158 research outputs found

    Target Design for XUV Probing of Radiative Shock Experiments

    Full text link
    Radiative shocks are strong shocks characterized by plasma at a high temperature emitting an important fraction of its energy as radiation. Radiative shocks are commonly found in many astrophysical systems and are templates of radiative hydrodynamic flows, which can be studied experimentally using high-power lasers. This is not only important in the context of laboratory astrophysics but also to benchmark numerical studies. We present details on the design of experiments on radiative shocks in xenon gas performed at the kJ scale PALS laser facility. It includes technical specifications for the tube targets design and numerical studies with the 1-D radiative hydrodynamics code MULTI. Emphasis is given to the technical feasibility of an XUV imaging diagnostic with a 21 nm (~58 eV) probing beam, which allows to probe simultaneously the post-shock and the precursor region ahead of the shock. The novel design of the target together with the improved X-ray optics and XUV source allow to show both the dense post-shock structure and the precursor of the radiative shock.Comment: 12 pages, 4 figure

    Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

    Full text link
    Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations in which two parties that do not know each other need to exchange sensitive information on the Internet. Trust management mechanisms make use of digital credentials and certificates in order to establish trust among these strangers. We address the problem of choosing which credentials are exchanged. During this process, each party should learn no information about the preferences of the other party other than strictly required for trust establishment. We present a method to reach an agreement on the credentials to be exchanged that preserves the privacy of the parties. Our method is based on secure two-party computation protocols for set intersection. Namely, it is constructed from private matching schemes.Comment: The material in this paper will be presented in part at the 8th DPM International Workshop on Data Privacy Management (DPM 2013

    Negotiating Trust on the Grid

    Get PDF
    Grids support dynamically evolving collections of resources and users, usually spanning multiple administrative domains. The dynamic and crossorganizational aspects of Grids introduce challenging management and policy issues for controlling access to Grid resources. In this paper we show how to extend the Grid Security Infrastructure to provide better support for the dynamic and cross-organizational aspects of Grid activities, by adding facilities for dynamic establishment of trust between parties. We present the PeerTrust language for access control policies, which is based on guarded distributed logic programs, and show how to use PeerTrust to model common Grid trust needs

    Long-lasting XUV activation of helium nanodroplets for avalanche ionization

    Full text link
    We study the dynamics of avalanche ionization of pure helium nanodroplets activated by a weak extreme-ultraviolet (XUV) pulse and driven by an intense near-infrared (NIR) pulse. In addition to a transient enhancement of ignition of a nanoplasma at short delay times 200\sim200~fs, long-term activation of the nanodroplets lasting up to a few nanoseconds is observed. Molecular dynamics simulations suggest that the short-term activation is caused by the injection of seed electrons into the droplets by XUV photoemission. Long-term activation appears due to electrons remaining loosely bound to photoions which form stable `snowball' structures in the droplets. Thus, we show that XUV irradiation can induce long-lasting changes of the strong-field optical properties of nanoparticles, potentially opening new routes to controlling avalanche-ionization phenomena in nanostructures and condensed-phase systems
    corecore