2,681,619 research outputs found
Timed Analysis of Security Protocols
We propose a method for engineering security protocols that are aware of
timing aspects. We study a simplified version of the well-known Needham
Schroeder protocol and the complete Yahalom protocol, where timing information
allows the study of different attack scenarios. We model check the protocols
using UPPAAL. Further, a taxonomy is obtained by studying and categorising
protocols from the well known Clark Jacob library and the Security Protocol
Open Repository (SPORE) library. Finally, we present some new challenges and
threats that arise when considering time in the analysis, by providing a novel
protocol that uses time challenges and exposing a timing attack over an
implementation of an existing security protocol
Secure Coherent-state Quantum Key Distribution Protocols with Efficient Reconciliation
We study the equivalence between a realistic quantum key distribution
protocol using coherent states and homodyne detection and a formal entanglement
purification protocol. Maximally-entangled qubit pairs that one can extract in
the formal protocol correspond to secret key bits in the realistic protocol.
More specifically, we define a qubit encoding scheme that allows the formal
protocol to produce more than one entangled qubit pair per coherent state, or
equivalently for the realistic protocol, more than one secret key bit. The
entanglement parameters are estimated using quantum tomography. We analyze the
properties of the encoding scheme and investigate its application to the
important case of the attenuation channel.Comment: REVTeX, 11 pages, 2 figure
Emotion processing and social participation following stroke : study protocol
Peer reviewedPublisher PD
Security of Quantum Key Distribution with Entangled Qutrits
The study of quantum cryptography and quantum non-locality have
traditionnally been based on two-level quantum systems (qubits). In this paper
we consider a generalisation of Ekert's cryptographic protocol [Ekert] where
qubits are replaced by qutrits. The security of this protocol is related to
non-locality, in analogy with Ekert's protocol. In order to study its
robustness against the optimal individual attacks, we derive the information
gained by a potential eavesdropper applying a cloning-based attack.Comment: 9 pages original version: july 2002, replaced in january 2003
(reason: minor changes
Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution
We study the impact of the finite-size effect on the continuous-variable
measurement-device-independent quantum key distribution (CV-MDI QKD) protocol,
mainly considering the finite-size effect on the parameter estimation
procedure. The central-limit theorem and maximum likelihood estimation theorem
are used to estimate the parameters. We also analyze the relationship between
the number of exchanged signals and the optimal modulation variance in the
protocol. It is proved that when Charlie's position is close to Bob, the CV-MDI
QKD protocol has the farthest transmission distance in the finite-size
scenario. Finally, we discuss the impact of finite-size effects related to the
practical detection in the CV-MDI QKD protocol. The overall results indicate
that the finite-size effect has a great influence on the secret key rate of the
CV-MDI QKD protocol and should not be ignored.Comment: 9 pages, 9 figure
Designing Network Protocols for Good Equilibria
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol to optimize the equilibrium behavior of a network with selfish users. We consider network cost-sharing games, where the set of Nash equilibria depends fundamentally on the choice of an edge cost-sharing protocol. Previous research focused on the Shapley protocol, in which the cost of each edge is shared equally among its users. We systematically study the design of optimal cost-sharing protocols for undirected and directed graphs, single-sink and multicommodity networks, and different measures of the inefficiency of equilibria. Our primary technical tool is a precise characterization of the cost-sharing protocols that induce only network games with pure-strategy Nash equilibria. We use this characterization to prove, among other results, that the Shapley protocol is optimal in directed graphs and that simple priority protocols are essentially optimal in undirected graphs
FIRE (facilitating implementation of research evidence) : a study protocol
Research evidence underpins best practice, but is not always used in healthcare. The Promoting Action on Research Implementation in Health Services (PARIHS) framework suggests that the nature of evidence, the context in which it is used, and whether those trying to use evidence are helped (or facilitated) affect the use of evidence. Urinary incontinence has a major effect on quality of life of older people, has a high prevalence, and is a key priority within European health and social care policy. Improving continence care has the potential to improve the quality of life for older people and reduce the costs associated with providing incontinence aids
Game-theoretic perspective of Ping-Pong Protocol
We analyse Ping-Pong protocol from the point of view of a game. The analysis
helps us in understanding the different strategies of a sender and an
eavesdropper to gain the maximum payoff in the game. The study presented here
characterizes strategies that lead to different Nash equilibriums. We further
demonstrate the condition for Pareto optimality depending on the parameters
used in the game. Moreover, we also analysed LM05 protocol and compared it with
PP protocol from the point of view of a generic two-way QKD game with or
without entanglement. Our results provide a deeper understanding of general
two-way QKD protocols in terms of the security and payoffs of different
stakeholders in the protocol
National survey of the Portuguese elderly nutritional status : study protocol
Acknowledgements We acknowledge the IAN-AF team (in particular to Duarte Torres, Milton Severo and Andreia Oliveira) for the community sampling and their support on dietary assessment methodology and critical discussion along the elaboration of the present protocol. Funding This project (136SI5) was granted by the Public Health Initiatives Programme (PT06), financed by EEA Grants Financial Mechanism 2009-2014.Peer reviewedPublisher PD
- …
