2,152 research outputs found

    A Careful Design for a Tool to Detect Child Pornography in P2P Networks

    Get PDF
    This paper addresses the social problem of child pornography on peer-to-peer (P2P) networks on the Internet and presents an automated system with effective computer and telematic tools for seeking out and identifying data exchanges with pedophilic content on the Internet. The paper analyzes the social and legal context in which the system must operate and describes the processes by which the system respects the rights of the persons investigated and prevents these tools from being used to establish processes of surveillance and attacks on the privacy of Internet users

    The Case for Quantum Key Distribution

    Get PDF
    Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.Comment: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009 Workshop on Quantum and Classical Information Security; version 2 minor content revision

    Single-Quadrature Continuous-Variable Quantum Key Distribution

    Get PDF
    Most continuous-variable quantum key distribution schemes are based on the Gaussian modulation of coherent states followed by continuous quadrature detection using homodyne detectors. In all previous schemes, the Gaussian modulation has been carried out in conjugate quadratures thus requiring two independent modulators for their implementations. Here, we propose and experimentally test a largely simplified scheme in which the Gaussian modulation is performed in a single quadrature. The scheme is shown to be asymptotically secure against collective attacks, and considers asymmetric preparation and excess noise. A single-quadrature modulation approach renders the need for a costly amplitude modulator unnecessary, and thus facilitates commercialization of continuous-variable quantum key distribution.Comment: 13 pages, 7 figure

    The Landscape of Academic Literature in Quantum Technologies

    Full text link
    In this study, we investigated the academic literature on quantum technologies (QT) using bibliometric tools. We used a set of 49,823 articles obtained from the Web of Science (WoS) database using a search query constructed through expert opinion. Analysis of this revealed that QT is deeply rooted in physics, and the majority of the articles are published in physics journals. Keyword analysis revealed that the literature could be clustered into three distinct sets, which are (i) quantum communication/cryptography, (ii) quantum computation, and (iii) physical realizations of quantum systems. We performed a burst analysis that showed the emergence and fading away of certain key concepts in the literature. This is followed by co-citation analysis on the highly cited articles provided by the WoS, using these we devised a set of core corpus of 34 publications. Comparing the most highly cited articles in this set with respect to the initial set we found that there is a clear difference in most cited subjects. Finally, we performed co-citation analyses on country and organization levels to find the central nodes in the literature. Overall, the analyses of the datasets allowed us to cluster the literature into three distinct sets, construct the core corpus of the academic literature in QT, and to identify the key players on country and organization levels, thus offering insight into the current state of the field. Search queries and access to figures are provided in the appendix.Comment: 32 pages, 10 figures, draft version of a working pape

    Managing the boundary of an 'open' project

    Get PDF
    In the past ten years, the boundaries between public and open science and commercial research efforts have become more porous. Scholars have thus more critically examined ways in which these two institutional regimes intersect. Large open source software projects have also attracted commercial collaborators and now struggle to develop code in an open public environment that still protects their communal boundaries. This research applies a dynamic social network approach to understand how one community-managed software project, Debian, developed a membership process. We examine the project's face-to-face social network over a five-year period (1997-2001) to see how changes in the social structure affected the evolution of membership mechanisms and the determination of gatekeepers. While the amount and importance of a contributor's work increased the probability that a contributor would become a gatekeeper, those more central in the social network were more likely to become gatekeepers and influence the membership process. A greater understanding of the mechanisms open projects use to manage their boundaries has critical implications for research and knowledge-producing communities operating in pluralistic, open and distributed environments.open source software; social networks; organizational design; institutional design;
    corecore