Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Thomas Themel"'
Autor:
Harald Weinfurter, Jérôme Lodewyck, A. Marhold, Thomas Länger, Simon Fossier, Patrick Trinkler, Henning Weier, Momtchil Peev, Andreas Happe, Christoph Pacher, Matthieu Legre, Nicolas Gisin, Y. Hasani, Hannes Hübel, Jan Bouda, Alexander Treiber, Fabien Vannel, Claudio Barreiro, Sebastian Nauerth, Michael Hentschel, Anton Zeilinger, Andreas Poppe, O. Maurhart, T. Debuisschert, G. Ribordy, W. Boxleitner, Mehrdad Dianati, M. Suda, Norbert Lütkenhaus, J-B. Page, M. Furst, C. Tamas, Roland Lieger, L. Monat, Ilse Wimberger, Yann Thoma, Sandrine Fasel, Hugo Zbinden, E. Querasser, Zhiliang Yuan, Thomas Themel, Thomas Matyus, James F. Dynes, Andrew J. Shields, Eleni Diamanti, G. Humer, Thomas Lorünser, Damien Stucki, S. Robyr, Andrew W. Sharpe, Louis Salvail, J. D. Gautier, Rosa Tualle-Brouri, Romain Alléaume, Rob Thew, Nino Walenta, Philippe Grangier
Publikováno v:
New Journal of Physics, Vol. 11, No 7 (2009) P. 075001
New Journal of Physics
New Journal of Physics, Institute of Physics: Open Access Journals, 2009, 11, pp.075001. ⟨10.1088/1367-2630/11/7/075001⟩
New Journal of Physics, 2009, 11, pp.075001. ⟨10.1088/1367-2630/11/7/075001⟩
New Journal of Physics
New Journal of Physics, Institute of Physics: Open Access Journals, 2009, 11, pp.075001. ⟨10.1088/1367-2630/11/7/075001⟩
New Journal of Physics, 2009, 11, pp.075001. ⟨10.1088/1367-2630/11/7/075001⟩
In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004–2008), unifying the efforts of 41 research and industrial organi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2481c1e8954f7ecb1b0de3a501fd12e4
https://archive-ouverte.unige.ch/unige:11787
https://archive-ouverte.unige.ch/unige:11787
Publikováno v:
ACM International Conference Proceeding Series; 8/29/2017, p1-8, 8p
Publikováno v:
2013 IEEE Symposium on Security & Privacy; 2013, p301-315, 15p
Autor:
Joel Reardon
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problema