1,452 research outputs found

    El romancero de Quevedo. Notas sobre la innovación barroca de un género literario

    Get PDF
    La autora analiza un romance quevedesco como ejemplo de innovación barroca de un subgénero poético. The author analyses a Quevedian burlesque poem as an example of Barroquian innovation of lyrical poetry

    Massive Dirac fermions and the zero field quantum Hall effect

    Full text link
    Through an explicit calculation for a Lagrangian in quantum electrodynamics in (2+1)-space--time dimensions (QED3_3), making use of the relativistic Kubo formula, we demonstrate that the filling factor accompanying the quantized electrical conductivity for massive Dirac fermions of a single species in two spatial dimensions is a half (in natural units) when time reversal and parity symmetries of the Lagrangian are explicitly broken by the fermion mass term. We then discuss the most general form of the QED3_3 Lagrangian, both for irreducible and reducible representations of the Dirac matrices in the plane, with emphasis on the appearance of a Chern-Simons term. We also identify the value of the filling factor with a zero field quantum Hall effect (QHE).Comment: 15 pages. Accepted in Jour. Phys.

    Free Form of the Foldy-Wouthuysen Transformation in External Electromagnetic Fields

    Full text link
    We derive the exact Foldy-Wouthuysen transformation for Dirac fermions in a time independent external electromagnetic field in the basis of the Ritus eigenfunctions, namely the eigenfunctions of the operator (γ⋅Π)2(\gamma \cdot \Pi)^2, with Πμ=pμ−eAμ\Pi^\mu = p^\mu - e A^\mu. In this basis, the transformation acquires a free form involving the dynamical quantum numbers induced by the field.Comment: 8 pages. Accepted in J. Phys. A: Math. and Theo. (Fast Track Communication

    Formal Analysis of V2X Revocation Protocols

    Get PDF
    Research on vehicular networking (V2X) security has produced a range of security mechanisms and protocols tailored for this domain, addressing both security and privacy. Typically, the security analysis of these proposals has largely been informal. However, formal analysis can be used to expose flaws and ultimately provide a higher level of assurance in the protocols. This paper focusses on the formal analysis of a particular element of security mechanisms for V2X found in many proposals: the revocation of malicious or misbehaving vehicles from the V2X system by invalidating their credentials. This revocation needs to be performed in an unlinkable way for vehicle privacy even in the context of vehicles regularly changing their pseudonyms. The REWIRE scheme by Forster et al. and its subschemes BASIC and RTOKEN aim to solve this challenge by means of cryptographic solutions and trusted hardware. Formal analysis using the TAMARIN prover identifies two flaws with some of the functional correctness and authentication properties in these schemes. We then propose Obscure Token (OTOKEN), an extension of REWIRE to enable revocation in a privacy preserving manner. Our approach addresses the functional and authentication properties by introducing an additional key-pair, which offers a stronger and verifiable guarantee of successful revocation of vehicles without resolving the long-term identity. Moreover OTOKEN is the first V2X revocation protocol to be co-designed with a formal model.Comment: 16 pages, 4 figure
    • …
    corecore