1 resultado para arrangements
em Universidad Politécnica de Madrid
Filtro por publicador
- Repository Napier (1)
- Aberystwyth University Repository - Reino Unido (2)
- Adam Mickiewicz University Repository (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (1)
- Aquatic Commons (23)
- Archive of European Integration (163)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (5)
- Aston University Research Archive (6)
- Biblioteca Digital da Câmara dos Deputados (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (2)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (30)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (9)
- Boston University Digital Common (3)
- Brock University, Canada (2)
- Bulgarian Digital Mathematics Library at IMI-BAS (3)
- CaltechTHESIS (3)
- Cambridge University Engineering Department Publications Database (27)
- CentAUR: Central Archive University of Reading - UK (3)
- Center for Jewish History Digital Collections (2)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (22)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (8)
- CORA - Cork Open Research Archive - University College Cork - Ireland (5)
- Cornell: DigitalCommons@ILR (1)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (1)
- Digital Commons at Florida International University (1)
- Digital Peer Publishing (1)
- DigitalCommons@University of Nebraska - Lincoln (1)
- DRUM (Digital Repository at the University of Maryland) (4)
- Duke University (7)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (12)
- Fachlicher Dokumentenserver Paedagogik/Erziehungswissenschaften (1)
- Gallica, Bibliotheque Numerique - Bibliothèque nationale de France (French National Library) (BnF), France (1)
- Greenwich Academic Literature Archive - UK (4)
- Helda - Digital Repository of University of Helsinki (30)
- Indian Institute of Science - Bangalore - Índia (51)
- Instituto Politécnico de Viseu (1)
- Massachusetts Institute of Technology (1)
- National Center for Biotechnology Information - NCBI (2)
- Nottingham eTheses (1)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (1)
- Portal de Revistas Científicas Complutenses - Espanha (1)
- QSpace: Queen's University - Canada (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (103)
- Queensland University of Technology - ePrints Archive (325)
- Repositório Alice (Acesso Livre à Informação Científica da Embrapa / Repository Open Access to Scientific Information from Embrapa) (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (3)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (5)
- Savoirs UdeS : plateforme de diffusion de la production intellectuelle de l’Université de Sherbrooke - Canada (1)
- Universidad del Rosario, Colombia (1)
- Universidad Politécnica de Madrid (1)
- Universidade de Lisboa - Repositório Aberto (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (2)
- Université de Montréal, Canada (1)
- University of Michigan (34)
- University of Queensland eSpace - Australia (5)
- WestminsterResearch - UK (1)
- Worcester Research and Publications - Worcester Research and Publications - UK (1)
Resumo:
The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed. It is assumed that the eavesdropper has full access to the channel so an unknown and untrusted source is assumed. To take into account the security of the BB84 protocol under collective attacks within the framework of quantum adversaries, a full treatment provides the well-known equations for the secure key rate. A numerical simulation keeping a minimum number of initial parameters constant as the total error sought and the number of pulses is carried out. The remaining parameters are optimized to produce the maximum secure key rate. Two main strategies are addressed: with and without two-decoy-states including the optimization of signal to decoy relationship.