15 research outputs found
Proof of sum rules for double parton distributions in QCD
Double hard scattering can play an important role for producing multiparticle final states in hadron-hadron collisions. The associated cross sections depend on double parton distributions, which at present are only weakly constrained by theory or measurements. A set of sum rules for these distributions has been proposed by Gaunt and Stirling some time ago. We give a proof for these sum rules at all orders in perturbation theory, including a detailed analysis of the renormalisation of ultraviolet divergences. As a by-product of our study, we obtain the form of the inhomogeneous evolution equation for double parton distributions at arbitrary perturbative order
Magnetic Microstructure of Sputtered Co-Cr Films
The magnetic microstructure of a thickness series of Co81Cr19 layers on Si3N4 membranes is investigated by modified differential phase contrast (MDPC) microscopy. The development from cross-rie wall structures for a thickness 50 nm is related to the macroscopic VSM measurements and the crystallite orientation determined from electron diffraction experiments
Sum rule improved double parton distributions in position space
Models for double parton distributions that are realistic and consistent with theoretical constraints are crucial for a reliable description of double parton scattering. We show how an ansatz that has the correct behaviour in the limit of small transverse distance between the partons can be improved step by step, such as to fulfil the sum rules for double parton distributions with an accuracy around 10%
Security and Privacy in Vehicular Adhoc Networks: a survey and the road ahead
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs
On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications
The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat called 'Sybil Attack' which refers to, impersonation of one physical entity for many, namely Sybil nodes. In such circumstances, data received from malicious Sybil attacker may seem as if it was received from many distinct physical nodes. Sybil nodes may deliberately mislead other neighbors, resulting in catastrophic situations like traffic jams or even deadly accidents. Preventing such attacks in a privacy-enabled environment is not a trivial task. In this paper, we aim at two conflicting goals, i.e. privacy and Sybil attack in VANET. We leverage pseudonymless beaconing in order to preserve privacy. To cope with Sybil attack, we put forth a twofold strategy. In order to avoid Sybil attack through scheduled beacons, we employ tamper resistant module (TRM) to carry out a pre-assembly data analysis on data that is used to assemble beacons whereas for event reporting message (ERM), we employ road side units (RSUs) to localize Sybil nodes in VANET and report them to the revocation authority(s). RSUs distribute authorized tokens among the benign vehicular nodes which in turn are consumed to report ERMs. RSUs collect ERMs for certain event and figures out if more than one ERM for the same event includes identical token or, if an ERM is sent more than once by the same source. Our proposed scheme preserves privacy in both beacons and ERMs, and provides conditional anonymity where in case of a dispute; malicious attackers are subject to revocation. We also show that our proposed scheme outperforms the previously proposed scheme from security and computational complexity standpoint.</p