首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
数学   6篇
物理学   5篇
  2016年   1篇
  2015年   2篇
  2014年   1篇
  2013年   1篇
  2010年   1篇
  2009年   1篇
  2000年   1篇
  1999年   1篇
  1990年   2篇
排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
2.
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.  相似文献   
3.
4.
We study the fermion zero-mode dynamics for open strings ending on the giant graviton branes. For the open string ending on the Z=0Z=0 brane, the quantization of the fermion zero-modes of boundary giant magnons reproduces the 256 states of the boundary degrees with the precise realization of the SU(2|2)×SU(2|2)SU(2|2)×SU(2|2) symmetry algebra. Also for the open string ending on the Y=0Y=0 brane, we reproduce the unique vacuum state from the fermion zero-modes.  相似文献   
5.
Conflict-avoiding codes (CACs) have played an important role in multiple-access collision channel without feedback. The size of a CAC is the number of codewords which equals the number of potential users that can be supported in the system. A CAC with maximal code size is said to be optimal. The use of an optimal CAC enables the largest possible number of asynchronous users to transmit information efficiently and reliably. In this paper, the maximal sizes of both equidifference and non equidifference CACs of odd prime length and weight 3 are obtained. Meanwhile, the optimal constructions of both equidifference and non equidifference CACs are presented. The numbers of equidifference and non equidifference codewords in an optimal code are also obtained. Furthermore, a new modified recursive construction of CACs for any odd length is shown. Non equidifference codes can be constructed in this method.  相似文献   
6.
Kim  Dongsu  Zeng  Jiang 《The Ramanujan Journal》2000,4(4):421-427
We study the combinatorics of a continued fraction formula due to Wall. We also derive the orthogonality of little q-Jacobi polynomials from this formula, as Wall did for little q-Laguerre polynomials.  相似文献   
7.
8.
We give a weight-preserving bijection from r, µ m to, where r, µ m is the set of all plane partitions whose entries are m and whose entries below ther-th row form a column strict plane partition of type, and µ m the set of all column strict plane partitions of type whose entries are m, and the set of all plane partitions with at mostr rows, whose entries are m. This confirms a conjecture of Kadell.  相似文献   
9.
Kim  Dongsu  Yee  Ae Ja 《The Ramanujan Journal》1999,3(2):227-231
Bousquet-Mélou and Eriksson showed that the number of partitions of n into distinct parts whose alternating sum is k is equal to the number of partitions of n into k odd parts, which is a refinement of a well-known result by Euler. We give a different graphical interpretation of the bijection by Sylvester on partitions into distinct parts and partitions into odd parts, and show that the bijection implies the above statement.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号