Narrow your search

Library

FARO (2)

KU Leuven (2)

LUCA School of Arts (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)

More...

Resource type

book (5)


Language

English (4)

Undetermined (1)


Year
From To Submit

2022 (5)

Listing 1 - 5 of 5
Sort by

Book
Maillol : Ein anderer Blick = A Different View (Ausstellung Paris, Musée d'Orsay, 12.04 - 22.08.2022 ; Zürich, Kunsthaus, 'Aristide Maillol : Die Suche nach Harmonie', 07.10.2022 - 22.01.2023 ; Roubaix, La Piscine, 18.02.2023 - 21.05.2023).
Authors: --- ---
ISBN: 9783039421251 Year: 2022 Publisher: Zürich Zürich : Scheidegger & Spiess Kunsthaus Zürich,


Book
Integral Transformation, Operational Calculus and Their Applications
Author:
ISBN: 3036554823 3036554815 Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

The importance and usefulness of subjects and topics involving integral transformations and operational calculus are becoming widely recognized, not only in the mathematical sciences but also in the physical, biological, engineering and statistical sciences. This book contains invited reviews and expository and original research articles dealing with and presenting state-of-the-art accounts of the recent advances in these important and potentially useful subjects.

Keywords

Research & information: general --- Mathematics & science --- approximation operators --- differences of operators --- Szász–Mirakyan–Baskakov operators --- Durrmeyer type operators --- Bernstein polynomials --- modulus of continuity --- starlike functions --- subordination --- q-Differential operator --- k-Fibonacci numbers --- Lorentz invariant complex measures --- Minkowski space --- spectral decomposition --- measure convolution --- measure product --- Feynman propagator --- q-difference operator --- Janowski function --- meromorphic multivalent function --- distortion theorem --- partial sum --- closure theorem --- analytic functions --- multivalent (or p-valent) functions --- differential subordination --- q-derivative (or q-difference) operator --- Dunkel type integral inequality --- Schur-convexity --- majorization theory --- arithmetic mean-geometric mean (AM-GM) inequality --- Lerch function --- quadruple integral --- contour integral --- logarithmic function --- preinvex fuzzy mappings --- strongly preinvex fuzzy mappings --- strongly invex fuzzy mappings --- strongly fuzzy monotonicity --- strongly fuzzy mixed variational-like inequalities --- Fourier integral theorem --- double integral --- exponential function --- Catalan’s constant --- Aprey’s constant --- non-separable linear canonical wavelet --- symplectic matrix --- non-separable linear canonical transform --- uncertainty principle --- Fox–Wright function --- generalized hypergeometric function --- Mittag–Leffler function


Book
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Author:
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.

Keywords

Technology: general issues --- History of engineering & technology --- continuous-variable quantum key distribution --- measurement device independent --- zero-photon catalysis --- underwater channel --- quantum key distribution (QKD) --- discrete variable (DV)-QKD --- continuous variable (CV)-QKD --- postquantum cryptography (PQC) --- quantum communications networks (QCNs) --- quantum communications --- entanglement --- surface codes --- quantum cryptography --- quantum key distribution --- quantum network --- measurement-device-independent --- mean-king’s problem --- mean multi-kings’ problem --- information disturbance theorem --- QKD --- distillation --- amplification --- reconciliation --- quantum identity authentication --- private equality tests --- conclusive exclusion --- single-photon mode --- synchronization --- algorithm --- detection probability --- vulnerability --- twin-field quantum key distribution --- phase-matching --- discrete phase randomization --- intrinsic bit error rate --- the Bernstein-Vazirani algorithm --- EPR pairs --- quantum entanglement --- quantum information theory --- geometrical optics restricted eavesdropping --- secret key distillation --- satellite-to-satellite --- physical layer security --- secret key generation --- injection attacks --- jamming attacks --- pilot randomization --- clock synchronization --- Bayesian statistics --- oblivious transfer --- post-quantum cryptography --- universal composability --- n/a --- mean-king's problem --- mean multi-kings' problem


Book
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Author:
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.


Book
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Author:
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.

Listing 1 - 5 of 5
Sort by