14,220 research outputs found

    Soergel calculus

    No full text

    On cubes of Frobenius extensions

    No full text

    Resource requirements and speed versus geometry of unconditionally secure physical key exchanges

    Get PDF
    The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information theoretically secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A practical and cost effective method is to have each host share their respective cable(s) with other hosts such that two remote hosts can realize a secure key exchange without the need of an additional cable or key exchanger. In this article we analyze the cost complexities of cable, key exchangers, and time required in the star network. We mentioned the reliability of the star network and compare it with other network geometries. We also conceived a protocol and equation for the number of secure bit exchange periods needed in a star network. We then outline other network geometries and trade-off possibilities that seem interesting to explore.Comment: 13 pages, 7 figures, MDPI Entrop

    The Gender Equality in Research Scale: A tool for monitoring and encouraging progress on gender integration in research for and in development.

    Get PDF
    This brief discusses a monitoring and learning tool – the Gender Equality in Research Scale (GEIRS) – designed to assess the level of gender integration across a CRP’s research portfolio and at different stages of the research and development cycle
    • …
    corecore