Roadmap on optical security

B Javidi, A Carnicer, M Yamaguchi, T Nomura… - Journal of …, 2016 - iopscience.iop.org
Abstract Information security and authentication are important challenges facing society.
Recent attacks by hackers on the databases of large commercial and financial companies …

Modern quantum technologies of information security against cyber‐terrorist attacks

O Korchenko, Y Vasiliu, S Gnatyuk - Aviation, 2010 - Taylor & Francis
In this paper, the systematisation and classification of modern quantum technologies of
information security against cyber‐terrorist attack are carried out. The characteristic of the …

Методы анализа и диагностирования цифровых устройств (аналитический обзор)

ВИ Хаханов, ЕИ Литвинова - … системы управления и приборы …, 2014 - cyberleninka.ru
Методы анализа и диагностирования цифровых устройств (аналитический обзор) – тема
научной статьи по компьютерным и информационным наукам читайте бесплатно текст …

Consensus formation on a simplicial complex of opinions

S Maletić, M Rajković - Physica A: Statistical Mechanics and its Applications, 2014 - Elsevier
Geometric realization of an opinion is considered as a simplex and the opinion space of a
group of individuals is a simplicial complex whose topological features are monitored in the …

[图书][B] Introduction to evolutionary informatics

RJ Marks, WA Dembski, W Ewert - 2017 - World Scientific
In order to establish solid credibility, a science should be backed by mathematics and
models. Even some soft sciences, such as finance, offer compelling mathematical and …

Atomic squeezing in three-level atoms with effective dipole–dipole atomic interaction

O Civitarese, M Reboiro, L Rebón, D Tielas - Physics Letters A, 2010 - Elsevier
The appearance of atomic squeezing in a system of three-level atoms placed in a two-mode
cavity, is analyzed. The effects of effective dipole–dipole interactions between atoms are …

A novel quantum video steganography protocol with large payload based on MCQI quantum video

Z Qu, S Chen, S Ji - International Journal of Theoretical Physics, 2017 - Springer
As one of important multimedia forms in quantum network, quantum video attracts more and
more attention of experts and scholars in the world. A secure quantum video steganography …

[图书][B] Quantum secure telecommunication systems

OG Korchenko, P Vorobiyenko, M Lutskiy, Y Vasiliu… - 2012 - dspace.nau.edu.ua
This book guides readers through the basics of rapidly emerging networks to more
advanced concepts and future expectations of Telecommunications Networks. It identifies …

Tautomerism: a historical perspective

J Elguero - … : Concepts and Applications in Science and …, 2016 - Wiley Online Library
Pyrazoles tautomerism, annular of pyrazoles and indazoles and functional of pyrazolinones,
was called pyrazoloness some six decades ago. To display a panorama of tautomerism …

[PDF][PDF] On the construction of a theory of everything based on Buddhist cosmological model

WC Cui, LL Kang - Trends in Technical & Scientific Research, 2020 - researchgate.net
Sciences originated from seeking the solutions to some fundamental questions about the
universe and life. Earlier application of a holistic approach led to the first peak when some of …