杂交形成发卡结构。将终浓度为150 nmol/L的CRE-decoy ODN与SK-N-SH细胞孵育1 h后,加入终浓度为...
目的:探讨NF-κB “decoy”寡核苷酸(ODNs)对脂多糖(LPS)诱导小鼠巨噬细胞株J774.1表达IL-10的影响。方法: 通过体外细胞培养技术,观察转染NF-κB“decoy”ODNs对LPS刺激巨噬细胞产生IL-10及其表达的影响。结果: 在LPS刺激的巨噬细胞中转染NF-κB“decoy”ODNs对抗炎介质IL-10的合成表达无影响。结论: NF-κB“decoy”ODNs不抑制抗...
Multi-mode states in decoy-based quantum key distribution protocols
Multi-mode states decoy-based quantum key distribution protocols
2010/4/12
Every security analysis of quantum key distribution (QKD) relies on a faithful modeling of the employed quantum states. Many photon sources, like for instance a parametric down conversion (PDC) source...
Upper bounds for the secure key rate of decoy state quantum key distribution
Upper bounds secure key decoy state quantum key
2010/4/12
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signal...
Numerical analysis of decoy state quantum key distribution protocols
Numerical analysis decoy state quantum key distribution protocols
2010/4/7
Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In...