咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 14 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 理学
    • 12 篇 物理学
    • 4 篇 数学
    • 1 篇 统计学(可授理学、...
  • 10 篇 工学
    • 10 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 2 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 控制科学与工程
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 3 篇 法学
    • 2 篇 法学
    • 1 篇 社会学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 5 篇 quantum theory
  • 3 篇 quantum optics
  • 3 篇 cryptography
  • 2 篇 quantum computin...
  • 2 篇 operating system...
  • 2 篇 computers and so...
  • 2 篇 computer communi...
  • 2 篇 digital watermar...
  • 2 篇 management of co...
  • 2 篇 cryptology
  • 2 篇 algorithm analys...
  • 2 篇 lakes
  • 1 篇 program debuggin...
  • 1 篇 conferences
  • 1 篇 photodetectors
  • 1 篇 quantum noise
  • 1 篇 registers
  • 1 篇 database systems
  • 1 篇 mobile devices
  • 1 篇 quantum entangle...

机构

  • 6 篇 department of ph...
  • 4 篇 centre for advan...
  • 3 篇 centre for advan...
  • 2 篇 department of co...
  • 2 篇 centre for advan...
  • 2 篇 department of ph...
  • 2 篇 department of ph...
  • 1 篇 department of ph...
  • 1 篇 quantum entangle...
  • 1 篇 department of ph...
  • 1 篇 department of ph...
  • 1 篇 university of lu...
  • 1 篇 dept. of physics...
  • 1 篇 departmnent of p...
  • 1 篇 fujian normal un...
  • 1 篇 quantum entangle...
  • 1 篇 oregon center fo...
  • 1 篇 centre for advan...
  • 1 篇 centre for advan...
  • 1 篇 school of inform...

作者

  • 14 篇 pieprzyk josef
  • 9 篇 barry c. sanders
  • 5 篇 gupta gaurav
  • 4 篇 dominic w. berry
  • 4 篇 stephen d. bartl...
  • 4 篇 wang huaxiong
  • 3 篇 josef pieprzyk
  • 3 篇 huaxiong wang
  • 2 篇 matusiewicz krys...
  • 2 篇 zhang xian-mo
  • 2 篇 sanders
  • 2 篇 sanders b.c.
  • 1 篇 mang feng
  • 1 篇 berry d.w.
  • 1 篇 berry
  • 1 篇 t.c. ralph
  • 1 篇 m.g. raymer
  • 1 篇 gaurav gupta
  • 1 篇 zhang xiam-mo
  • 1 篇 nikolic ivica

语言

  • 34 篇 英文
检索条件"机构=Centre for Advanced Computing Algorithms and Cryptography"
34 条 记 录,以下是11-20 订阅
排序:
Formal analysis of card-based payment systems in mobile devices
Conferences in Research and Practice in Information Technolo...
收藏 引用
Conferences in Research and Practice in Information Technology Series 2006年 54卷 213-220页
作者: Pasupathinathan, Vijayakrishnan Pieprzyk, Josef Wang, Huaxiong Cho, Joo Yeon Centre for Advanced Computing - Algorithms and Cryptography Division of Information and Communication Sciences Macquarie University Sydney Australia
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCar... 详细信息
来源: 评论
Formal analysis of card-based payment systems in mobile devices  06
Formal analysis of card-based payment systems in mobile devi...
收藏 引用
Australasian Workshops on Grid computing and E-research
作者: Vijayakrishnan Pasupathinathan Josef Pieprzyk Huaxiong Wang Joo Yeon Cho Centre for Advanced Computing - Algorithms and Cryptography Division of Information and Communication Sciences Macquarie University Sydney Australia
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCar... 详细信息
来源: 评论
Analysis of simplified variants of SHA-256
Analysis of simplified variants of SHA-256
收藏 引用
1st Western European Workshop on Research in Cryptology, WEWoRC 2005
作者: Matusiewicz, Krystian Pieprzyk, Josef Pramstaller, Norbert Rechberger, Christian Rijmen, Vincent Centre for Advanced Computing Algorithms and Cryptography Department of Computing Macquarie University NSW 2106 Australia Graz University of Technology Inffeldgasse 16a A-8010 Graz Austria
In this paper we analyse the role of some of the building blocks of SHA-256. We show that the disturbance-correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ σ are vital for t...
来源: 评论
Ideal threshold schemes from MDS codes
Ideal threshold schemes from MDS codes
收藏 引用
5th International Conference on Information Security and Cryptology, ICISC 2002
作者: Pieprzyk, Josef Zhang, Xian-Mo Centre for Advanced Computing – Algorithms and Cryptography Department of Computing Macquarie University SydneyNSW Australia
We observe that MDS codes have interesting properties that can be used to construct ideal threshold schemes. These schemes permit the combiner to detect cheating, identify cheaters and recover the correct secret. The ...
来源: 评论
Quantum noise measurements of electron states via phase sensitive detection
Quantum noise measurements of electron states via phase sens...
收藏 引用
Quantum Electronics and Laser Science, QELS 2003
作者: Bartlett, S.D. Sanders, B.C. Department of Physics and Centre for Advanced Computing - Algorithms and Cryptography Macquarie university Sydney2109 Australia
We introduce electron field coherent states that exhibit full coherence. We employ these states in developing a theory of phase-sensitive homodyne detection and measuring the current noise benchmarked against the stan... 详细信息
来源: 评论
Relations for classical communication capacity and entanglement capability of two-qubit operations
收藏 引用
Physical Review A 2003年 第4期67卷 040302(R)-040302(R)页
作者: Dominic W. Berry Barry C. Sanders Department of Physics and Centre for Advanced Computing—Algorithms and Cryptography Macquarie University Sydney New South Wales 2109 Australia
Bipartite operations underpin both classical communication and entanglement generation. Using a superposition of classical messages, we show that the capacity of a two-qubit operation for error-free entanglement-assis... 详细信息
来源: 评论
Relation between classical communication capacity and entanglement capability for two-qubit unitary operations
收藏 引用
Physical Review A 2003年 第3期68卷 032312-032312页
作者: Dominic W. Berry Barry C. Sanders Department of Physics and Centre for Advanced Computing—Algorithms and Cryptography Macquarie University Sydney New South Wales 2109 Australia
Two-qubit operations may be characterized by their capacities for communication, both with and without free entanglement, and their capacity for creating entanglement. We establish a set of inequalities that give an o... 详细信息
来源: 评论
Optimal Remote State Preparation
收藏 引用
Physical Review Letters 2003年 第5期90卷 057901-057901页
作者: Dominic W. Berry Barry C. Sanders Department of Physics and Centre for Advanced Computing—Algorithms and Cryptography Macquarie University Sydney New South Wales 2109 Australia
We prove that it is possible to remotely prepare an ensemble of noncommuting mixed states using communication equal to the Holevo information for this ensemble. This remote preparation scheme may be used to convert be... 详细信息
来源: 评论
Threshold MACs
Threshold MACs
收藏 引用
5th International Conference on Information Security and Cryptology, ICISC 2002
作者: Martin, Keith M. Pieprzyk, Josef Safavi-Naini, Rei Wang, Huaxiong Wild, Peter R. Information Security Group Royal Holloway University of London Egham Surrey United Kingdom Centre for Advanced Computing–Algorithms and Cryptography Department of Computing Macquarie University North RydeNSW Australia Centre for Computer Security Research School of Information Technology and Computer Science University of Wollongong Northfields Avenue Wollongong Australia
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants o...
来源: 评论
Multipartite entangled states in coupled quantum dots and cavity QED
收藏 引用
Physical Review A 2003年 第2期67卷 022302-022302页
作者: Xiaoguang Wang Mang Feng Barry C. Sanders Department of Physics and Centre for Advanced Computing—Algorithms and Cryptography Macquarie University Sydney New South Wales 2109 Australia Institute for Scientific Interchange (ISI) Foundation Viale Settimio Severo 65 I-10133 Torino Italy
We investigate the generation of multipartite entangled state in a system of N quantum dots embedded in a microcavity and examine the emergence of genuine multipartite entanglement by three different characterizations... 详细信息
来源: 评论