搜索结果: 1-14 共查到“Eavesdropping”相关记录14条 . 查询时间(0.056 秒)
Humans identify negative (but not positive) arousal in silver fox vocalizations: Implications for the adaptive value of interspecific eavesdropping
eavesdropping emotional arousal emotional valence
2017/8/28
The ability to identify emotional arousal in heterospecific vocalizations may facilitate behaviors that increase survival opportunities. Crucially, this ability may orient inter-species interactions, ...
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
Honey Encryption Language model
2017/2/20
There have been many efforts to strengthen security of Instant Messaging (IM) system. One of the typical technologies is the conventional message encryption using a secret or private key. However, the...
Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications
foundations quantum cryptography
2014/3/11
What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators can not detect the eavesdropping. The gene...
Revisiting Symmetric Incoherent Optimal Eavesdropping in BB84 Protocol
Bias Advantage BB84 Protocol Key Distribution Optimal Eavesdropping Quantum Communication Quantum Cryptography Sequence
2012/3/22
The famous BB84 protocol relies on the conjugate bases $Z=\{|0\rangle$, $|1\rangle\}$ and $X=\left\{|+\rangle,|-\rangle\right\}$, where $|+\rangle = \frac{|0 \rangle + |1\rangle}{\sqrt{2}}$ and $|-\ra...
Revisiting Symmetric Incoherent Optimal Eavesdropping in BB84 Protocol
Bias Advantage BB8 Protocol Key Distribution Optimal Eavesdropping Quantum Communication Quantum Cryptography Sequence
2012/3/21
The famous BB84 protocol relies on the conjugate bases $Z=\{|0\rangle$, $|1\rangle\}$ and $X=\left\{|+\rangle,|-\rangle\right\}$, where $|+\rangle = \frac{|0 \rangle + |1\rangle}{\sqrt{2}}$ and $|-\ra...
Perfect eavesdropping on a quantum cryptography system
cryptography system Quantum Physics
2010/11/8
The stated goal of quantum key distribution (QKD) is to grow a secret key securely between two parties with a minimum of additional assumptions. The number of assumptions has been continuously reduced...
Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks
Eavesdropping Adversarial Attacks
2010/12/6
We address the problem of securing distributed storage systems against eavesdropping and adversarial attacks. An important aspect of these systems is node failures over time, ecessitating, thus, a rep...
We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious errors. We provide polynomial-tim...
The National Security Agency (NSA) eavesdropping on Americans--A programme that is neither legal nor necessary
FISA warrantless wiretapping eavesdropping National Security Agency (NSA) presidential power
2009/11/27
On 16 December 2005, the New York Times reported that the President had authorized the National Security Agency (NSA) to spy on Americans, inside the United States, without first obtaining a warrant f...
Eavesdropping of two-way coherent-state quantum cryptography via Gaussian quantum cloning machines
two-way coherent-state quantum cryptography Gaussian quantum cloning machines
2010/4/9
We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Physics 4, 726 (2008)]. This protocol consists in a two-way quantum communication betwee...
Quantum Resonance near Optimal Eavesdropping in Quantum Cryptography
Quantum Optimal Eavesdropping Quantum Cryptography
2010/4/7
We find a resonance behavior in the disturbance when an eavesdropper chooses a near-optimal strategy intentionally or unintentionally when the usual Bennett-Brassard cryptographic scheme is performed ...
Eavesdropping on ET?
Astrophysics Meeting
2007/2/6
An Empirical Method for Comparing Pitch Patterns in Spoken and Musical Melodies: A Comment on J.G.S. Pearl's “Eavesdropping with a Master: Leos Janácek and the Music of Speech.”
speech intonation musical melody perception melodic contour computational models
2010/9/26
Music and speech both feature structured melodic patterns, yet these
patterns are rarely compared using empirical methods. One reason for this has been a
lack of tools which allow quantitative compa...
Eavesdropping with a Master: Leos Janácek and the Music of Speech
Leo Janá ek cognition speech prosody Czech language transcription
2010/9/26
The composer Leo Janáek (1854-1928) has been noted for his interest in
speech melodies. Little discussion has focused however on the field methods that he used
in gathering them,...