Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "key" wg kryterium: Temat


Tytuł:
Unconditional security by the laws of classical physics
Autorzy:
Mingesz, R.
Kish, L. B.
Gingl, Z.
Granqvist, C.-G.
Wen, H.
Peper, F.
Eubanks, T.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/220876.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information theoretic security
unconditional security
secure key exchange
secure key distribution
quantum encryption
Opis:
There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop - i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol . for secure key distribution leads to information theoretic security levels superior to those of today's quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).
Źródło:
Metrology and Measurement Systems; 2013, 20, 1; 3-16
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange
Autorzy:
Kish, L. B.
Granqvist, C. G.
Powiązania:
https://bibliotekanauki.pl/articles/221212.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN key exchange
information theoretic security
unconditional security
Opis:
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.
Źródło:
Metrology and Measurement Systems; 2016, 23, 1; 3-11
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the “cracking” scheme in the paper “A directional coupler attack against the Kish key distribution system” by Gunn, Allison and Abbott
Autorzy:
Chen, H.-P.
Kish, L. B.
Granqvist, C. G.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/221413.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN key exchange
information theoretic security
unconditional security
Opis:
Recently, Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. We proved in a former paper [Fluct. Noise Lett. 13 (2014) 1450016] that GAA’s mathematical model is unphysical. Here we analyze GAA’s cracking scheme and show that, in the case of a loss-free cable, it provides less eavesdropping information than in the earlier (Bergou)-Scheuer-Yariv mean-square-based attack [Kish LB, Scheuer J, Phys. Lett. A 374:2140-2142 (2010)], while it offers no information in the case of a lossy cable. We also investigate GAA’s claim to be experimentally capable of distinguishing - using statistics over a few correlation times only - the distributions of two Gaussian noises with a relative variance difference of less than 10-8. Normally such distinctions would require hundreds of millions of correlations times to be observable. We identify several potential experimental artifacts as results of poor KLJN design, which can lead to GAA’s assertions: deterministic currents due to spurious harmonic components caused by ground loops, DC offset, aliasing, non-Gaussian features including non-linearities and other non-idealities in generators, and the timederivative nature of GAA’s scheme which tends to enhance all of these artifacts.
Źródło:
Metrology and Measurement Systems; 2014, 21, 3; 389-400
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A new method of line feature generalization based on shape characteristic analysis
Autorzy:
Huang, Z.
Nie, H.
Powiązania:
https://bibliotekanauki.pl/articles/220575.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
line generalization
key point detection
shape characteristic analysis
Opis:
This paper presents a piecewise line generalization algorithm (PG) based on shape characteristic analysis. An adaptive threshold algorithm is used to detect all corners, from which key points are selected. The line is divided into some segments by the key points and generalized piecewise with the Li-Openshaw algorithm. To analyze the performance, line features with different complexity are used. The experimental results compared with the DP algorithm and the Li-Openshaw algorithm show that the PG has better performance in keeping the shape characteristic with higher position accuracy.
Źródło:
Metrology and Measurement Systems; 2011, 18, 4; 597-605
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evaluation and Ranking the Resilient Suppliers with the Combination of Decision Making Techniques
Autorzy:
Ajalli, Mehdi
Saberifard, Nima
Zinati, Babak
Powiązania:
https://bibliotekanauki.pl/articles/2023981.pdf
Data publikacji:
2021-09
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
key dimension
resilience
supplier
SWARA technique
WASPAS method
ranking
Opis:
Supply chain management emerged as the ultimate management strategy to ensure the competitive advantages of companies in their markets. Suppliers are considered as inevitable sources of external risks in modern supply chains. In this respect, resonance is essential for the ability to adapt in resonance to disturbances and to restore in choosing suppliers. As suppliers of critical resources are vulnerable, choosing better suppliers to create resilience, and thereby reducing the risks in the supply chain as a whole. In recent years, emphasis has been placed on supply chain resilience and resilient suppliers, but few studies have been conducted on the evaluation and selection of resilient suppliers with multi-criteria decision making models. The main purposes of this study are a broad review of the literature on the resilient factor, factorization, efficiency of key factors in the reliance of suppliers and the ranking of resilient suppliers using the combined approach of SWARA and WASPAS. For this purpose, after a comprehensive review of Literature interview with the experts of petrochemical upstream industry, six key factors and overall resilience of suppliers were identified in eighteen factors. Then the weight of the dimensions was determined by using the SWARA method. The output of the method showed that supplier accountability and key performance factors were the most important factors in assessing the resilience of suppliers. Using the supporting method, five resilient suppliers were evaluated based on six dimensions and the final ranking of suppliers was determined. With this ranking, the industry will be a major step towards improving supply chain and increasing suppliers’ resilience to address disruptions and risks, improve supply and achieve competitive advantage and satisfy the consumers’ needs.
Źródło:
Management and Production Engineering Review; 2021, 13, 3; 129-140
2080-8208
2082-1344
Pojawia się w:
Management and Production Engineering Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The ethical aspects of pseudoscience
Autorzy:
Polskiej Akademii Nauk, Komitet Etyki w Nauce
Powiązania:
https://bibliotekanauki.pl/articles/704227.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Key words: pseudoscience
research ethics
academic ethos
ethics recommendations
Opis:
The spread of pseudoscientific beliefs and opinions is one of the more serious problems of modern societies. Pseudoscientific beliefs and opinions question the authority of science and may lead to serious harms to individuals and whole societies. In recognition of these hazards, the Committee of Ethics in Science of the Polish Academy of Sciences submits the following statement for the consideration of researchers, teachers in higher education and primary and secondary schools, as well as institutions which are responsible for education, and the society at large. The statement characterizes pseudoscience, its main causes and forms, as well as its key ethical aspects. It also contains recommendations for scientists and academic institutions on the appropriate responses to this troubling phenomenon.
Źródło:
Nauka; 2020, 1
1231-8515
Pojawia się w:
Nauka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The key factors of selecting electronics manufacturing service suppliers - an example of company u in Taiwan
Autorzy:
Chiu, H. -F.
Lee, T. -R.
Kao, C. -K.
Powiązania:
https://bibliotekanauki.pl/articles/407004.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Electronics Manufacturing Service
evaluation criteria
AHP based approach
key factors
Opis:
In a highly competitive environment with a developed network, the customers of electronics manufacturing service (EMS) manufacturers always seek a wide range of choices. EMS manufacturers can attract loyal customers and establish long-term partnerships if they understand and satisfy their customers’ needs to execute a response plan successfully with limited resources. If these conditions are met, EMS manufacturers can create high customer equity. This study investigates how the demand of downstream enterprises can be satisfied on the basis of the opinion of upstream suppliers in the electronics manufacturing industry. Domestic and foreign literature related to the dimensions and elements of supplier evaluation criteria were investigated to extract 22 elements of supplier selection by corporate customers. Five supplier evaluation dimensions were then established through interviews with the internal experts of the case company. An analytic hierarchy process-based (AHPbased) approach is used to design the questionnaire for the external corporate customers of the case company. The questionnaire is then used to investigate the supplier evaluation criteria of the customers of EMS manufacturers. Conclusions and suggestions are provided on the basis of the results to provide the case company with references that can be used to develop and maintain customer relationship and create high customer equity.
Źródło:
Management and Production Engineering Review; 2015, 6, 4; 4-14
2080-8208
2082-1344
Pojawia się w:
Management and Production Engineering Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Moderating impact of complexity on process management of turnaround project
Autorzy:
Fabić, Marco
Pavletić, Duško
Valić, Graciela Šterpin
Marković, Maja
Powiązania:
https://bibliotekanauki.pl/articles/407177.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
maintenance management
turnaround
project quality
process management
complexity
key result
Opis:
Maintenance of process plants requires application of good maintenance practice due to a great level of complexity. From a plant maintenance point of view, the most significant activity is turnaround, an activity carried out through project task with long planning process period and very short execution period, which makes it one of the most complex projects of maintenance in general. It is exactly this kind of maintenance that is based on multidisciplinarity which has to be implemented through the system of quality management on all levels of maintenance management. This paper defines the most significant factors determining the process of turnaround projects quality management and its efficiency. Such relation is observed through moderating influence of complexity on process management efficiency in the turnaround project. The empirical research was conducted based on the survey of turnaround project participants in five refineries in Croatia, Italy, Slovakia and Hungary. For exploring the influence of research variables testing of the target relation is carried out by applying logistical regression. Research results confirm the significance of complexity as variable that significantly contributes to the project performance through the moderating influence on success of the project, as well as the influence of an efficient management on a plant turnaround project key results. Beside theoretical indications, practical implications that arise from this research study mainly refers to management process of the industrial plant maintenance project.
Źródło:
Management and Production Engineering Review; 2019, 10, 4; 25-36
2080-8208
2082-1344
Pojawia się w:
Management and Production Engineering Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Fundamental limit and trade-off between security and secure key generation rate in quantum key distribution
Autorzy:
Iwakoshi, Takehisa
Powiązania:
https://bibliotekanauki.pl/articles/221832.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Quantum Key Distribution
Quantum Cryptography
Privacy Amplification
Leftover Hash Lemma
Opis:
Many researchers have contributed to creating Quantum Key Distribution (QKD) since the first protocol BB84 was proposed in 1984. One of the crucial problems in QKD is to guarantee its security with finite-key lengths by Privacy Amplification (PA). However, finite-key analyses show a trade-off between the security of BB84 and the secure key rates. This study analyses two examples to show concrete trade-offs. Furthermore, even though the QKD keys have been perceived to be arbitrarily secure, this study shows a fundamental limitation in the security of the keys by connecting Leftover Hash Lemma and Guessing Secrecy on the QKD keys.
Źródło:
Metrology and Measurement Systems; 2019, 26, 1; 125-137
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hope in literature
Autorzy:
Śliwiński, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1916716.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Key words: hope
passion
awareness
imagination
crisis
ethics
irony
poetry
Opis:
The article presents the ways of defining and understanding hope in Polish, English and American literature. The basic theses are: 1) hope is an ambivalent phenomenon, 2) hope is connected with the work of consciousness and imagination, 3) hope conjures up visions of the alternative existential and social solutions, 4) hope is a passion and a way of knowing, 5) hope constitutes the keystone of artistic and academic activity.
Źródło:
Nauka; 2020, 4
1231-8515
Pojawia się w:
Nauka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Storyline — the method triggering cognitive activity in pre-school children
Storyline — metoda wyzwalająca aktywność poznawczą dzieci w wieku przedszkolnym
Autorzy:
Kosek, Agnieszka
Kowalska, Monika
Powiązania:
https://bibliotekanauki.pl/articles/2076484.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
storyline method
key questions
episode
metoda storyline
pytania kluczowe
epizody
Opis:
Due to the changing social and program expectations teachers more often look for new and better solutions in the field of education and teaching. Among many teaching methods, the storyline method is a very popular one and is gaining now more and more recognition from pedagogues around the world. The method starts to have its supporters in Poland as well. This article will be devoted to the description of this innovative strategy.
Źródło:
Rocznik Komisji Nauk Pedagogicznych; 2018, LXXI; 61-72
0079-3418
Pojawia się w:
Rocznik Komisji Nauk Pedagogicznych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cryptosystems using subgroup distortion
Autorzy:
Chatterji, I.
Kahrobaei, D.
Lu, N. Y.
Powiązania:
https://bibliotekanauki.pl/articles/375856.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
hyberbolic groups
symmetric key
distortion
grupy hiperboliczne
klucz symetryczny
zniekształcenie
Opis:
In this paper we propose cryptosystems based on subgroup distortion in hyperbolic groups. We also include concrete examples of hyperbolic groups as possible platforms.
Źródło:
Theoretical and Applied Informatics; 2017, 29, 1-2; 14-24
1896-5334
Pojawia się w:
Theoretical and Applied Informatics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation
Autorzy:
Horubała, A.
Waszkiewicz, D.
Andrzejczak, M.
Sapiecha, P.
Powiązania:
https://bibliotekanauki.pl/articles/226598.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
indistinguishability obfuscation
public key cryptosystems
homomorphic encryption
cloud computing
information protection
Opis:
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems. The techniques are applied to symmetric key crypto-system and the target system is asymmetric one. As an input for our approach an implementation of symmetric block cipher with a given private-key is considered. Different obfuscation methods are subjected to processing. The target system would be treated as a public-key for newly created public crypto-system. The approach seems to be interesting from theoretical point of view. Moreover, it can be useful for information protection in a cloud-computing model.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 173-178
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An investigation of planning practices in select companies
Autorzy:
Wyrozębski, P.
Spałek, S.
Powiązania:
https://bibliotekanauki.pl/articles/406936.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
project management
project planning
planning process
empirical studies
key factors
research
Opis:
The aim of the article is to answer two research questions concerning the influence of organizational factors and shape of project portfolio on the content and scope, as well as on the stakeholders engagement in project planning. The research strategy included a questionnairebased method. The respondents were representatives of the chosen companies located in Poland, from varied types of industries. The key research finding is that most frequently addressed areas of project planning are those of the iron-triangle of project constraints. There is still lack of understanding for communication, risk and quality planning in projects, which is consonant with recent studies of maturity in project management areas. There are significant differences between industries in terms of areas of project planning. Power engineering seems to be more mature in terms of more frequent practices of planning the project schedule, resources and risk. The research showed a number of significant correlations between components of project planning and both organizational and project portfolio factors, which justifies the statement that those factors can be seen as determinants of project planning practices.
Źródło:
Management and Production Engineering Review; 2014, 5, 2; 78-87
2080-8208
2082-1344
Pojawia się w:
Management and Production Engineering Review
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies