首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   52篇
  免费   19篇
  国内免费   4篇
力学   1篇
综合类   6篇
数学   21篇
物理学   47篇
  2023年   1篇
  2016年   3篇
  2015年   1篇
  2014年   7篇
  2013年   3篇
  2012年   1篇
  2011年   10篇
  2010年   12篇
  2009年   11篇
  2008年   9篇
  2007年   3篇
  2006年   8篇
  2005年   3篇
  2004年   2篇
  2002年   1篇
排序方式: 共有75条查询结果,搜索用时 15 毫秒
41.
姚赞 《数学大王》2010,(2):26-26
生活中处处都有数学。我们知道,有趣的十二生肖也藏着数学秘密呢! 假如每个人出生在各生肖年上的几率相等,那么至少在多少个人的群体中,使其中至少有2个人出生在同一个生肖上的几率高于群体中每个人的生肖都不同的几率?  相似文献   
42.
We propose a quantum secure communication protocol by using three-particle GHZ states. In this protocol, we utilize the ideas of the rearranging orders and the sequence transmission. The sender of messages, Alice, first disturbs the particle orders in an initial sequence, and then sends the sequence of the disturbed orders to the receiver of messages, Bob. Under Alice's introduction, Bob rearranges the sequence back to the initial sequence. By making a GHZ state measurement on each of the three particles in turn, Bob can attain Alice's secret messages. In addition, we still calculate the efficiency of our three-particle GHZ protocol and generalize it to the case using multi-particle GHZ state.  相似文献   
43.
Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein- Podolsky Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators.  相似文献   
44.
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group can illegally obtain most secret messages without introducing any error. Finally, a possible way to avoid the security flaw is suggested.  相似文献   
45.
A theoretical protocol of quantum dialogue is proposed, which uses a class of three-photon W states as quantum channel. After two-step security check, four-bit secret message can be transmitted to each other by transmitting of single photon with the aid of two-bit classical information.  相似文献   
46.
We present a two-photon three-dimensional multiparty quantum secret sharing scheme. The secret messages are encoded by performing local operations. This is different from those quantum secret sharing protocols that all sharers must make a state measurement. The merit of our protocol is the high capacity.  相似文献   
47.
Two efficient protocols of quantum secure direct communication with authentication [Chin. Phys. Lett. 25 (2008) 2354] were recently proposed by Liu et al. to improve the efficiency of two protocols presented in [Phys. Rev. A 75 (2007) 026301] by four Pauli operations. We show that the high efficiency of the two protocols is at the expense of their security. The authenticator Trent can reach half the secret by a particular attack strategy in the first protocol. In the second protocol, not only Trent but also an eavesdropper outside can elicit half-information about the secret from the public declaration.  相似文献   
48.
49.
禁止踩、摘鲜花! 严禁踩、摘鲜花! 鲜花也有生命! 爱惜鲜花人人有责! 吉吉镇的街心花园已更换了无数告示牌。可是,花园里移植的鲜花不是被人偷偷摘走,就是被大家踩踏得一塌糊涂。  相似文献   
50.
A secret sharing system can be damaged when the dealer cheating occurs. In this paper,two kinds of secret sharing schemes based on linear code are proposed. One is a verifiable scheme which each participant can verify his own share from dealer‘s distribution and ensure each participant to receive valid share. Another does not have a trusted center, here, each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号