oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 136 )

2018 ( 221 )

2017 ( 202 )

2016 ( 285 )

Custom range...

Search Results: 1 - 10 of 117818 matches for " T. Felbinger "
All listed articles are free for downloading (OA Articles)
Page 1 /117818
Display every page Item
Comment on "Secure direct communication with a quantum one-time pad"
H. Hoffmann,K. Bostroem,T. Felbinger
Physics , 2004, DOI: 10.1103/PhysRevA.72.016301
Abstract: In the paper [Phys. Rev. A \textbf{69}, 052319 (2004)], a quantum direct communication protocol is proposed which is claimed to be unconditionally secure even for the case of a noisy channel. We show that this is not the case by giving an undetectable attack scheme.
Time correlations of a laser-induced Bose-Einstein condensate
T. Felbinger,L. Santos,M. Wilkens,M. Lewenstein
Physics , 2000, DOI: 10.1103/PhysRevA.62.033603
Abstract: We analyze the multi-time correlations of a laser-induced Bose-Einstein condensate. We use quantum stochastic methods to obtain under certain circumstances a Fokker-Planck equation which describes the phase-difussion process, and obtain an analytical expression of the two-time correlations. We perform also quantum Monte Carlo numerical simulations of the correlations, which are in good agreement with the predicted analytical results.
Classical information and distillable entanglement
J. Eisert,T. Felbinger,P. Papadopoulos,M. B. Plenio,M. Wilkens
Physics , 1999, DOI: 10.1103/PhysRevLett.84.1611
Abstract: We establish a quantitative connection between the amount of lost classical information about a quantum state and the concomitant loss of entanglement. Using methods that have been developed for the optimal purification of mixed states we find a class of mixed states with known distillable entanglement. These results can be used to determine the quantum capacity of a quantum channel which randomizes the order of transmitted signals.
On the Security of the Ping-Pong Protocol
Kim Bostroem,Timo Felbinger
Physics , 2007, DOI: 10.1016/j.physleta.2008.03.048
Abstract: We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.
Lossless quantum data compression and variable-length coding
Kim Bostroem,Timo Felbinger
Physics , 2001, DOI: 10.1103/PhysRevA.65.032313
Abstract: In order to compress quantum messages without loss of information it is necessary to allow the length of the encoded messages to vary. We develop a general framework for variable-length quantum messages in close analogy to the classical case and show that lossless compression is only possible if the message to be compressed is known to the sender. The lossless compression of an ensemble of messages is bounded from below by its von-Neumann entropy. We show that it is possible to reduce the number of qbits passing through a quantum channel even below the von-Neumann entropy by adding a classical side-channel. We give an explicit communication protocol that realizes lossless and instantaneous quantum data compression and apply it to a simple example. This protocol can be used for both online quantum communication and storage of quantum data.
Deterministic Secure Direct Communication Using Entanglement
Kim Bostroem,Timo Felbinger
Physics , 2002, DOI: 10.1103/PhysRevLett.89.187902
Abstract: A novel secure communication protocol is presented, based on an entangled pair of qubits and allowing asymptotically secure key distribution and quasi-secure direct communication. Since the information is transferred in a deterministic manner, no qubits have to be discarded. The transmission of information is instantaneous, i.e. the information can be decoded during the transmission. The security against arbitrary eavesdropping attacks is provided. In case of eavesdropping attacks with full information gain, the detection rate is 50% per control transmission. The experimental realization of the protocol is feasible with relatively small effort, which also makes commercial applications conceivable.
Stochastic Wave-function Simulation of Two-time Correlation Functions
Timo Felbinger,Martin Wilkens
Physics , 1999, DOI: 10.1080/09500349908231343
Abstract: We propose an optimized algorithm for the numerical simulation of two-time correlation functions by means of stochastic wave functions. As a first application, we investigate the two-time correlation function of a nonlinear optical parametric oscillator.
REGULARYFRAMWORK AND LEGAL BASE OF ELECTRONIC DOCUMENT CIRCULATION НОРМАТИВНО-ПРАВОВА БАЗА ЕЛЕКТРОННОГО ДОКУМЕНТООБ ГУ
T.Г. Омельченко,Н.А. Джанджгава
Information Technologies and Learning Tools , 2010,
Abstract: The general characteristic of legal base of electronic document circulation is presented in the article. It legislatively regulates the relations which connected with the information and information communication technologies. There is presented the list of the basic acts of regulation of sphere of information relations. У робот подано загальну характеристику нормативно-правово бази, яка законодавчо регулю в дносини, пов'язан з нформац ю, нформац йно-комун кац йними технолог ями, представлено перел к основних законодавчих акт в регулювання сфери нформац йних в дносин.
THE APPROACH OF COMPETENCE AT THE STUDY OF MATHEMATICAL INFORMATICS IN A PEDAGOGICAL UNIVERSITY КОМПЕТЕНТН СНИЙ П ДХ Д ПРИ ВИВЧЕНН МАТЕМАТИЧНО НФОРМАТИКИ” У ПЕДАГОГ ЧНОМУ УН ВЕРСИТЕТ
T.П. Кобильник
Information Technologies and Learning Tools , 2010,
Abstract: In the paper the approach of competence at the study of mathematical informatics in a pedagogical university is considered. The special attention is paid to forming of professional pedagogical and educational-cognitive competences. The example of tasks on which formed a competence at the study of mathematical informatics is resulted. У статт розглянуто компетентн сний п дх д при вивченн математично нформатики у педагог чному ун верситет . Особливу увагу звернено на формування профес йно педагог чно та навчально-п знавальну компетентност . Наведено приклад завдань, як сприяють формуванню компетентностей при вивченн математично нформатики.
SYSTEM OF THE AUTOMATIC DOCUMENT PROCESSING IN SHELL OF BASE SOFTWARE СИСТЕМА АВТОМАТИЗОВАНОГО ДОКУМЕНТООБ ГУ В ОБОЛОНЦ БАЗОВОГО ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ
В.Ю. Биков,T.О. Дерба
Information Technologies and Learning Tools , 2010,
Abstract: In the article the automatic system of the document processing, created with use of Microsoft Access – a component part of Microsoft Office is offered. This system can be used at school and Institutions of education with one computer or with system of 15 ones connecting in the local net. У статт запропоновано для ознайомлення автоматизовану систему документооб гу, створену з використанням Microsoft Access – складово частини Microsoft Office. Ця система може використовуватися в школах установах осв тньо галуз на одному комп’ютер чи на систем до 15 комп’ютер в, пов’язаних локальною мережею.
Page 1 /117818
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.