Zobrazeno 1 - 10
of 128
pro vyhledávání: '"Emil Simion"'
Autor:
Mircea Merca, Emil Simion
Publikováno v:
Symmetry, Vol 15, Iss 11, p 2067 (2023)
The partitions in which the parts of size n can come in n different colors are known as n-color partitions. For r∈{0,1}, let QLr(n) be the number of n-color partitions of n into distinct parts which have a number of parts congruent to r modulo 2. I
Externí odkaz:
https://doaj.org/article/6a50a3bec6fd41a1ad0de585a97f2d5f
Autor:
Emil Simion
Publikováno v:
IEEE Access, Vol 8, Pp 74553-74561 (2020)
This work is dedicated to the construction and evaluation of random number generators used in cryptography. The critical element on which the security of information is based is the cryptographic key (usually a binary sequence). In order to be resist
Externí odkaz:
https://doaj.org/article/ec36252d8cc642cabbc9ef0662493c70
Autor:
Ioana BRĂNESCU, Emil SIMION
Publikováno v:
Romanian Cyber Security Journal. 5:87-95
Publikováno v:
Romanian Cyber Security Journal. 4:77-85
Publikováno v:
Carpathian Journal of Electrical Engineering, Vol 8, Iss 1, Pp 13-25 (2014)
The paper presents an evaluation of analytical self and mutual impedances formulas of lines with earth return, taking into account the ground correction terms. The determined formulas contain semi-infinite integral terms which are calculated by a nov
Externí odkaz:
https://doaj.org/article/4daeed11881748e2ad6d21a7df931421
Autor:
Mihai-Zicu Mina, Emil Simion
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783031175091
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::849d9c5280ea20d0a974f4ffd791aac3
https://doi.org/10.1007/978-3-031-17510-7_16
https://doi.org/10.1007/978-3-031-17510-7_16
Autor:
Emil Simion, Mihai-Zicu Mina
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783030692544
SECITC
SECITC
In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we provide a theoretical discussion of the steps Alice and Bob take to reach a shared secret using this protocol, while an eavesdropper Eve is either in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3a9679bf2f42044d3e03485f92e75698
https://doi.org/10.1007/978-3-030-69255-1_7
https://doi.org/10.1007/978-3-030-69255-1_7
Autor:
Denisa Stet, Emil Simion, Stefan F. Braicu, Alexandru Muresan, Andrei Ceclan, Levente Czumbil, Alexis Polycarpou, Dan D. Micu
Publikováno v:
2019 8th International Conference on Modern Power Systems (MPS).
The paper studies the magnetic and electric field distribution around a Romanian high voltage overhead power line and an electrified railway traction system in order to highlight the induced voltages in nearby metallic structure. Numerical simulation
Autor:
Emil Simion, Diana Maimuţ
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783030129415
SecITC
SecITC
Probabilities govern our day to day lives. Undoubtedly, we construct many of our judgments based on assumptions. A scientific example is the case of public-key encryption, where hardness assumptions are the main ingredient of provable security. But,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5413f2ec44b17ff1ea3c9eda8076192f
https://doi.org/10.1007/978-3-030-12942-2_3
https://doi.org/10.1007/978-3-030-12942-2_3
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783030129415
SecITC
SecITC
The ransomware nightmare is taking over the internet, impacting common users, small businesses and large ones. The interest and investment which is pushed into this market each month, tell us a few things about the evolution of both technical and soc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0bbe7c1112eb994d2819b3d1533f6c52
https://doi.org/10.1007/978-3-030-12942-2_20
https://doi.org/10.1007/978-3-030-12942-2_20