21 research outputs found
Stochastic Model for the Motion of a Particle on an Inclined Rough Plane and the Onset of Viscous Friction
Experiments on the motion of a particle on an inclined rough plane have
yielded some surprising results. For example, it was found that the frictional
force acting on the ball is viscous, {\it i.e.} proportional to the velocity
rather than the expected square of the velocity. It was also found that, for a
given inclination of the plane, the velocity of the ball scales as a power of
its radius. We present here a one dimensional stochastic model based on the
microscopic equations of motion of the ball, which exhibits the same behaviour
as the experiments. This model yields a mechanism for the origins of the
viscous friction force and the scaling of the velocity with the radius. It also
reproduces other aspects of the phase diagram of the motion which we will
discuss.Comment: 19 pages, latex, 11 postscript figures in separate uuencoded fil
Instability of dilute granular flow on rough slope
We study numerically the stability of granular flow on a rough slope in
collisional flow regime in the two-dimension. We examine the density dependence
of the flowing behavior in low density region, and demonstrate that the
particle collisions stabilize the flow above a certain density in the parameter
region where a single particle shows an accelerated behavior. Within this
parameter regime, however, the uniform flow is only metastable and is shown to
be unstable against clustering when the particle density is not high enough.Comment: 4 pages, 6 figures, submitted to J. Phys. Soc. Jpn.; Fig. 2 replaced;
references added; comments added; misprints correcte
ICT Trust, Security and Dependability Research Strategy beyond 2010.
This paper, entitled ICT Trust, Security & Dependability Research strategy beyond 2010, will describe the final outputs of the IST SecurIST [1] project, whose objective was to create a clear European level strategy to drive ICT Security and Dependability research beyond 2010. The focus in the paper is on short to medium (up to 3 years) to long-term objectives (~3-10 years). This paper will develop the context of the project, the approach taken, research strategy, setting its objectives and results with reference of various inputs and outputs from a large constituency involved in ICT Trust, Security and Dependability areas that was ultimately co-ordinated by the SecurIST project
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic
viewpoint, is the ability to prove the information-theoretic security (ITS) of
the established keys. As a key establishment primitive, QKD however does not
provide a standalone security service in its own: the secret keys established
by QKD are in general then used by a subsequent cryptographic applications for
which the requirements, the context of use and the security properties can
vary. It is therefore important, in the perspective of integrating QKD in
security infrastructures, to analyze how QKD can be combined with other
cryptographic primitives. The purpose of this survey article, which is mostly
centered on European research results, is to contribute to such an analysis. We
first review and compare the properties of the existing key establishment
techniques, QKD being one of them. We then study more specifically two generic
scenarios related to the practical use of QKD in cryptographic infrastructures:
1) using QKD as a key renewal technique for a symmetric cipher over a
point-to-point link; 2) using QKD in a network containing many users with the
objective of offering any-to-any key establishment service. We discuss the
constraints as well as the potential interest of using QKD in these contexts.
We finally give an overview of challenges relative to the development of QKD
technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special
issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
Energy Dissipation and Trapping of Particles Moving on a Rough Surface
We report an experimental, numerical and theoretical study of the motion of a
ball on a rough inclined surface. The control parameters are , the diameter
of the ball, , the inclination angle of the rough surface and ,
the initial kinetic energy. When the angle of inclination is larger than some
critical value, , the ball moves at a constant average
velocity which is independent of the initial conditions. For an angle , the balls are trapped after moving a certain distance. The
dependence of the travelled distances on , and . is
analysed. The existence of two kinds of mechanisms of dissipation is thus
brought to light. We find that for high initial velocities the friction force
is constant. As the velocity decreases below a certain threshold the friction
becomes viscous.Comment: 8 pages RevTeX, 12 Postscript figure
Building a long term strategy for international collaboration in trustworthy ICT:Security, privacy and trust in global networks and services
This paper contains a summary of a significant amount of findings carried out collectively by a global research community specifically aimed at determining mutually beneficial and hot topics for international collaboration on the research and development of Trustworthy ICT. The paper highlights a sampling of these topics that were deemed to produce the most impact and it provides an introduction to the final recommendations of the INCO-Trust project, which was the main catalyst behind this initiative. The paper doesn't cover the extensive platforms, mechanisms, and systematic consensus building process in working groups based on workshops organised by the project to achieve its goals but instead focuses on the outcomes of the project. The key recommendations of the project will be used as a starting point for the recently start BIC project, whose objective is to include a number of new countries (Brazil, India and South Africa) into this already formed global community of ICT Trust and security researchers. © 2011 IEEE