2,152 research outputs found
A Careful Design for a Tool to Detect Child Pornography in P2P Networks
This paper addresses the social problem of child pornography on peer-to-peer (P2P) networks on the Internet and presents an automated system with effective computer and telematic tools for seeking out and identifying data exchanges with pedophilic content on the Internet. The paper analyzes the social and legal context in which the system must operate and describes the processes by which the system respects the rights of the persons investigated and prevents these tools from being used to establish processes of surveillance and attacks on the privacy of Internet users
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum
mechanical systems. We argue that QKD will be an important part of future
cryptographic infrastructures. It can provide long-term confidentiality for
encrypted information without reliance on computational assumptions. Although
QKD still requires authentication to prevent man-in-the-middle attacks, it can
make use of either information-theoretically secure symmetric key
authentication or computationally secure public key authentication: even when
using public key authentication, we argue that QKD still offers stronger
security than classical key agreement.Comment: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009
Workshop on Quantum and Classical Information Security; version 2 minor
content revision
Single-Quadrature Continuous-Variable Quantum Key Distribution
Most continuous-variable quantum key distribution schemes are based on the
Gaussian modulation of coherent states followed by continuous quadrature
detection using homodyne detectors. In all previous schemes, the Gaussian
modulation has been carried out in conjugate quadratures thus requiring two
independent modulators for their implementations. Here, we propose and
experimentally test a largely simplified scheme in which the Gaussian
modulation is performed in a single quadrature. The scheme is shown to be
asymptotically secure against collective attacks, and considers asymmetric
preparation and excess noise. A single-quadrature modulation approach renders
the need for a costly amplitude modulator unnecessary, and thus facilitates
commercialization of continuous-variable quantum key distribution.Comment: 13 pages, 7 figure
The Landscape of Academic Literature in Quantum Technologies
In this study, we investigated the academic literature on quantum
technologies (QT) using bibliometric tools. We used a set of 49,823 articles
obtained from the Web of Science (WoS) database using a search query
constructed through expert opinion. Analysis of this revealed that QT is deeply
rooted in physics, and the majority of the articles are published in physics
journals. Keyword analysis revealed that the literature could be clustered into
three distinct sets, which are (i) quantum communication/cryptography, (ii)
quantum computation, and (iii) physical realizations of quantum systems. We
performed a burst analysis that showed the emergence and fading away of certain
key concepts in the literature. This is followed by co-citation analysis on the
highly cited articles provided by the WoS, using these we devised a set of core
corpus of 34 publications. Comparing the most highly cited articles in this set
with respect to the initial set we found that there is a clear difference in
most cited subjects. Finally, we performed co-citation analyses on country and
organization levels to find the central nodes in the literature. Overall, the
analyses of the datasets allowed us to cluster the literature into three
distinct sets, construct the core corpus of the academic literature in QT, and
to identify the key players on country and organization levels, thus offering
insight into the current state of the field. Search queries and access to
figures are provided in the appendix.Comment: 32 pages, 10 figures, draft version of a working pape
Field test of quantum key distribution in the Tokyo QKD Network
A novel secure communication network with quantum key distribution in a
metropolitan area is reported. Different QKD schemes are integrated to
demonstrate secure TV conferencing over a distance of 45km, stable long-term
operation, and application to secure mobile phones.Comment: 21 pages, 19 figure
Managing the boundary of an 'open' project
In the past ten years, the boundaries between public and open science and commercial research efforts have become more porous. Scholars have thus more critically examined ways in which these two institutional regimes intersect. Large open source software projects have also attracted commercial collaborators and now struggle to develop code in an open public environment that still protects their communal boundaries. This research applies a dynamic social network approach to understand how one community-managed software project, Debian, developed a membership process. We examine the project's face-to-face social network over a five-year period (1997-2001) to see how changes in the social structure affected the evolution of membership mechanisms and the determination of gatekeepers. While the amount and importance of a contributor's work increased the probability that a contributor would become a gatekeeper, those more central in the social network were more likely to become gatekeepers and influence the membership process. A greater understanding of the mechanisms open projects use to manage their boundaries has critical implications for research and knowledge-producing communities operating in pluralistic, open and distributed environments.open source software; social networks; organizational design; institutional design;
- …