1 resultado para Collective Security
em Universidad Politécnica de Madrid
Filtro por publicador
- JISC Information Environment Repository (1)
- Repository Napier (1)
- Abertay Research Collections - Abertay University’s repository (1)
- Aberystwyth University Repository - Reino Unido (11)
- Adam Mickiewicz University Repository (3)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (1)
- Andina Digital - Repositorio UASB-Digital - Universidade Andina Simón Bolívar (2)
- Aquatic Commons (48)
- Archive of European Integration (6)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (5)
- Biblioteca Digital de la Universidad Católica Argentina (1)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (7)
- Boston College Law School, Boston College (BC), United States (1)
- Boston University Digital Common (3)
- Brock University, Canada (11)
- CaltechTHESIS (2)
- Cambridge University Engineering Department Publications Database (29)
- Carolina Law Scholarship Repository (1)
- CentAUR: Central Archive University of Reading - UK (2)
- Center for Jewish History Digital Collections (3)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (26)
- Cochin University of Science & Technology (CUSAT), India (9)
- CORA - Cork Open Research Archive - University College Cork - Ireland (4)
- Cornell: DigitalCommons@ILR (5)
- Dalarna University College Electronic Archive (1)
- Digital Commons at Florida International University (1)
- Diposit Digital de la UB - Universidade de Barcelona (5)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (2)
- DRUM (Digital Repository at the University of Maryland) (2)
- Duke University (4)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (3)
- Funes: Repositorio digital de documentos en Educación Matemática - Colombia (1)
- Gallica, Bibliotheque Numerique - Bibliothèque nationale de France (French National Library) (BnF), France (53)
- Greenwich Academic Literature Archive - UK (3)
- Helda - Digital Repository of University of Helsinki (16)
- Indian Institute of Science - Bangalore - Índia (31)
- Instituto Politécnico do Porto, Portugal (4)
- Ministerio de Cultura, Spain (2)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (2)
- Portal de Revistas Científicas Complutenses - Espanha (2)
- QSpace: Queen's University - Canada (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (158)
- Queensland University of Technology - ePrints Archive (328)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (2)
- Research Open Access Repository of the University of East London. (5)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (3)
- SAPIENTIA - Universidade do Algarve - Portugal (2)
- Universidad Autónoma de Nuevo León, Mexico (1)
- Universidad del Rosario, Colombia (11)
- Universidad Politécnica de Madrid (1)
- Universidade Federal do Pará (1)
- Universitat de Girona, Spain (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (19)
- Université de Lausanne, Switzerland (1)
- Université de Montréal, Canada (67)
- University of Michigan (1)
- University of Southampton, United Kingdom (28)
- University of Washington (1)
- WestminsterResearch - UK (11)
- Worcester Research and Publications - Worcester Research and Publications - UK (1)
Resumo:
The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed. It is assumed that the eavesdropper has full access to the channel so an unknown and untrusted source is assumed. To take into account the security of the BB84 protocol under collective attacks within the framework of quantum adversaries, a full treatment provides the well-known equations for the secure key rate. A numerical simulation keeping a minimum number of initial parameters constant as the total error sought and the number of pulses is carried out. The remaining parameters are optimized to produce the maximum secure key rate. Two main strategies are addressed: with and without two-decoy-states including the optimization of signal to decoy relationship.