1 resultado para rental arrangements
em Universidad Politécnica de Madrid
Filtro por publicador
- Academic Research Repository at Institute of Developing Economies (2)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (1)
- Andina Digital - Repositorio UASB-Digital - Universidade Andina Simón Bolívar (1)
- Archive of European Integration (169)
- Aston University Research Archive (6)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (2)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (37)
- Biblioteca Virtual del Sistema Sanitario Público de Andalucía (BV-SSPA), Junta de Andalucía. Consejería de Salud y Bienestar Social, Spain (1)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (10)
- Brock University, Canada (12)
- Bulgarian Digital Mathematics Library at IMI-BAS (3)
- CentAUR: Central Archive University of Reading - UK (138)
- CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal (2)
- Cochin University of Science & Technology (CUSAT), India (4)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (8)
- Consorci de Serveis Universitaris de Catalunya (CSUC), Spain (46)
- Dalarna University College Electronic Archive (7)
- Deposito de Dissertacoes e Teses Digitais - Portugal (1)
- Digital Archives@Colby (2)
- Digital Commons at Florida International University (1)
- Digital Peer Publishing (1)
- DigitalCommons@University of Nebraska - Lincoln (2)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (63)
- DRUM (Digital Repository at the University of Maryland) (1)
- Gallica, Bibliotheque Numerique - Bibliothèque nationale de France (French National Library) (BnF), France (2)
- Institute of Public Health in Ireland, Ireland (31)
- Instituto Politécnico de Viseu (1)
- Instituto Politécnico do Porto, Portugal (8)
- Iowa Publications Online (IPO) - State Library, State of Iowa (Iowa), United States (9)
- Martin Luther Universitat Halle Wittenberg, Germany (1)
- National Center for Biotechnology Information - NCBI (2)
- Nottingham eTheses (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (1)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (2)
- Repositório Alice (Acesso Livre à Informação Científica da Embrapa / Repository Open Access to Scientific Information from Embrapa) (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (12)
- Repositório da Escola Nacional de Administração Pública (ENAP) (3)
- Repositório da Produção Científica e Intelectual da Unicamp (7)
- Repositório da Universidade Federal do Espírito Santo (UFES), Brazil (5)
- Repositório digital da Fundação Getúlio Vargas - FGV (3)
- Repositório Institucional da Universidade Estadual de São Paulo - UNESP (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (5)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (15)
- Savoirs UdeS : plateforme de diffusion de la production intellectuelle de l’Université de Sherbrooke - Canada (1)
- Scielo Saúde Pública - SP (38)
- Scottish Institute for Research in Economics (SIRE) (SIRE), United Kingdom (2)
- Universidad del Rosario, Colombia (20)
- Universidad Politécnica de Madrid (1)
- Universidade do Minho (7)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (11)
- Université de Lausanne, Switzerland (48)
- Université de Montréal, Canada (46)
- University of Michigan (42)
- University of Queensland eSpace - Australia (49)
- University of Southampton, United Kingdom (2)
- University of Washington (1)
- WestminsterResearch - UK (1)
Resumo:
The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed. It is assumed that the eavesdropper has full access to the channel so an unknown and untrusted source is assumed. To take into account the security of the BB84 protocol under collective attacks within the framework of quantum adversaries, a full treatment provides the well-known equations for the secure key rate. A numerical simulation keeping a minimum number of initial parameters constant as the total error sought and the number of pulses is carried out. The remaining parameters are optimized to produce the maximum secure key rate. Two main strategies are addressed: with and without two-decoy-states including the optimization of signal to decoy relationship.