576,188 research outputs found
Multiparty Quantum Communication Using Multiqubit Entanglement and Teleportation
We propose a 2N qubit entangled channel that can be used to teleport N qubits in a network to a single receiver. We describe the structure of this channel and explicitly demonstrate how the protocol works. The channel can be used to implement a scheme in which all parties have to participate in order for the teleportation to be successful. This can be advantageous in various scenarios and we discuss the potential application of this protocol to voting
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy
The State of Network Neutrality Regulation
The Network Neutrality (NN) debate refers to the battle over the design of a regulatory framework for preserving the Internet as a public network and open innovation platform. Fueled by concerns that broadband access service providers might abuse network management to discriminate against third party providers (e.g., content or application providers), policymakers have struggled with designing rules that would protect the Internet from unreasonable network management practices. In this article, we provide an overview of the history of the debate in the U.S. and the EU and highlight the challenges that will confront network engineers designing and operating networks as the debate continues to evolve.BMBF, 16DII111, Verbundprojekt: Weizenbaum-Institut für die vernetzte Gesellschaft - Das Deutsche Internet-Institut; Teilvorhaben: Wissenschaftszentrum Berlin für Sozialforschung (WZB)EC/H2020/679158/EU/Resolving the Tussle in the Internet: Mapping, Architecture, and Policy Making/ResolutioNe
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Improved interoperability between public and private organizations is of key
significance to make digital government newest triumphant. Digital Government
interoperability, information sharing protocol and security are measured the
key issue for achieving a refined stage of digital government. Flawless
interoperability is essential to share the information between diverse and
merely dispersed organisations in several network environments by using
computer based tools. Digital government must ensure security for its
information systems, including computers and networks for providing better
service to the citizens. Governments around the world are increasingly
revolving to information sharing and integration for solving problems in
programs and policy areas. Evils of global worry such as syndrome discovery and
manage, terror campaign, immigration and border control, prohibited drug
trafficking, and more demand information sharing, harmonization and cooperation
amid government agencies within a country and across national borders. A number
of daunting challenges survive to the progress of an efficient information
sharing protocol. A secure and trusted information-sharing protocol is required
to enable users to interact and share information easily and perfectly across
many diverse networks and databases globally.Comment: 20 page
Scholarly Communication and the Use of Networked Information Sources
This paper examines the use of networked information sources in scholarly communication. Such use is reflected, among others, in the footnotes and bibliographies of scholarly articles published in print journals. Twenty-seven print journals representing a wide range of subjects were identified through the ISI's SCI and SSCI Journal Citation Reports. Journals that were selected were those that published the most influential papers in their respective fields during the period of 1990-1993, and thus consistently ranked at the top in terms of their impact factors. From these top journals, a total of 97 articles were selected for further review. Footnotes and bibliographies of those 97 articles were checked to determine if they contained references to networked information sources such as electronic journals and archives accessible through the network. Only two (out of 97) articles contained such references. Findings were discussed in light of other studies published in the relevant literature. Some explanations were also offered as to why references to networked information sources appear relatively infrequently in scholarly articles published in print journals
Neurophysiological Profile of Antismoking Campaigns
Over the past few decades, antismoking public service announcements (PSAs) have been used by governments to promote healthy
behaviours in citizens, for instance, against drinking before the drive and against smoke. Effectiveness of such PSAs has been
suggested especially for young persons. By now, PSAs efficacy is still mainly assessed through traditional methods (questionnaires
and metrics) and could be performed only after the PSAs broadcasting, leading to waste of economic resources and time in the
case of Ineffective PSAs. One possible countermeasure to such ineffective use of PSAs could be promoted by the evaluation of the
cerebral reaction to the PSA of particular segments of population (e.g., old, young, and heavy smokers). In addition, it is crucial to
gather such cerebral activity in front of PSAs that have been assessed to be effective against smoke (Effective PSAs), comparing
results to the cerebral reactions to PSAs that have been certified to be not effective (Ineffective PSAs). &e eventual differences
between the cerebral responses toward the two PSA groups will provide crucial information about the possible outcome of new
PSAs before to its broadcasting. &is study focused on adult population, by investigating the cerebral reaction to the vision of
different PSA images, which have already been shown to be Effective and Ineffective for the promotion of an antismoking
behaviour. Results showed how variables as gender and smoking habits can influence the perception of PSA images, and how
different communication styles of the antismoking campaigns could facilitate the comprehension of PSA’s message and then
enhance the related impac
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
- …