Sample records for d1 key results

  1. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  2. Appendix D-1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    All references to "NREL" in this subcontract shall mean the Alliance for Sustainable Energy, LLC. Appendix D-1 July 11, 2014 Page 2 of 37 APPENDIX D-1 INDEX Clause Title Page...

  3. Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC

    E-Print Network [OSTI]

    Yu, Meng-Day (Mandel)

    We describe a PUF design with integrated error correction that is robust to various layout implementations and achieves excellent and consistent results in each of the following four areas: Randomness, Uniqueness, Bias and ...

  4. Key Research Results Achievement

    E-Print Network [OSTI]

    , such as: · Methods to significantly improve lighting power densities and building envelopes · Detailed

  5. Key Research Results Achievement

    E-Print Network [OSTI]

    market. NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency Transparent Conductors Have Potential for Thin-Film Photovoltaics Possible alternatives to transparent-film photovoltaics (PV). Networks made of single-walled carbon nanotubes (SWCNTs), metallic NWs, and graphene thin

  6. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  7. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  8. MODULE TITLE: 4D1B Advanced Microprocessor Systems CODE: CS4D1B

    E-Print Network [OSTI]

    O'Mahony, Donal E.

    MODULE TITLE: 4D1B Advanced Microprocessor Systems CODE: CS4D1B LEVEL: Senior Sophister (Mandatory Sophister CS3D2 Microprocessor Systems 2 module, focusing on those aspects of microprocessor architectures of the close relationship between microprocessor architectures and the performance achieved by the programs

  9. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  10. U.S. Geothermal Announces More Test Results From the Neal Hot Springs Production Well and a Key Addition to Senior Staff

    Broader source: Energy.gov [DOE]

    U.S. Geothermal Inc. ("U.S. Geothermal"), a renewable energy company focused on the production of electricity from geothermal energy, announced today results from a second, higher rate flow test of the first full size production well (NHS-1) at the Neal Hot Springs Project.

  11. Alkaline Leaching of Key, Non-Radioactive Components from Simulants and Hanford Tank Sludge 241-S-110: Results of FY01 Studies

    SciTech Connect (OSTI)

    Rapko, Brian M.; Vienna, John D.; Sinkov, Serguei I.; Kim, Jinseong; Cisar, Alan J.

    2002-09-10T23:59:59.000Z

    This study addressed three aspects in selected alkaline leaching: first, the use of oxidants persulfate, permanganate, and ferrate as selective chromium-leaching agents from washed Hanford Tank S-110 solids under varying conditions of hydroxide concentration, temperature, and time was investigated. Second, the selective dissolution of solids containing mercury(II) oxide under alkaline conditions was examined. Various compounds were studied for their effectiveness in dissolving mercury under varying conditions of time, temperature, and hydroxide concentration in the leachate. Three compounds were studied: cysteine, iodide, and diethyldithiophosphoric acid (DEDTPA). Finally, the possibility of whether an oxidant bound to an anion-exchange resin can be used to effectively oxidize chromium(III) in alkaline solutions was addressed. The experimental results remain ambiguous to date; further work is required to reach any definitive conclusions as to the effectiveness of this approach.

  12. Nucleic acid sequences encoding D1 and D1/D2 domains of human coxsackievirus and adenovirus receptor (CAR)

    DOE Patents [OSTI]

    Freimuth, Paul I.

    2010-04-06T23:59:59.000Z

    The invention provides recombinant human CAR (coxsackievirus and adenovirus receptor) polypeptides which bind adenovirus. Specifically, polypeptides corresponding to adenovirus binding domain D1 and the entire extracellular domain of human CAR protein comprising D1 and D2 are provided. In another aspect, the invention provides nucleic acid sequences encoding these domains and expression vectors for producing the domains and bacterial cells containing such vectors. The invention also includes an isolated fusion protein comprised of the D1 polypeptide fused to a polypeptide which facilitates folding of D1 when expressed in bacteria. The functional D1 domain finds application in a therapeutic method for treating a patient infected with a CAR D1-binding virus, and also in a method for identifying an antiviral compound which interferes with viral attachment. The invention also provides a method for specifically targeting a cell for infection by a virus which binds to D1.

  13. Wind Vision: Analysis Highlights and Key Results

    Wind Powering America (EERE)

    aviation & radar, public acceptance, etc. BENEFITS * Greenhouse gas emissions reduction * Air pollution impacts * Water usage reduction IMPACTS * Energy diversity and risk...

  14. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires may contribute more to globalWind

  15. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  16. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  17. Buildings and Areas 1001 Broadway Building D1 BDWY

    E-Print Network [OSTI]

    Carter, John

    Design (LEED) Green Building Rating System is a nationally accepted benchmark for the designBuildings and Areas 1001 Broadway Building D1 BDWY 1313 East Columbia Building B3 CLMB Administration Building D1 ADMN Admissions & C2 ADAL Alumni Building Archbishop Murphy A1 ATMA Apartments Arrupe

  18. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  19. Uniform Gauge for D1-brane in General Background

    E-Print Network [OSTI]

    Kluson, J

    2015-01-01T23:59:59.000Z

    We construct uniform gauge D1-brane action in general background. We also discuss how this action transforms under double Wick rotation and determine transformation properties of background fields.

  20. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  1. ANALYSIS OF BIOLOGICAL BENEFITS APPENDIX D FISH AND WILDLIFE PROGRAM D-1 December 15, 1994

    E-Print Network [OSTI]

    ANALYSIS OF BIOLOGICAL BENEFITS APPENDIX D FISH AND WILDLIFE PROGRAM D-1 December 15, 1994 Appendix D STAFF ANALYSIS OF BIOLOGICAL BENEFITS OF MAINSTEM PASSAGE ACTIONS During the course. This report provides the results of the biological analysis of the adopted actions. The package was termed

  2. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  3. D1 Oils China Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationinConcentratingEnergyCoosaPage EditCrystalsolapprovalCzechD1 OilsD1

  4. Linda Hill, Ph.D.1 Olha Buchel, MLS.1

    E-Print Network [OSTI]

    Janée, Greg

    . The agendas for digital library and classification research in relating to KOS are also proposed. [Keywords ( ) [] [] Integration of Knowledge Organization Systems into Digital Library Architectures Linda Hill, Ph.D.1 Olha Buchel, MLS.1 Greg Janée, MS.1 Marcia Lei Zeng, Ph.D.2 1 (Alexandria Digital Library Project, University

  5. Underground storage tank 511-D1U1 closure plan

    SciTech Connect (OSTI)

    Mancieri, S.; Giuntoli, N.

    1993-09-01T23:59:59.000Z

    This document contains the closure plan for diesel fuel underground storage tank 511-D1U1 and appendices containing supplemental information such as staff training certification and task summaries. Precision tank test data, a site health and safety plan, and material safety data sheets are also included.

  6. Emission from the D1D5 CFT

    E-Print Network [OSTI]

    Steven G. Avery; Borun D. Chowdhury; Samir D. Mathur

    2009-11-06T23:59:59.000Z

    It is believed that the D1D5 brane system is described by an 'orbifold CFT' at a special point in moduli space. We first develop a general formulation relating amplitudes in a d-dimensional CFT to absorption/emission of quanta from flat infinity. We then construct the D1D5 vertex operators for minimally coupled scalars in supergravity, and use these to compute the CFT amplitude for emission from a state carrying a single excitation. Using spectral flow we relate this process to one where we have emission from a highly excited initial state. In each case the radiation rate is found to agree with the radiation found in the gravity dual.

  7. Emission from the D1D5 CFT: Higher Twists

    E-Print Network [OSTI]

    Steven G. Avery; Borun D. Chowdhury

    2009-07-10T23:59:59.000Z

    We study a certain class of nonextremal D1D5 geometries and their ergoregion emission. Using a detailed CFT computation and the formalism developed in arXiv:0906.2015 [hep-th], we compute the full spectrum and rate of emission from the geometries and find exact agreement with the gravity answer. Previously, only part of the spectrum had been reproduced using a CFT description. We close with a discussion of the context and significance of the calculation.

  8. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  9. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  10. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  11. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  12. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  13. Sphere-plate Casimir interaction in (D + 1)-dimensional spacetime

    SciTech Connect (OSTI)

    Teo, L. P., E-mail: LeePeng.Teo@nottingham.edu.my [Department of Applied Mathematics, Faculty of Engineering, University of Nottingham Malaysia Campus, Jalan Broga, 43500 Semenyih, Selangor Darul Ehsan (Malaysia)

    2014-04-15T23:59:59.000Z

    In this paper, we derive the formula for the Casimir interaction energy between a sphere and a plate in (D + 1)-dimensional Minkowski spacetime. It is assumed that the scalar field satisfies the Dirichlet or Neumann boundary conditions on the sphere and the plate. As in the D = 3 case, the formula is of TGTG type. One of our main contributions is deriving the translation matrices which express the change of bases between plane waves and spherical waves for general D. Using orthogonality of Gegenbauer polynomials, it turns out that the final TGTG formula for the Casimir interaction energy can be simplified to one that is similar to the D = 3 case. To illustrate the application of the formula, both large separation and small separation asymptotic behaviors of the Casimir interaction energy are computed. The large separation leading term is proportional to L{sup ?D+1} if the sphere is imposed with Dirichlet boundary condition, and to L{sup ?D?1} if the sphere is imposed with Neumann boundary condition, where L is distance from the center of the sphere to the plane. For the small separation asymptotic behavior, it is shown that the leading term is equal to the one obtained using proximity force approximation. The next-to-leading order term is also computed using perturbation method. It is shown that when the space dimension D is larger than 5, the next-to-leading order has sign opposite to the leading order term. Moreover, the ratio of the next-to-leading order term to the leading order term is linear in D, indicating a larger correction at higher dimensions.

  14. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  15. D1 Oils CEEP JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationinConcentratingEnergyCoosaPage EditCrystalsolapprovalCzechD1 Oils

  16. D1 Williamson Magor Bio Fuel | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationinConcentratingEnergyCoosaPage EditCrystalsolapprovalCzechD1

  17. Appendix D.1 Hanford Sitewide SSHAC Level 3 PSHA Project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWPAlumni AlumniFederal Facility Agreement and Consent2 AppendixD.1

  18. D1 Fuel Crops Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:PowerCER.pngRoofs andCrops Ltd Jump to: navigation, search Name: D1

  19. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  20. U.S. Home Builder Perceptions about Treated Wood:Summary Richard P. Vlosky, Ph.D.1

    E-Print Network [OSTI]

    U.S. Home Builder Perceptions about Treated Wood:Summary Richard P. Vlosky, Ph.D.1 Professor for wood. In areas subject to a high risk of decay, wood that is preservative treated is often recommended alternatives to treated wood in certain applications, but this may result in higher costs, higher energy

  1. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  2. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  3. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  4. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  5. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  6. DOE/LX/07-0319&D1 Secondary Document DMSA C-333-24 Solid Waste...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LX07-0319&D1 Secondary Document SWMU 280 SWMU 280 * " D ,., .. '" "' .. , ... ," ""'''',1 ,..'"" """,,0,';1< ,.,. , NPm><" , + C-333 Ground Floor, West Ha lf - SWMU 280...

  7. Serial Intraoperative MR Imaging of Brain Shift Arya Nabavi, M.D.1

    E-Print Network [OSTI]

    Serial Intraoperative MR Imaging of Brain Shift Arya Nabavi, M.D.1 , Peter McL. Black, M.D. Ph.D.1 , David T. Gering, M.S.4 , Carl-Fredrik Westin, Ph.D3 , Vivek Mehta, M.D.1 , Richard S. Pergolizzi Jr., M, M.D., Ph.D.2 , William M. Wells III, Ph.D4 ., Ron Kikinis, M.D.3 , Ferenc A. Jolesz, M.D.3 1

  8. Topic : Computation of ? sec ?d? 1. Usual method Observe d d? (ln ...

    E-Print Network [OSTI]

    2015-02-21T23:59:59.000Z

    Page 1. Topic : Computation of. ? sec ?d?. 1. Usual method. Observe d d?. (ln | sec ? + tan ?|) = sec ? tan ? + sec2 ? sec ? + tan ?. = sec ?(tan ? + sec ?) sec ? +

  9. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    through its Alternative Energy Development Plan, has set a target to increase biofuel production to five billion litres by 2022. The Thai Government sees this expansion as...

  10. Transportation Energy Futures Study: The Key Results and Conclusions...

    Open Energy Info (EERE)

    Secretary Mike Carr will introduce the study and provide context on EERE's transportation energy strategy. In his role with EERE, Mike provides leadership direction on...

  11. Thailand-Key Results and Policy Recommendations for Future Bioenergy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with formSoutheasternInformation TengchongTex-LaInformation(CTI PFAN)

  12. Transportation Energy Futures Study: The Key Results and Conclusions

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit withTianlin Baxin Hydropower StationTown ofTownNote-Bangladesh Jump to:Webinar |

  13. Endoglin inhibits ERK-induced c-Myc and cyclin D1 expression to impede endothelial cell proliferation

    SciTech Connect (OSTI)

    Pan, Christopher C.; Bloodworth, Jeffrey C. [Division of Pharmacology, Columbus, OH 43210 (United States)] [Division of Pharmacology, Columbus, OH 43210 (United States); Mythreye, Karthikeyan [Duke University, Department of Medicine, Durham, NC 27708 (United States)] [Duke University, Department of Medicine, Durham, NC 27708 (United States); Lee, Nam Y., E-mail: lee.5064@osu.edu [Division of Pharmacology, Columbus, OH 43210 (United States); Davis Heart and Lung Research Institute, Columbus, OH 43210 (United States)

    2012-08-03T23:59:59.000Z

    Highlights: Black-Right-Pointing-Pointer Endoglin inhibits ERK activation in endothelial cells. Black-Right-Pointing-Pointer Endoglin is a regulator of c-Myc and cyclin D1 expression. Black-Right-Pointing-Pointer {beta}-arrestin2 interaction with endoglin is required for ERK/c-Myc repression. Black-Right-Pointing-Pointer Endoglin impedes cellular proliferation by targeting ERK-induced mitogenic signaling. -- Abstract: Endoglin is an endothelial-specific transforming growth factor beta (TGF-{beta}) co-receptor essential for angiogenesis and vascular remodeling. Endoglin regulates a wide range of cellular processes, including cell adhesion, migration, and proliferation, through TGF-{beta} signaling to canonical Smad and Smad-independent pathways. Despite its overall pro-angiogenic role in the vasculature, the underlying mechanism of endoglin action is poorly characterized. We previously identified {beta}-arrestin2 as a binding partner that causes endoglin internalization from the plasma membrane and inhibits ERK signaling towards endothelial migration. In the present study, we examined the mechanistic role of endoglin and {beta}-arrestin2 in endothelial cell proliferation. We show that endoglin impedes cell growth through sustained inhibition of ERK-induced c-Myc and cyclin D1 expression in a TGF-{beta}-independent manner. The down-regulation of c-Myc and cyclin D1, along with growth-inhibition, are reversed when the endoglin/{beta}-arrestin2 interaction is disrupted. Given that TGF-{beta}-induced Smad signaling potently represses c-Myc in most cell types, our findings here show a novel mechanism by which endoglin augments growth-inhibition by targeting ERK and key downstream mitogenic substrates.

  14. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  15. (01)UC06/PhD/1 Audiology1 To introduce a new subject, Audiology,

    E-Print Network [OSTI]

    Hickman, Mark

    (01)UC06/PhD/1 ­ Audiology1 To introduce a new subject, Audiology, to the Doctor of Philosophy Degree Reference identifier: (01)UC06/PhD/1 ­ Audiology (UC 2006 Calendar, p 479) Section A 1. Purpose processes of hearing is vital to the profession. There is a critical shortage and continuing attrition of PhD

  16. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  17. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  18. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  19. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  20. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  1. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  2. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  3. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  4. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  5. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  6. Finite temperature Casimir interaction between spheres in $(D+1)$-dimensional spacetime: Exact computations and asymptotic expansions

    E-Print Network [OSTI]

    L. P. Teo

    2014-06-05T23:59:59.000Z

    We consider the finite temperature Casimir interaction between two Dirichlet spheres in $(D+1)$-dimensional Minkowski spacetime. The Casimir interaction free energy is derived from the zero temperature Casimir interaction energy via the Matsubara formalism. In the high temperature region, the Casimir interaction is dominated by the term with zero Matsubara frequency, and it is known as the classical term since this term is independent of the Planck constant $\\hbar$. Explicit expression of the classical term is derived and it is computed exactly using appropriate similarity transforms of matrices. We then compute the small separation asymptotic expansion of this classical term up to the next-to-leading order term. For the remaining part of the finite temperature Casimir interaction with nonzero Matsubara frequencies, we obtain its small separation asymptotic behavior by applying certain prescriptions to the corresponding asymptotic expansion at zero temperature. This gives us a leading term that is shown to agree precisely with the proximity force approximation at any temperature. The next-to-leading order term at any temperature is also derived and it is expressed as an infinite sum over integrals. To obtain the asymptotic expansion at the low and medium temperature regions, we apply the inverse Mellin transform techniques. In the low temperature region, we obtain results that agree with our previous work on the zero temperature Casimir interaction.

  7. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  8. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  9. Baicalein induces G1 arrest in oral cancer cells by enhancing the degradation of cyclin D1 and activating AhR to decrease Rb phosphorylation

    SciTech Connect (OSTI)

    Cheng, Ya-Hsin, E-mail: yhcheng@mail.cmu.edu.tw [Department of Physiology, School of Medicine, China Medical University, Taichung 40402, Taiwan, ROC (China)] [Department of Physiology, School of Medicine, China Medical University, Taichung 40402, Taiwan, ROC (China); Li, Lih-Ann; Lin, Pinpin; Cheng, Li-Chuan [Division of Environmental Health and Occupational Medicine, National Health Research Institutes, Zhunan, Miaoli 35053, Taiwan, ROC (China)] [Division of Environmental Health and Occupational Medicine, National Health Research Institutes, Zhunan, Miaoli 35053, Taiwan, ROC (China); Hung, Chein-Hui [Graduate Institute of Clinical Medicine Sciences, Chang Gung University, Puizi City, Chiayi 613, Taiwan, ROC (China)] [Graduate Institute of Clinical Medicine Sciences, Chang Gung University, Puizi City, Chiayi 613, Taiwan, ROC (China); Chang, Nai Wen [Department of Biochemistry, School of Medicine, China Medical University, Taichung, Taiwan, ROC (China)] [Department of Biochemistry, School of Medicine, China Medical University, Taichung, Taiwan, ROC (China); Lin, Chingju [Department of Physiology, School of Medicine, China Medical University, Taichung 40402, Taiwan, ROC (China)] [Department of Physiology, School of Medicine, China Medical University, Taichung 40402, Taiwan, ROC (China)

    2012-09-15T23:59:59.000Z

    Baicalein is a flavonoid, known to have anti-inflammatory and anti-cancer effects. As an aryl hydrocarbon receptor (AhR) ligand, baicalein at high concentrations blocks AhR-mediated dioxin toxicity. Because AhR had been reported to play a role in regulating the cell cycle, we suspected that the anti-cancer effect of baicalein is associated with AhR. This study investigated the molecular mechanism involved in the anti-cancer effect of baicalein in oral cancer cells HSC-3, including whether such effect would be AhR-mediated. Results revealed that baicalein inhibited cell proliferation and increased AhR activity in a dose-dependent manner. Cell cycle was arrested at the G1 phase and the expression of CDK4, cyclin D1, and phosphorylated retinoblastoma (pRb) was decreased. When the AhR was suppressed by siRNA, the reduction of pRb was partially reversed, accompanied by a decrease of cell population at G1 phase and an increase at S phase, while the reduction of cyclin D1 and CDK4 did not change. This finding suggests that the baicalein activation of AhR is indeed associated with the reduction of pRb, but is independent of the reduction of cyclin D1 and CDK4. When cells were pre-treated with LiCl, the inhibitor of GSK-3?, the decrease of cyclin D1 was blocked and the reduction of pRb was recovered. The data indicates that in HSC-3 the reduction of pRb is both mediated by baicalein through activation of AhR and facilitation of cyclin D1 degradation, which causes cell cycle arrest at the G1 phase, and results in the inhibition of cell proliferation. -- Highlights: ? Baicalein causes the G1 phase arrest by decreasing Rb phosphorylation. ? Baicalein modulates AhR-mediated cell proliferation. ? Both AhR activation and cyclin D1 degradation results in hypophosphorylation of Rb. ? Baicalein facilitates cyclin D1 degradation by signalling the GSK-3? pathway.

  10. Electronics - Key to Energy Control

    E-Print Network [OSTI]

    Nelson, K. P.

    1981-01-01T23:59:59.000Z

    % reduction planned by 1983. The methods and results of the TI energy management program will be presented....

  11. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  12. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  13. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  14. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  15. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  16. VUV Spectroscopic Study of the D^1?State of Molecular Deuterium

    E-Print Network [OSTI]

    G. D. Dickenson; T. I. Ivanov; W. Ubachs; M. Roudjane; N. de Oliveira; D. Joyeux; L. Nahon; W. -Ü L. Tchang-Brillet; M. Glass-Maujean; H. Schmoranzer; A. Knie; S. Kübler; A. Ehresmann

    2013-01-03T23:59:59.000Z

    The D^1\\Pi_u - X^1\\Sigma_g^+ absorption system of molecular deuterium has been re-investigated using the VUV Fourier -Transform (FT) spectrometer at the DESIRS beamline of the synchrotron SOLEIL and photon-induced fluorescence spectrometry (PIFS) using the 10 m normal incidence monochromator at the synchrotron BESSY II. Using the FT spectrometer absorption spectra in the range 72 - 82 nm were recorded in quasi static gas at 100 K and in a free flowing jet at a spectroscopic resolution of 0.50 and 0.20 cm^{-1} respectively . The narrow Q-branch transitions, probing states of \\Pi^- symmetry, were observed up to vibrational level v = 22. The states of \\Pi^+ symmetry, known to be broadened due to predissociation and giving rise to asymmetric Beutler-Fano resonances, were studied up to v = 18. The 10 m normal incidence beamline setup at BESSY II was used to simultaneously record absorption, dissociation, ionization and fluorescence decay channels from which information on the line intensities, predissociated widths, and Fano q-parameters were extracted. R-branch transitions were observed up to v = 23 for J = 1-3 as well as several transitions for J = 4 and 5 up to v = 22 and 18 respectively. The Q-branch transitions are found to weakly predissociate and were observed from v = 8 to the final vibrational level of the state v = 23. The spectroscopic study is supported by two theoretical frameworks. Results on the \\Pi^- symmetry states are compared to ab initio multi-channel-quantum defect theory (MQDT) calculations, demonstrating that these calculations are accurate to within 0.5 cm^-1.

  17. Ventilation and Air Quality in Indoor Ice Skating Arenas Chunxin Yang, Ph.D.1

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    Ventilation and Air Quality in Indoor Ice Skating Arenas Chunxin Yang, Ph.D.1 Philip Demokritou, and the operation strategy of the ventilation system are significant contributing factors to the indoor air quality exchange rate, air distribution method, and ventilation control strategies on the IAQ in an arena. With CFD

  18. Culvert Design for Flood Routing considering Sediment Transport W.J. Rahmeyer PhD.1

    E-Print Network [OSTI]

    Rahmeyer, William J.

    Culvert Design for Flood Routing considering Sediment Transport W.J. Rahmeyer PhD.1 and W routing methodologies do not consider sediment bed-load transport through the culverts or pipelines of road crossings. Many practitioners either ignore the transport of sediment through a culvert or assume

  19. PRISACARIU, REID: PWP3D 1 PWP3D: Real-time segmentation and

    E-Print Network [OSTI]

    Oxford, University of

    method allows for fast 2D­3D pose tracking and 2D segmentation using a single, unified, energy function in print or electronic forms. #12;2 PRISACARIU, REID: PWP3D The most closely related work to our ownPRISACARIU, REID: PWP3D 1 PWP3D: Real-time segmentation and tracking of 3D objects Victor A

  20. Whole-Body Biodistribution and Estimation of Radiation-Absorbed Doses of the Dopamine D1

    E-Print Network [OSTI]

    Shen, Jun

    Whole-Body Biodistribution and Estimation of Radiation-Absorbed Doses of the Dopamine D1 Receptor and Behaviour, Monash University, Clayton, Victoria, Australia The present study estimated radiation of interest were drawn on compressed planar images of source organs that could be iden- tified. Radiation dose

  1. NIFS Fusion Engineering Research Project and Helical Demo FFHR-d1

    E-Print Network [OSTI]

    NIFS Fusion Engineering Research Project and Helical Demo FFHR-d1 International Workshop on MFE. Large amount of DT fuel circulation is required in pellet injector. 3. But, the hydrogen inventory in solid hydrogen reservoir assuming = 40 s to solidify hydrogen gas. 3x1023/s ~1000 Pa·m3/s Sagara- 21

  2. Engineered Heart Tissue Model of Diabetic Myocardium Hannah Song, Ph.D.,1

    E-Print Network [OSTI]

    Zandstra, Peter W.

    Engineered Heart Tissue Model of Diabetic Myocardium Hannah Song, Ph.D.,1 Peter W. Zandstra, Ph of cardiomyocytes (CMs) is a leading cause of heart failure. Previously, we reported an in vitro test-bed for screening cell integration between injected test cells and host CM using the engineered heart tissue

  3. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  4. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  5. DOE/LX/07-0308&D1 Secondary Document DMSA C-333-02 Solid Waste...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    due to radiological contamination. The LLW formerly stored consisted of wood pallets and containers of paper, plastic, wood, trash, PPE, respirator DOELX07-0308&D1 Secondary...

  6. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  7. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  8. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  9. Synchrotron VUV radiation studies of the D^1\\Pi_u State of H_2

    E-Print Network [OSTI]

    Dickenson, G D; Roudjane, M; de Oliveira, N; Joyeux, D; Nahon, L; Tchang-Brillet, W -Ü L; Glass-Maujean, M; Haar, I; Ehresmann, A; Ubachs, W; 10.1063/1.3502471

    2013-01-01T23:59:59.000Z

    The 3p\\pi D^1\\Pi_u state of the H_2 molecule was reinvestigated with different techniques at two synchrotron installations. The Fourier-Transform spectrometer in the vacuum ultraviolet wavelength range of the DESIRS beamline at the SOLEIL synchrotron was used for recording absorption spectra of the D^1\\Pi_u state at high resolution and high absolute accuracy, limited only by the Doppler contribution at 100 K. From these measurements line positions were extracted, in particular for the narrow resonances involving ^1\\Pi_u^- states, with an accuracy estimated at 0.06 cm^{-1} . The new data also closely match MQDT-calculations performed for the \\Pi^- components observed via the narrow Q-lines. The \\Lambda-doubling in the D^1\\Pi_u state was determined up to v=17. The 10 m normal incidence scanning monochromator at the beamline U125/2 of the BESSY II synchrotron, combined with a home built target chamber and equipped with a variety of detectors was used to unravel information on ionization, dissociation and intramo...

  10. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  11. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  12. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  13. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  14. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  15. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  16. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  17. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  18. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  19. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  20. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  1. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  2. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  3. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  4. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  5. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  6. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  7. DOE/LX/07-0123&D1 Secondary Document DMSA C-400-06 Solid Waste...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3&D1 Secondary Document DMSA C-400-06 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 352 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 31509...

  8. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  9. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  10. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  11. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  12. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  13. Fuzzball solutions for black holes and D1-brane--D5-brane microstates

    E-Print Network [OSTI]

    Kostas Skenderis; Marika Taylor

    2007-02-13T23:59:59.000Z

    We revisit the relation between fuzzball solutions and D1-D5 microstates. A consequence of the fact that the R ground states (in the usual basis) are eigenstates of the R-charge is that only neutral operators can have non-vanishing expectation values on these states. We compute the holographic 1-point functions of the fuzzball solutions and find that charged chiral primaries have non-zero expectation values, except when the curve characterizing the solution is circular. The non-zero vevs reflect the fact that a generic curve breaks R-symmetry completely. This implies that fuzzball solutions (excepting circular ones) can only correspond to superpositions of R states and we give a proposal for the superposition corresponding to a given curve. We also address the question of what would be the geometric dual of a given R ground state.

  14. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  15. Market-Based Incentives for Green Building Alternatives K.R. Grosskopf, Ph.D.1

    E-Print Network [OSTI]

    Jawitz, James W.

    be addressed. Key Words Best management practices (BMPs), demand-side management, externalities, rebates for developing market-based initiatives to stimulate demand-side conservation. This approach is founded on the principal that reducing water use and subsequent wastewater discharge through demand-side or "user

  16. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  17. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  18. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  19. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  20. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  1. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  2. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  3. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  4. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  5. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  6. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir--We study the non-coherent capacity of secret-key agreement with public discussion over i.i.d. Rayleigh state information (CSI). We present two results. At high Signal-to-Noise Ratio (SNR), the secret

  7. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  8. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  9. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  10. Rsf-1 is overexpressed in non-small cell lung cancers and regulates cyclinD1 expression and ERK activity

    SciTech Connect (OSTI)

    Li, Qingchang; Dong, Qianze [Department of Pathology, First Affiliated Hospital and College of Basic Medical Sciences, China Medical University, Shenyang 110001, Liaoning (China)] [Department of Pathology, First Affiliated Hospital and College of Basic Medical Sciences, China Medical University, Shenyang 110001, Liaoning (China); Wang, Enhua, E-mail: wangenhuacmu@hotmail.com [Department of Pathology, First Affiliated Hospital and College of Basic Medical Sciences, China Medical University, Shenyang 110001, Liaoning (China)] [Department of Pathology, First Affiliated Hospital and College of Basic Medical Sciences, China Medical University, Shenyang 110001, Liaoning (China)

    2012-03-30T23:59:59.000Z

    Highlights: Black-Right-Pointing-Pointer Rsf-1 expression is elevated in non-small cell lung cancers. Black-Right-Pointing-Pointer Rsf-1 depletion inhibits proliferation and increased apoptosis in lung cancer cells. Black-Right-Pointing-Pointer Rsf-1 depletion decreases the level of cyclinD1 and phosphor-ERK expression. -- Abstract: Rsf-1 (HBXAP) was recently reported to be overexpressed in various cancers and associated with the malignant behavior of cancer cells. However, the expression of Rsf-1 in primary lung cancer and its biological roles in non-small cell lung cancer (NSCLC) have not been reported. The molecular mechanism of Rsf-1 in cancer aggressiveness remains ambiguous. In the present study, we analyzed the expression pattern of Rsf-1 in NSCLC tissues and found that Rsf-1 was overexpressed at both the mRNA and protein levels. There was a significant association between Rsf-1 overexpression and TNM stage (p = 0.0220) and poor differentiation (p = 0.0013). Furthermore, knockdown of Rsf-1 expression in H1299 and H460 cells with high endogenous Rsf-1 expression resulted in a decrease of colony formation ability and inhibition of cell cycle progression. Rsf-1 knockdown also induced apoptosis in these cell lines. Further analysis showed that Rsf-1 knockdown decreased cyclin D1 expression and phospho-ERK levels. In conclusion, Rsf-1 is overexpressed in NSCLC and contributes to malignant cell growth by cyclin D1 and ERK modulation, which makes Rsf-1 a candidate therapeutic target in lung cancer.

  11. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  12. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  13. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  14. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  15. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  16. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  17. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  18. Free Energies and Probe Actions for Near-horizon D-branes and D1 + D5 System

    E-Print Network [OSTI]

    Shijong Ryang

    1999-03-18T23:59:59.000Z

    By working with the free energy for the type II supergravity near-horizon solution of N coincident non-extremal Dp-branes we study the transitions among the non-conformal Dp-brane system, the perturbative super Yang-Mills theory and a certain system associated with M theory. We derive a relation between this free energy and the action of a Dp-brane probe in the N Dp-brane background. Constructing the free energy for the five dimensional black hole labeled by the D1-brane and D5-brane charges we find the similar relation between it and the action of a D1 or D5 brane probe in the D1 + D5 brane background. These relations are explained by the massive open strings stretched between the relevant D-branes

  19. Innovation Impact: Breakthrough Research Results (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2013-07-01T23:59:59.000Z

    The Innovation Impact brochure captures key breakthrough results across NREL's primary areas of renewable energy and energy efficiency research: solar, wind, bioenergy, transportation, buildings, analysis, and manufacturing technologies.

  20. VUV Spectroscopic Study of the D^1\\Pi State of Molecular Deuterium

    E-Print Network [OSTI]

    Dickenson, G D; Ubachs, W; Roudjane, M; de Oliveira, N; Joyeux, D; Nahon, L; Tchang-Brillet, W -Ü L; Glass-Maujean, M; Schmoranzer, H; Knie, A; Kübler, S; Ehresmann, A; 10.1080/00268976.2011.631056

    2013-01-01T23:59:59.000Z

    The D^1\\Pi_u - X^1\\Sigma_g^+ absorption system of molecular deuterium has been re-investigated using the VUV Fourier -Transform (FT) spectrometer at the DESIRS beamline of the synchrotron SOLEIL and photon-induced fluorescence spectrometry (PIFS) using the 10 m normal incidence monochromator at the synchrotron BESSY II. Using the FT spectrometer absorption spectra in the range 72 - 82 nm were recorded in quasi static gas at 100 K and in a free flowing jet at a spectroscopic resolution of 0.50 and 0.20 cm^{-1} respectively . The narrow Q-branch transitions, probing states of \\Pi^- symmetry, were observed up to vibrational level v = 22. The states of \\Pi^+ symmetry, known to be broadened due to predissociation and giving rise to asymmetric Beutler-Fano resonances, were studied up to v = 18. The 10 m normal incidence beamline setup at BESSY II was used to simultaneously record absorption, dissociation, ionization and fluorescence decay channels from which information on the line intensities, predissociated width...

  1. BCS Instability and Finite Temperature Corrections to Tachyon Mass in Intersecting D1-Branes

    E-Print Network [OSTI]

    Sudipto Paul Chowdhury; Swarnendu Sarkar; B. Sathiapalan

    2014-09-12T23:59:59.000Z

    A holographic description of BCS superconductivity is given in arxiv:1104.2843. This model was constructed by insertion of a pair of D8-branes on a D4-background. The spectrum of intersecting D8-branes has tachyonic modes indicating an instability which is identified with the BCS instability in superconductors. Our aim is to study the stability of the intersecting branes under finite temperature effects. Many of the technical aspects of this problem are captured by a simpler problem of two intersecting D1-branes on flat background. In the simplified set-up we compute the one-loop finite temperature corrections to the tree-level tachyon mass using the frame-work of SU(2) Yang-Mills theory in (1 + 1)-dimensions. We show that the one-loop two-point functions are ultraviolet finite due to cancellation of ultraviolet divergence between the amplitudes containing bosons and fermions in the loop. The amplitudes are found to be infrared divergent due to the presence of massless fields in the loops. We compute the finite temperature mass correction to all the massless fields and use these temperature dependent masses to compute the tachyonic mass correction. We show numerically the existence of a transition temperature at which the effective mass of the tree-level tachyons becomes zero, thereby stabilizing the brane configuration.

  2. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  3. Involvement of cyclin D1/CDK4 and pRb mediated by PI3K/AKT pathway activation in Pb{sup 2+}-induced neuronal death in cultured hippocampal neurons

    SciTech Connect (OSTI)

    Li Chenchen [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: glacier@mail.ustc.edu.cn; Xing Tairan [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: kang2000@mail.ustc.edu.cn; Tang Mingliang [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: mltang@mail.ustc.edu.cn; Yong Wu [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: yongwu@mail.ustc.edu.cn; Yan Dan [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: dyan@mail.ustc.edu.cn; Deng Hongmin [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: milkcofe@mail.ustc.edu.cn; Wang Huili [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: whl1028@ustc.edu.cn; Wang Ming [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: wming@ustc.edu.cn; Chen Jutao [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: jtc@ustc.edu.cn; Ruan Diyun [Department of Neurobiology and Biophysics, School of Life Sciences, University of Science and Technology of China, Hefei, Anhui 230027 (China)], E-mail: ruandy@ustc.edu.cn

    2008-06-15T23:59:59.000Z

    Lead (Pb) is widely recognized as a neurotoxicant. One of the suggested mechanisms of lead neurotoxicity is apoptotic cell death. And the mechanism by which Pb{sup 2+} causes neuronal death is not well understood. The present study sought to examine the obligate nature of cyclin D1/cyclin-dependent kinase 4 (CDK4), phosphorylation of its substrate retinoblastoma protein (pRb) and its select upstream signal phosphoinositide 3-kinase (PI3K)/AKT pathway in the death of primary cultured rat hippocampal neurons evoked by Pb{sup 2+}. Our data showed that lead treatment of primary hippocampal cultures results in dose-dependent cell death. Inhibition of CDK4 prevented Pb{sup 2+}-induced neuronal death significantly but was incomplete. In addition, we demonstrated that the levels of cyclin D1 and pRb/p107 were increased during Pb{sup 2+} treatment. These elevated expression persisted up to 48 h, returning to control levels after 72 h. We also presented pharmacological and morphological evidences that cyclin D1/CDK4 and pRb/p107 were required for such kind of neuronal death. Addition of the PI3K inhibitor LY294002 (30 {mu}M) or wortmannin (100 nM) significantly rescued the cultured hippocampal neurons from death caused by Pb{sup 2+}. And that Pb{sup 2+}-elicited phospho-AKT (Ser473) participated in the induction of cyclin D1 and partial pRb/p107 expression. These results provide evidences that cell cycle elements play a required role in the death of neurons evoked by Pb{sup 2+} and suggest that certain signaling elements upstream of cyclin D1/CDK4 are modified and/or required for this form of neuronal death.

  4. Hydrogen Fuel Cell Performance in the Key Early Markets of Material Handling Equipment and Backup Power (Presentation)

    SciTech Connect (OSTI)

    Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.; Ainscough, C.; Post, M.; Peters, M.

    2013-10-01T23:59:59.000Z

    This presentation summarizes the results of NREL's analysis of hydrogen fuel cell performance in the key early markets of material handling equipment (MHE) and backup power.

  5. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Broader source: Energy.gov (indexed) [DOE]

    Powertrain Systems Lowest Engine-Out Emissions as the Key to the Future of the Heavy Duty Diesel Engine - New Development Results Franz X. Moser Theodor Sams, Rolf Dreisbach AVL...

  6. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  7. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  8. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  9. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  10. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  11. An Optimal (d -1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-Dimensional Hypercubes

    E-Print Network [OSTI]

    Fu, Ada Waichee

    An Optimal (d - 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-Dimensional Hypercubes Siu, Shatin, Hong Kong e-mail: adafucse.cuhk.edu.hk Abstract All-to-all broadcasting (Gossiping a message to transmit to all other members of the network. We proposed a k-fault- tolerant scheme

  12. Microscopic description of fission in neutron-rich plutonium isotopes with the Gogny-D1M energy density functional

    E-Print Network [OSTI]

    R. Rodriguez-Guzman; L. M. Robledo

    2014-05-27T23:59:59.000Z

    The most recent parametrization D1M of the Gogny energy density functional is used to describe fission in the isotopes $^{232-280}$ Pu. We resort to the methodology introduced in our previous studies [Phys. Rev. C \\textbf{88}, 054325 (2013) and Phys. Rev. C \\textbf {89}, 054310 (2014)] to compute the fission paths, collective masses and zero point quantum corrections within the Hartree-Fock-Bogoliubov framework. The systematics of the spontaneous fission half-lives t$_{SF}$, masses and charges of the fragments in Plutonium isotopes is analyzed and compared with available experimental data. We also pay attention to isomeric states, the deformation properties of the fragments as well as to the competition between the spontaneous fission and $\\alpha$-decay modes. The impact of pairing correlations on the predicted t$_{SF}$ values is demonstrated with the help of calculations for $^{232-280}$Pu in which the pairing strengths of the Gogny-D1M energy density functional are modified by 5 $\\%$ and 10 $\\%$, respectively. We further validate the use of the D1M parametrization through the discussion of the half-lives in $^{242-262}$Fm. Our calculations corroborate that, though the uncertainties in the absolute values of physical observables are large, the Gogny-D1M Hartree-Fock-Bogoliubov framework still reproduces the trends with mass and/or neutron numbers and therefore represents a reasonable starting point to describe fission in heavy nuclear systems from a microscopic point of view.

  13. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  14. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  15. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  16. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10T23:59:59.000Z

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  17. Efficient all-optical production of large $^6$Li quantum gases using D$_1$ gray-molasses cooling

    E-Print Network [OSTI]

    A. Burchianti; G. Valtolina; J. A. Seman; E. Pace; M. De Pas; M. Inguscio; M. Zaccanti; G. Roati

    2014-06-18T23:59:59.000Z

    We use a gray molasses operating on the D$_1$ atomic transition to produce degenerate quantum gases of $^{6}$Li with a large number of atoms. This sub-Doppler cooling phase allows us to lower the initial temperature of 10$^9$ atoms from 500 to 40 $\\mu$K in 2 ms. We observe that D$_1$ cooling remains effective into a high-intensity infrared dipole trap where two-state mixtures are evaporated to reach the degenerate regime. We produce molecular Bose-Einstein condensates of up to 5$\\times$10$^{5}$ molecules and weakly-interacting degenerate Fermi gases of $7\\times$10$^{5}$ atoms at $T/T_{F}<0.1$ with a typical experimental duty cycle of 11 seconds.

  18. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  19. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  20. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  1. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  2. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  3. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  4. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  5. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  6. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  7. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  8. Almost every set of $N\\ge d+1$ orthogonal states on $d^{\\otimes n}$ is locally indistinguishable

    E-Print Network [OSTI]

    Scott M. Cohen

    2008-01-25T23:59:59.000Z

    I consider the problem of deterministically distinguishing the state of a multipartite system, from a set of $N\\ge d+1$ orthogonal states, where $d$ is the dimension of each party's subsystem. It is shown that if the set of orthogonal states is chosen at random, then there is a vanishing probability that this set will be perfectly distinguishable under the restriction that the parties use only local operations on their subsystems and classical communication amongst themselves.

  9. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  10. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  11. Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors

    SciTech Connect (OSTI)

    Moroder, Tobias; Curty, Marcos; Luetkenhaus, Norbert [Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck Research Group, Institute of Optics, Information and Photonics, Universitaet Erlangen-Nuernberg, Staudtstrasse 7/B2, 91058 Erlangen (Germany)

    2006-01-15T23:59:59.000Z

    We provide a simple method to obtain an upper bound on the secret key rate that is particularly suited to analyze practical realizations of quantum key distribution protocols with imperfect devices. We consider the so-called trusted device scenario where Eve cannot modify the actual detection devices employed by Alice and Bob. The upper bound obtained is based on the available measurements results, but it includes the effect of the noise and losses present in the detectors of the legitimate users.

  12. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  13. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  14. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  15. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  16. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  17. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  18. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  19. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  20. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  1. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  2. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  3. E-Print Network 3.0 - australia key findings Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences and Ecology 22 Submission to the Prime Minister's Task Group on Emissions Trading in response to the Task Group's Issues Paper of February 2007 Summary: )). For...

  4. The United States Industrial Electric Motor Systems Market Opportunities Assessment: Key Results

    E-Print Network [OSTI]

    Rosenberg, M.

    industry groups (SICs) are derived from the Manufacturing Energy Consumption Survey: 1994 (MECS) and various surveys conducted by the Bureau of the Census. Information on the breakdown of that energy by application and motor size, as well..., and total onsite electricity generation, minus sales and transfers off site. See MECS 1994. Other sources; Department of Agriculture, 1992, Census of Mineral Industries, 1992, ADL 1980, EPRI 1988, EPRI 1992. 206 ESL-IE-99-05-30 Proceedings from...

  5. Nonlinear relativistic corrections to cosmological distances, redshift and gravitational lensing magnification. I - Key results

    E-Print Network [OSTI]

    Obinna Umeh; Chris Clarkson; Roy Maartens

    2014-09-22T23:59:59.000Z

    The next generation of telescopes will usher in an era of precision cosmology, capable of determining the cosmological model to beyond the percent level. For this to be effective, the theoretical model must be understood to at least the same level of precision. A range of subtle relativistic effects remain to be explored theoretically, and offer the potential for probing general relativity in this new regime. We present the distance-redshift relation to second order in cosmological perturbation theory for a general dark energy model. This relation determines the magnification of sources at high precision, as well as redshift space distortions in the mildly non-linear regime. We identify a range of new lensing effects, including: double-integrated and nonlinear integrated Sach-Wolfe contributions, transverse Doppler effects, lensing from the induced vector mode and gravitational wave backgrounds, in addition to lensing from the second-order potential. Modifications to Doppler lensing from redshift-space distortions are identified. Finally, we find a new double-coupling between the density fluctuations integrated along the line of sight, and gradients in the density fluctuations coupled to transverse velocities along the line of sight. These can be large and thus offer important new probes of gravitational lensing and general relativity. This paper accompanies arXiv:1402.1933, where a comprehensive derivation is given.

  6. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23T23:59:59.000Z

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  7. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  8. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  9. Secure coherent-state quantum key distribution protocols with efficient reconciliation

    SciTech Connect (OSTI)

    Assche, G. van; Cerf, N.J. [QuIC, Ecole Polytechnique, Universite Libre de Bruxelles, CP 165/59, 1050 Brussels (Belgium); Iblisdir, S. [QuIC, Ecole Polytechnique, Universite Libre de Bruxelles, CP 165/59, 1050 Brussels (Belgium); GAP-Optique, University of Geneva, 20 rue de l'Ecole-de-Medecine, CH-1211 Geneva (Switzerland)

    2005-05-15T23:59:59.000Z

    We study the equivalence of a realistic quantum key distribution protocol using coherent states and homodyne detection with a formal entanglement purification protocol. Maximally entangled qubit pairs that one can extract in the formal protocol correspond to secret key bits in the realistic protocol. More specifically, we define a qubit encoding scheme that allows the formal protocol to produce more than one entangled qubit pair per entangled oscillator pair or, equivalently for the realistic protocol, more than one secret key bit per coherent state. The entanglement parameters are estimated using quantum tomography. We analyze the properties of the encoding scheme and investigate the resulting secret key rate in the important case of the attenuation channel.

  10. A comparison of experimental results and theoretical predictions for the rotordynamic and leakage characteristics of short (L/D=1/6) honeycomb and smooth annular pressure seals

    E-Print Network [OSTI]

    Kleynhans, George Frederick

    1991-01-01T23:59:59.000Z

    of absolute pressure vs. axial position for seals 1, 4, and 7 (Cr=0.41 mm) at high inlet preswirl, rotor speed of 16000 rpm, and inlet pressure of 18.3 bar 32 Fig. 19 A comparison of absolute pressure vs. axial position for seals 2, 5, 8, and 10 (Cr=0... angle (radians) y Specific heat ratio 5 Uncertainty identifier e Eccentricity perturbation (m) P Fluid viscosity (N-s/m2) P Fluid density (kg/m3) ? Flow coefficient CO Rotor angular velocity (rad/s) Subscripts 0, 1 Zeroth and first...

  11. E-Print Network 3.0 - air distribution results Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Yang, Ph.D.1 Summary: . Simulated results of various air distribution methods for ice rink No 6. Case Average CO concentration (ppm... type used by the resurfacer as well as...

  12. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  13. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  14. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  15. Chromidio: an interface for color tracking with key frames in Max and Nato

    E-Print Network [OSTI]

    Tucker, Amy Rebecca

    2002-01-01T23:59:59.000Z

    11 QuickTime Movie Input 11 Interactive Color Picking 12 Key Frames 12 Useful Output 14 File Management 16 C.play I 6 IV I M P L E M E N T A T I O N A N D RESULTS 17 Chromidio User Interface 17 QuickTime Movie Display and Playback 22 vi i... CHAPTER Page Interactive Color Picking 26 Key Frame Management 27 Data Analysis and Output 32 Project File Management 36 C.play 39 User Interface 39 Mathematical Functions and F ilters 41 MIDI Implementations 44 Output : 46 Results Using C...

  16. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  17. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  18. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  19. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  20. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  1. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  2. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  3. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  4. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  5. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  6. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  7. Microscopic description of fission in neutron-rich plutonium isotopes with the Gogny-D1M energy density functional

    E-Print Network [OSTI]

    Rodriguez-Guzman, R

    2014-01-01T23:59:59.000Z

    The most recent parametrization D1M of the Gogny energy density functional is used to describe fission in the isotopes $^{232-280}$ Pu. We resort to the methodology introduced in our previous studies [Phys. Rev. C \\textbf{88}, 054325 (2013) and Phys. Rev. C \\textbf {89}, 054310 (2014)] to compute the fission paths, collective masses and zero point quantum corrections within the Hartree-Fock-Bogoliubov framework. The systematics of the spontaneous fission half-lives t$_{SF}$, masses and charges of the fragments in Plutonium isotopes is analyzed and compared with available experimental data. We also pay attention to isomeric states, the deformation properties of the fragments as well as to the competition between the spontaneous fission and $\\alpha$-decay modes. The impact of pairing correlations on the predicted t$_{SF}$ values is demonstrated with the help of calculations for $^{232-280}$Pu in which the pairing strengths of the Gogny-D1M energy density functional are modified by 5 $\\%$ and 10 $\\%$, respective...

  8. Data:0c2253f0-ebc0-4b8d-90d1-2ded8bf6549c | Open Energy Information

    Open Energy Info (EERE)

    b8d-90d1-2ded8bf6549c No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic...

  9. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  10. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  11. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  12. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  13. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  14. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  15. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  16. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  17. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  18. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  19. Geometric Engineering, Mirror Symmetry and 6d (1,0) -> 4d, N=2

    E-Print Network [OSTI]

    Del Zotto, Michele; Xie, Dan

    2015-01-01T23:59:59.000Z

    We study compactification of 6 dimensional (1,0) theories on T^2. We use geometric engineering of these theories via F-theory and employ mirror symmetry technology to solve for the effective 4d N=2 geometry for a large number of the (1,0) theories including those associated with conformal matter. Using this we show that for a given 6d theory we can obtain many inequivalent 4d N=2 SCFTs. Some of these respect the global symmetries of the 6d theory while others exhibit SL(2,Z) duality symmetry inherited from global diffeomorphisms of the T^2. This construction also explains the 6d origin of moduli space of 4d affine ADE quiver theories as flat ADE connections on T^2. Among the resulting 4d N=2 CFTs we find theories whose vacuum geometry is captured by an LG theory (as opposed to a curve or a local CY geometry). We obtain arbitrary genus curves of class S with punctures from toroidal compactification of (1,0) SCFT's where the curve of the class S theory emerges through mirror symmetry. We also show that toroidal...

  20. Geometric Engineering, Mirror Symmetry and 6d (1,0) -> 4d, N=2

    E-Print Network [OSTI]

    Michele Del Zotto; Cumrun Vafa; Dan Xie

    2015-04-30T23:59:59.000Z

    We study compactification of 6 dimensional (1,0) theories on T^2. We use geometric engineering of these theories via F-theory and employ mirror symmetry technology to solve for the effective 4d N=2 geometry for a large number of the (1,0) theories including those associated with conformal matter. Using this we show that for a given 6d theory we can obtain many inequivalent 4d N=2 SCFTs. Some of these respect the global symmetries of the 6d theory while others exhibit SL(2,Z) duality symmetry inherited from global diffeomorphisms of the T^2. This construction also explains the 6d origin of moduli space of 4d affine ADE quiver theories as flat ADE connections on T^2. Among the resulting 4d N=2 CFTs we find theories whose vacuum geometry is captured by an LG theory (as opposed to a curve or a local CY geometry). We obtain arbitrary genus curves of class S with punctures from toroidal compactification of (1,0) SCFT's where the curve of the class S theory emerges through mirror symmetry. We also show that toroidal compactification of the little string version of these theories can lead to class S theories with no punctures on arbitrary genus Riemann surface.

  1. Geometric Engineering, Mirror Symmetry and 6d (1,0) -> 4d, N=2

    E-Print Network [OSTI]

    Michele Del Zotto; Cumrun Vafa; Dan Xie

    2015-05-31T23:59:59.000Z

    We study compactification of 6 dimensional (1,0) theories on T^2. We use geometric engineering of these theories via F-theory and employ mirror symmetry technology to solve for the effective 4d N=2 geometry for a large number of the (1,0) theories including those associated with conformal matter. Using this we show that for a given 6d theory we can obtain many inequivalent 4d N=2 SCFTs. Some of these respect the global symmetries of the 6d theory while others exhibit SL(2,Z) duality symmetry inherited from global diffeomorphisms of the T^2. This construction also explains the 6d origin of moduli space of 4d affine ADE quiver theories as flat ADE connections on T^2. Among the resulting 4d N=2 CFTs we find theories whose vacuum geometry is captured by an LG theory (as opposed to a curve or a local CY geometry). We obtain arbitrary genus curves of class S with punctures from toroidal compactification of (1,0) SCFTs where the curve of the class S theory emerges through mirror symmetry. We also show that toroidal compactification of the little string version of these theories can lead to class S theories with no punctures on arbitrary genus Riemann surface.

  2. Building commissioning: The key to quality assurance

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    This Guide is written to aid building owners and retrofit project managers currently participating in the Rebuild America program. The Guide provides information on implementing building commissioning projects that will optimize the results of existing building equipment improvements and retrofits projects. It should be used in coordination with Rebuild America`s Community Partnership Handbook. The Handbook describes, in detail, eight important steps necessary for planning and carrying out a community-wide energy-efficiency program. In step number 7 of the Handbook, commissioning is shown to be an integral aspect of implementing a building retrofit. The commissioning process ensures that a facility is safe, efficient, comfortable, and conducive to the presumed activities for which it was constructed. Rebuild America strongly encourages its partners to incorporate commissioning into their retrofit projects. By verifying the correct installation, functioning, operation, and maintenance of equipment, the commissioning process ensures that efficiency measures will continue to deliver benefits over the long term. Although commissioning can take place after the equipment has been installed, it is more effective when it takes place over the entire equipment installation process.

  3. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  4. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  5. 3196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 11, NOVEMBER 2010 Space Shift Keying (SSK) Modulation with Partial

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    information for optimal receiver design. This latter result highlights the importance of accurate and reliable Terms--Spatial modulation (SM), space shift keying (SSK) modulation, multiple-input-single-output (MISO

  6. Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors

    E-Print Network [OSTI]

    Vadai, Gergely; Gingl, Zoltan

    2015-01-01T23:59:59.000Z

    The Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system has been introduced as a simple, very low cost and efficient classical physical alternative to quantum key distribution systems. The ideal system uses only a few electronic components - identical resistor pairs, switches and interconnecting wires - to guarantee perfectly protected data transmission. We show that a generalized KLJN system can provide unconditional security even if it is used with significantly less limitations. The more universal conditions ease practical realizations considerably and support more robust protection against attacks. Our theoretical results are confirmed by numerical simulations.

  7. Entanglement-based continuous-variable quantum key distribution with multimode states and detectors

    E-Print Network [OSTI]

    Vladyslav C. Usenko; Laszlo Ruppert; Radim Filip

    2014-12-18T23:59:59.000Z

    Secure quantum key distribution with multimode Gaussian entangled states and multimode homodyne detectors is proposed. In general the multimode character of both the sources of entanglement and the homodyne detectors can cause a security break even for a perfect channel when trusted parties are unaware of the detection structure. Taking into account the multimode structure and potential leakage of information from a homodyne detector reduces the loss of security to some extent. We suggest the symmetrization of the multimode sources of entanglement as an efficient method allowing us to fully recover the security irrespectively to multimode structure of the homodyne detectors. Further, we demonstrate that by increasing the number of the fluctuating but similar source modes the multimode protocol stabilizes the security of the quantum key distribution. The result opens the pathway towards quantum key distribution with multimode sources and detectors.

  8. Finite-size analysis of a continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Leverrier, Anthony [Institut Telecom / Telecom ParisTech, CNRS LTCI, 46 rue Barrault, 75634 Paris Cedex 13, France and ICFO-Institut de Ciences Fotoniques, E-08860 Castelldefels (Barcelona) (Spain); Grosshans, Frederic [Laboratoire de Photonique Quantique et Moleculaire, ENS de Cachan, UMR CNRS 8735, F-94235 Cachan Cedex (France); Grangier, Philippe [Laboratoire Charles Fabry, Institut d'Optique, CNRS, Universite Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex (France)

    2010-06-15T23:59:59.000Z

    The goal of this paper is to extend the framework of finite-size analysis recently developed for quantum key distribution to continuous-variable protocols. We do not solve this problem completely here, and we mainly consider the finite-size effects on the parameter estimation procedure. Despite the fact that some questions are left open, we are able to give an estimation of the secret key rate for protocols which do not contain a postselection procedure. As expected, these results are significantly more pessimistic than those obtained in the asymptotic regime. However, we show that recent continuous-variable protocols are able to provide fully secure secret keys in the finite-size scenario, over distances larger than 50 km.

  9. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09T23:59:59.000Z

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  10. Appendix D-1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternative FuelsSanta3 TableimpurityAppeals8 STANDARD TERMS4C6,

  11. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  12. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  13. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  14. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  15. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  16. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  17. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  18. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  19. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  20. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  1. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  2. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  3. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  4. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  5. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  6. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  7. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  8. The Magnetic Sensitivity of the Ba II D1 and D2 Lines of the Fraunhofer Spectrum

    E-Print Network [OSTI]

    Luca Belluzzi; Javier Trujillo Bueno; Egidio Landi Degl'Innocenti

    2007-04-30T23:59:59.000Z

    The physical interpretation of the spectral line polarization produced by the joint action of the Hanle and Zeeman effects offers a unique opportunity to obtain empirical information about hidden aspects of solar and stellar magnetism. To this end, it is important to achieve a complete understanding of the sensitivity of the emergent spectral line polarization to the presence of a magnetic field. Here we present a detailed theoretical investigation on the role of resonance scattering and magnetic fields on the polarization signals of the Ba II D1 and D2 lines of the Fraunhofer spectrum, respectively at 4934 \\AA\\ and 4554 \\AA. We adopt a three-level model of Ba II, and we take into account the hyperfine structure that is shown by the $^{135}$Ba and $^{137}$Ba isotopes. Despite of their relatively small abundance (18%), the contribution coming from these two isotopes is indeed fundamental for the interpretation of the polarization signals observed in these lines. We consider an optically thin slab model, through which we can investigate in a rigorous way the essential physical mechanisms involved (resonance polarization, Zeeman, Paschen-Back and Hanle effects), avoiding complications due to radiative transfer effects. We assume the slab to be illuminated from below by the photospheric solar continuum radiation field, and we investigate the radiation scattered at 90 degrees, both in the absence and in the presence of magnetic fields, deterministic and microturbulent. We show in particular the existence of a differential magnetic sensitivity of the three-peak Q/I profile that is observed in the D2 line in quiet regions close to the solar limb, which is of great interest for magnetic field diagnostics.

  9. Differential-phase-shift quantum key distribution with phase modulation to combat sequential attacks

    SciTech Connect (OSTI)

    Kawahara, Hiroki; Oka, Toru; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

    2011-11-15T23:59:59.000Z

    Phase-modulated differential-phase-shift (DPS) quantum key distribution (QKD) is presented for combating sequential attacks that most severely restrict the DPS-QKD system distance. Slow phase modulation imposed onto the DPS signal obstructs the optimum unambiguous state discrimination measurement conducted in the sequential attack and improves the QKD distance as a result. The condition with which the phase modulation does not degrade the DPS-QKD system performance is also described.

  10. Ultrafast Excited-State Dynamics in the Green Fluorescent Protein Variant S65T/ H148D. 1. Mutagenesis and Structural Studies,

    E-Print Network [OSTI]

    Boxer, Steven G.

    Articles Ultrafast Excited-State Dynamics in the Green Fluorescent Protein Variant S65T/ H148D. 1 Kanchanawong,# William Childs,# Steven G. Boxer,# and S. James Remington*,§ Institute of Molecular Biology chromophores, respectively. Excitation of either band leads to green emission. In wt-GFP, excitation of band

  11. JOURNAL DE PHYSIQUE Colloque C6, supplkment au no 8, Tome 39, aolit 1978, page ~ 6 -1 1 4 8 FAST LOADING D1LUTION REFRIGERATOR X

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    LOADING D1LUTION REFRIGERATOR X G. Binnig and H.E. Hoenig PhysikaZisches Institut der Universitat dix minutes pendant la ritfrigeration. Abstract.- The dilution refrigerator presented here be interchanged within ten minutes during the operation of the refrigerator. The development of dilution

  12. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  13. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  14. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  15. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  16. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  17. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  18. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  19. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  20. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  1. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  2. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  3. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  4. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  5. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  6. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  7. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  8. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  9. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  10. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  11. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  12. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  13. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  14. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  15. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  16. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  17. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  18. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  19. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  20. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  1. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  2. been the key to their success is the use of high-throughput experiments to assess various zeo-

    E-Print Network [OSTI]

    Silver, Whendee

    it and the resulting pore structure. It could be that the hexamethonium molecules pack in such a way as to providebeen the key to their success is the use of high- throughput experiments to assess various zeo and shape of the resulting pores cor- responds to the size and shape of the organic molecule. ITQ-33

  3. Passive decoy-state quantum key distribution with practical light sources

    SciTech Connect (OSTI)

    Curty, Marcos [ETSI Telecomunicacion, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Pontevedra) (Spain); Ma, Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Qi, Bing [Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, M5S 3G4 Toronto, Ontario (Canada); Moroder, Tobias [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Quantum Information Theory Group, Institute of Theoretical Physics I, University of Erlangen-Nuernberg, D-91058 Erlangen (Germany); Max Planck Institute for the Science of Light, D-91058 Erlangen (Germany)

    2010-02-15T23:59:59.000Z

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  4. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  5. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  6. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  7. Topological Obstructions to Localization Results Radu V. Balan

    E-Print Network [OSTI]

    Maryland at College Park, University of

    Topological Obstructions to Localization Results Radu V. Balan Siemens Corporate Research, 755(x)j2 dx Z 2j^g( )j2 d = 1 (4) where ^g( ) = 1p2 R e;i xg(x)dx is the Fourier transform of g. Equation in San Diego, July 29 - August 3, 2001 E-mail address: radu.balan@scr.siemens.com #12;The proof shows

  8. Protein kinase D1 stimulates proliferation and enhances tumorigenesis of MCF-7 human breast cancer cells through a MEK/ERK-dependent signaling pathway

    SciTech Connect (OSTI)

    Karam, Manale; Legay, Christine; Auclair, Christian; Ricort, Jean-Marc, E-mail: jean-marc.ricort@univ-montp2.fr

    2012-03-10T23:59:59.000Z

    Protein kinase D1, PKD1, is a novel serine/threonine kinase whose altered expression and dysregulation in many tumors as well as its activation by several mitogens suggest that this protein could regulate proliferation and tumorigenesis. Nevertheless, the precise signaling pathways used are still unclear and the potential direct role of PKD1 in tumor development and progression has not been yet investigated. In order to clarify the role of PKD1 in cell proliferation and tumorigenesis, we studied the effects of PKD1 overexpression in a human adenocarcinoma breast cancer cell line, MCF-7 cells. We demonstrated that overexpression of PKD1 specifically promotes MCF-7 cell proliferation through accelerating G0/G1 to S phase transition of the cell cycle. Moreover, inhibition of endogenous PKD1 significantly reduced cell proliferation. Taken together, these results clearly strengthen the regulatory role of PKD1 in cell growth. We also demonstrated that overexpression of PKD1 specifically diminished serum- and anchorage-dependence for proliferation and survival in vitro and allowed MCF-7 cells to form tumors in vivo. Thus, all these data highlight the central role of PKD1 in biological processes which are hallmarks of malignant transformation. Analysis of two major signaling pathways implicated in MCF-7 cell proliferation showed that PKD1 overexpression significantly increased ERK1/2 phosphorylation state without affecting Akt phosphorylation. Moreover, PKD1 overexpression-stimulated cell proliferation and anchorage-independent growth were totally impaired by inhibition of the MEK/ERK kinase cascade. However, neither of these effects was affected by blocking the PI 3-kinase/Akt signaling pathway. Thus, the MEK/ERK signaling appears to be a determining pathway mediating the biological effects of PKD1 in MCF-7 cells. Taken together, all these data demonstrate that PKD1 overexpression increases the aggressiveness of MCF-7 breast cancer cells through enhancing their oncogenic properties and would, therefore, define PKD1 as a potentially new promising anti-tumor therapeutic target.

  9. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  10. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  11. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  12. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  13. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  14. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  15. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  16. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  17. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  18. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  19. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  20. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  1. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  2. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  3. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  4. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  5. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  6. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  7. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  8. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  9. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  10. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  11. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  12. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  13. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  14. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  15. Oxygen is a key element for biology and the cycling of geochemical elements, and has shaped the chemical

    E-Print Network [OSTI]

    Handy, Todd C.

    Oxygen is a key element for biology and the cycling of geochemical elements, and has shaped the chemical and biological evolution of Earth. The oceans appear to be loosing oxygen due to on-going climate change, with resulting impacts on marine ecosystems and global biogeochemical cycles. As oxygen levels

  16. Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's

    E-Print Network [OSTI]

    Stucki, D; Stefanov, A; Zbinden, H; Rarity, J G; Wall, T; Stucki, Damien; Ribordy, Gr\\'{e}goire; Stefanov, Andr\\'{e}; Zbinden, Hugo; Rarity, John G.; Wall, Tom

    2001-01-01T23:59:59.000Z

    The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

  17. Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's

    E-Print Network [OSTI]

    Damien Stucki; Grégoire Ribordy; André Stefanov; Hugo Zbinden; John G. Rarity; Tom Wall

    2001-06-01T23:59:59.000Z

    The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

  18. H-D Substitution in Interstellar Solid Methanol: A Key Route for D Enrichment

    E-Print Network [OSTI]

    Akihiro Nagaoka; Naoki Watanabe; Akira Kouchi

    2005-03-28T23:59:59.000Z

    Deuterium enrichment of interstellar methanol is reproduced experimentally for the first time via grain-surface H-D substitution in solid methanol at an atomic D/H ratio of 0.1. Although previous gas-grain models successfully reproduce the deuterium enrichments observed in interstellar methanol molecules (D/H of up to 0.4, compared to the cosmic ratio of $\\sim 10^{-5})$, the models exclusively focus on deuterium fractionation resulting from the successive addition of atomic hydrogen/deuterium on CO. The mechanism proposed here represents a key route for deuterium enrichment that reproduces the high observed abundances of deuterated methanol, including multiple deuterations.

  19. Final Results from U.S. FCEV Learning Demonstration (Presentation)

    SciTech Connect (OSTI)

    Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.; Ainscough, C.; Saur, G.

    2012-05-01T23:59:59.000Z

    This presentation discusses the objectives of the U.S. DOE Fuel Cell Electric Vehicle Learning Demonstration Project, describes NREL's technology validation approach, and summarizes key technical results from the project.

  20. Proof-of-principle experiment of a modified photon-number-splitting attack against quantum key distribution

    SciTech Connect (OSTI)

    Liu Weitao; Sun Shihai; Liang Linmei; Yuan Jianmin [Department of Physics, College of Science, National University of Defense Technology, Changsha, 410073 (China)

    2011-04-15T23:59:59.000Z

    Any imperfections in a practical quantum key distribution (QKD) system may be exploited by an eavesdropper to collect information about the key without being discovered. We propose a modified photon-number-splitting attack scheme against QKD systems based on weak laser pulses taking advantage of possible multiphoton pulses. Proof-of-principle experiments are demonstrated. The results show that the eavesdropper can get information about the key generated between the legitimate parties without being detected. Since the equivalent attenuation introduced by the eavesdropper for pulses of different average photon numbers are different, the decoy-state method is effective in fighting against this kind of attack. This has also been proven in our experiments.

  1. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  2. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  3. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  4. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  5. Data:5c21e410-1432-4f35-b5d1-e0e3eefd8018 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:PowerCER.pngRoofs andCropsc442d86 No revisionb5d1-e0e3eefd8018 No

  6. Data:63618e21-2a4f-46d0-8350-3b68af7c50d1 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:PowerCER.pngRoofs andCropsc442d86 No revisionb5d1-e0e3eefd8018

  7. Bounds on entanglement distillation and secret key agreement for quantum broadcast channels

    E-Print Network [OSTI]

    Kaushik P. Seshadreesan; Masahiro Takeoka; Mark M. Wilde

    2015-03-27T23:59:59.000Z

    The squashed entanglement of a quantum channel is an additive function of quantum channels, which finds application as an upper bound on the rate at which secret key and entanglement can be generated when using a quantum channel a large number of times in addition to unlimited classical communication. This quantity has led to an upper bound of $\\log((1+\\eta )/(1-\\eta))$ on the capacity of an optical communication channel for such a task, where $\\eta$ is the average fraction of photons that make it from the input to the output of the channel. The purpose of the present paper is to extend these results beyond the single-sender single-receiver setting to the more general case of a single sender and multiple receivers (a quantum broadcast channel). We employ multipartite generalizations of the squashed entanglement to constrain the rates at which secret key and entanglement can be generated between any subset of the users of such a channel, along the way developing several new properties of these measures. We apply our results to the case of an optical broadcast channel with one sender and two receivers.

  8. Single-photon quantum key distribution in the presence of loss

    SciTech Connect (OSTI)

    Curty, Marcos [Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario, Canada M5S 3G4 (Canada); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, Canada N2L 3G1 (Canada); Moroder, Tobias [Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, Canada N2L 3G1 (Canada); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck Research Group, Institute of Optics, Information and Photonics, Universitaet Erlangen-Nuernberg, D-91058 Erlangen (Germany)

    2007-05-15T23:59:59.000Z

    We investigate two-way and one-way single-photon quantum key distribution (QKD) protocols in the presence of loss introduced by the quantum channel. Our analysis is based on a simple precondition for secure QKD in each case. In particular, the legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. We show that both criteria can be formulated as a convex optimization problem known as a semidefinite program, which can be efficiently solved. Moreover, we prove that the solution to the dual optimization corresponds to the evaluation of an optimal witness operator that belongs to the minimal verification set of them for the given two-way (or one-way) QKD protocol. A positive expectation value of this optimal witness operator states that no secret key can be distilled from the available measurements results. We apply such analysis to several well-known single-photon QKD protocols under losses.

  9. Microsoft Word - fact sheet alternatives and key findings 090214...

    National Nuclear Security Administration (NNSA)

    health of workers and the public. Worker dose would result in additional latent cancer fatality risk of a maximum of 1 chance in 100,000. Public dose would result in...

  10. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  11. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  12. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  13. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  14. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  15. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  16. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  17. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  18. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  19. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  20. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  1. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  2. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  3. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  4. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  5. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  6. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  7. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  8. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  9. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  10. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  11. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  12. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04T23:59:59.000Z

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  13. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system

    SciTech Connect (OSTI)

    Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

    2011-06-15T23:59:59.000Z

    The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

  14. A key factor to the spin parameter of uniformly rotating compact stars: crust structure

    E-Print Network [OSTI]

    Qi, B; Sun, B Y; Wang, S Y; Gao, J H

    2014-01-01T23:59:59.000Z

    We study the key factor to determine the dimensionless spin parameter $j\\equiv cJ/(GM^2)$ of different kinds of uniformly rotating compact stars, including the traditional neutron stars, hyperonic neutron stars, and hybrid stars, and check the reliability of the results on various types of equations of state of dense matter. The equations of state from the relativistic mean field theory and the MIT bag model are adopted to simulate compact stars. Numerical calculations of rigidly rotating neutron stars are performed using the RNS code in the framework of general relativity by solving the Einstein equations for stationary axis-symmetric spacetime. The crust structure of compact stars is found to be a key factor to determine the maximum value of the spin parameter $j_{\\rm max}$. For the stars with inclusion of the crust, $j_{\\rm max}\\sim 0.7$ is sustained for various kinds of compact stars with $M>0.5 M_{\\odot}$, and is found to be insensitive to the mass of star and selected equations of state. For the traditi...

  15. Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Hoi-Kwong Lo; Norbert Lütkenhaus

    2010-09-20T23:59:59.000Z

    Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.

  16. Information-theoretic security proof for quantum-key-distribution protocols

    SciTech Connect (OSTI)

    Renner, Renato [Computer Science Department, ETH Zuerich, CH-8092 Zurich (Switzerland); Gisin, Nicolas; Kraus, Barbara [Group of Applied Physics, University of Geneva, CH-1211 Geneva 4 (Switzerland)

    2005-07-15T23:59:59.000Z

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  17. Studies on the switching speed effect of the phase shift keying in SLED for generating high power microwave

    E-Print Network [OSTI]

    Zhengfeng, Xiong; Jian, Yu; Huaibi, Chen; Hui, Ning

    2015-01-01T23:59:59.000Z

    SLAC energy doubler (SLED) type radio-frequency pulse compressors are widely used in large-scale particle accelerators for converting long-duration moderate-power input pulse into short-duration high-power output pulse. The phase shift keying (PSK) is one of the key components in SLED pulse compression systems. Performance of the PSK will influence the output characteristics of SLED, such as rise-time of the output pulse, the maximal peak power gain, and the energy efficiency. In this paper, high power microwave source based on power combining and pulse compression of conventional klystrons was introduced, the nonideal PSK with slow switching speed and without power output during the switching process were investigated, the experimental results with nonideal PSK agreed well with the analytical results.

  18. Data:Eac1dd3a-0268-4e5c-b1d1-ed9feeb2a12a | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 No revision has beenEac1dd3a-0268-4e5c-b1d1-ed9feeb2a12a No

  19. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  20. Using Key Performance Indicators to Manage Energy Costs 

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    Modern management systems rely heavily on information technology to set goals, track performance and communicate results. Energy management approaches (such as those offered by the US Department of Energy and Natural Resources Canada...

  1. Energy Audits: The Key to Performance Contracting Projects

    E-Print Network [OSTI]

    Tharoor, M.

    1994-01-01T23:59:59.000Z

    The term "Performance Contracting" relates to projects where the performance of various energy conservation retrofits result in eavings that exceed the implementation cost of the entire project when financed over a fixed term. Such projects minimize...

  2. Speech versus keying commands in a text-editing task

    E-Print Network [OSTI]

    Bierschwale, John Milton

    1987-01-01T23:59:59.000Z

    . A study (Vidulich, 1986) was designed to investigate the possibility that asymmetrical transfer was contaminating the results of research in this area. The study found nothing. to support asymmetrical transfer. The preceding discussion points...

  3. Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    Toyohiro Tsurumaru

    2006-12-25T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the "discretized gaussian" intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100km reported by Diamanti et al. turns out to be insecure. Moreover it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95km.

  4. Solar hot water system installed at Quality Inn, Key West, Florida. Final report

    SciTech Connect (OSTI)

    Not Available

    1980-04-01T23:59:59.000Z

    The solar energy hot water system installed in the Quality Inn, Key West, Florida, which consists of four buildings, is described. Three buildings are low-rise, two-story buildings containing 100 rooms. The fourth is a four-story building with 48 rooms. The solar system was designed to provide approximately 50% of the energy required for the domestic hot water system. The solar system consists of approximately 1400 ft/sup 2/ of flat plate collector, two 500 gal storage tanks, a circulating pump, and a controller. Operation of the system was begun in April 1978, and has continued to date with only three minor interruptions for pump repair. In the first year of operation, it was determined that the use of the solar facility resulted in 40% fuel savings.

  5. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19T23:59:59.000Z

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  6. Analyzing Porosity using Petrographic Imaging Methods: Key for Petrophysics

    E-Print Network [OSTI]

    Mcdaniel, Kathleen

    2013-09-25T23:59:59.000Z

    . Recrystallization with the filling of void space and growth of calcite and dolomite crystals is also shown in numerous images. Images under Choquette and Pray’s carbonate porosity classification system are dominated by non-fabric selective vuggy porosity... Archie’s Equation ................................................................................................. 20 III RESULTS ............................................................................................................. 24...

  7. BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS

    E-Print Network [OSTI]

    , and boundary physics in the regime of dominant self-heating. ­ TECHNOLOGY · 2. Plasma support technologies (heating, fuel delivery, exhaust, plasma- facing components, and magnets) will benefit most because technologies (remote handling, vacuum vessel, blankets, safety and materials) will advance as a result

  8. Key ACA Terms A quick reference of frequently used terms

    E-Print Network [OSTI]

    Acton, Scott

    to achieving health care quality goals and outcomes that result in cost savings. Affordable Health Care Health; and pediatric services, including oral and vision care. Federal Poverty Level (FPL) A measure of income level issued annually by the Department of Health and Human Services. The federal poverty level is used

  9. Embedded Software Security through Key-Based Control Flow Obfuscation

    E-Print Network [OSTI]

    Bhunia, Swarup

    ], as they are expected to run more computation-intensive software. An example is that cutting-edge cellular devices. The threat is a two-edged sword - on one hand, malicious software installed in an embedded system can harm, and physically the portable embedded sys- tems are often severely constrained by form factor, resulting

  10. MORE RELATED ARTICLES: Nanomaterials Could Be Key to Environmental

    E-Print Network [OSTI]

    Lovley, Derek

    , until the desired end-result was obtained. The new superbug may be used to create microbial fuel cells it says that microbial fuel cells using Geobacter could also be used to power medical implants, car Download the New, Optimized Version of Internet Explorer® for Free Now! IE8.MSN.com Windows Vista & Dell

  11. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    with an explanation of the three 'types' of energy used in a manufacturing facility. The requirement of having a good 'energy ethic' among all employees is discussed in detail. The method of monitoring the program and measuring results is also discussed....

  12. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  13. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect (OSTI)

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15T23:59:59.000Z

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  14. Plans, Implementation, and Results

    Broader source: Energy.gov [DOE]

    About the Weatherization and Intergovernmental Programs Office (WIPO) including information on plans, implementations, and results.

  15. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    SciTech Connect (OSTI)

    Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

    2010-06-17T23:59:59.000Z

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

  16. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  17. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

    2008-12-10T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  18. CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist and Entomologist

    E-Print Network [OSTI]

    Mukhtar, Saqib

    CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist to have the soil profile full of water prior to tas

  19. Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)

    SciTech Connect (OSTI)

    Bosco, N.

    2012-02-01T23:59:59.000Z

    This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

  20. Hazard analysis results report

    SciTech Connect (OSTI)

    Niemi, B.J., Westinghouse Hanford

    1996-09-30T23:59:59.000Z

    This document describes and defines the Hazard Analysis Results for the Tank Waste Remediation System Final Safety Analysis Report.

  1. Water storage key factor in coalbed methane production

    SciTech Connect (OSTI)

    Luckianow, B.J. (Taurus Exploration Inc., Birmingham, AL (US)); Hall, W.L. (Dames and Moore, Atlanta, GA (US))

    1991-03-11T23:59:59.000Z

    Storage ponds provide a cost-effective means to temporarily retain water produced with coalbed methane and permit gas production during times when stream flow rates drop. Normally, water produced with the gas is run into nearby streams, with the dilution rate closely monitored and controlled by environmental agencies. During low stream flow in the Black Warrior basin, Ala., large volumes of produced water must be stored to prevent shut-in of coalbed methane fields. The authors discuss how they constructed such production water facilities for the Cedar Cove field to eliminate periodic field shut-ins as a result of excess water production. The effectiveness of such a storage approach is governed by receiving stream flow variability, production water flow characteristics, and the economics of storage pond construction.

  2. Target Selection for the LBTI Exozodi Key Science Program

    E-Print Network [OSTI]

    Weinberger, Alycia J; Kennedy, Grant M; Roberge, Aki; Defrère, Denis; Hinz, Philip M; Millan-Gabet, Rafael; Rieke, George; Bailey, Vanessa P; Danchi, William C; Haniff, Chris; Mennesson, Bertrand; Serabyn, Eugene; Skemer, Andrew J; Stapelfeldt, Karl R; Wyatt, Mark C

    2015-01-01T23:59:59.000Z

    The Hunt for Observable Signatures of Terrestrial planetary Systems (HOSTS) on the Large Binocular Telescope Interferometer will survey nearby stars for faint emission arising from ~300 K dust (exozodiacal dust), and aims to determine the exozodiacal dust luminosity function. HOSTS results will enable planning for future space telescopes aimed at direct spectroscopy of habitable zone terrestrial planets, as well as greater understanding of the evolution of exozodiacal disks and planetary systems. We lay out here the considerations that lead to the final HOSTS target list. Our target selection strategy maximizes the ability of the survey to constrain the exozodi luminosity function by selecting a combination of stars selected for suitability as targets of future missions and as sensitive exozodi probes. With a survey of approximately 50 stars, we show that HOSTS can enable an understanding of the statistical distribution of warm dust around various types of stars and is robust to the effects of varying levels ...

  3. Epimorphin Functions as a Key Morphoregulator for Mammary Epithelial Cells

    SciTech Connect (OSTI)

    Hirai, H.; Lochter, A.; Galosy, S.; Koshida, S.; Niwa, S.; Bissell, M.J.

    1997-10-13T23:59:59.000Z

    Hepatocyte growth factor (HGF) and EGF have been reported to promote branching morphogenesis of mammary epithelial cells. We now show that it is epimorphin that is primarily responsible for this phenomenon. In vivo, epimorphin was detected in the stromal compartment but not in lumenal epithelial cells of the mammary gland; in culture, however, a subpopulation of mammary epithelial cells produced significant amounts of epimorphin. When epimorphin-expressing epithelial cell clones were cultured in collagen gels they displayed branching morphogenesis in the presence of HGF, EGF, keratinocyte growth factor, or fibroblast growth factor, a process that was inhibited by anti-epimorphin but not anti-HGF antibodies. The branch length, however, was roughly proportional to the ability of the factors to induce growth. Accordingly, epimorphin-negative epithelial cells simply grew in a cluster in response to the growth factors and failed to branch. When recombinant epimorphin was added to these collagen gels, epimorphin-negative cells underwent branching morphogenesis. The mode of action of epimorphin on morphogenesis of the gland, however, was dependent on how it was presented to the mammary cells. If epimorphin was overexpressed in epimorphin-negative epithelial cells under regulation of an inducible promoter or was allowed to coat the surface of each epithelial cell in a nonpolar fashion, the cells formed globular, alveoli-like structures with a large central lumen instead of branching ducts. This process was enhanced also by addition of HGF, EGF, or other growth factors and was inhibited by epimorphin antibodies. These results suggest that epimorphin is the primary morphogen in the mammary gland but that growth factors are necessary to achieve the appropriate cell numbers for the resulting morphogenesis to be visualized.

  4. Nuclear inputs of key iron isotopes for core-collapse modeling and simulation

    E-Print Network [OSTI]

    Jameel-Un Nabi; Abdel Nasser Tawfik

    2014-08-20T23:59:59.000Z

    From the modeling and simulation results of presupernova evolution of massive stars, it was found that isotopes of iron, $^{54,55,56}$Fe, play a significant role inside the stellar cores, primarily decreasing the electron-to-baryon ratio ($Y_{e}$) mainly via electron capture processes thereby reducing the pressure support. The neutrinos produced, as a result of these capture processes, are transparent to the stellar matter and assist in cooling the core thereby reducing the entropy. The structure of the presupernova star is altered both by the changes in $Y_{e}$ and the entropy of the core material. Here we present the microscopic calculation of Gamow-Teller strength distributions for isotopes of iron. The calculation is also compared with other theoretical models and experimental data. Presented also are stellar electron capture rates and associated neutrino cooling rates, due to isotopes of iron, in a form suitable for simulation and modeling codes. It is hoped that the nuclear inputs presented here should assist core-collapse simulators in the process of fine-tuning of the $Y_{e}$ parameter during various phases of presupernova evolution of massive stars. A reliable and accurate time evolution of this parameter is a possible key to generate a successful explosion in modeling of core-collapse supernovae.

  5. The key to minimizing minesite versus utility laboratory analyses on Powder River Basin coals

    SciTech Connect (OSTI)

    Rexin, M.G.

    1995-08-01T23:59:59.000Z

    Powder River Basin (PRB) coals are continuing to expand their areas of use into regions previously reserved for higher ranked coals. PRB coals are subbituminous by rank. Inherent moisture values of 25 to 30 percent are the norm. PRB coals, being lower rank in nature, also tend to oxidize very easily. These factors combined produce a coal which can cause analysis problems for laboratories unaccustomed to PRB coals. In fact, even laboratories that deal with this type of coal on a daily basis can experience analytical difficulties. Special care needs to be taken by both minesite laboratory and the utility laboratory to ensure accurate analyses. Cooperation between both parties is the key to reproducible analyses. Only by working together can parties fully analyze the situation and develop analytical methods acceptable to both. This paper will describe the methods employed by the Caballo Rojo Mine (CRM) and the Georgia Power Company (GPC) to resolve laboratory analysis differences found during shipments by CRM to GPC beginning in 1994. The following topics are discussed: initial comparative results, analytical investigations, the cooperative process, recent comparative results, and conclusions.

  6. HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules

    E-Print Network [OSTI]

    Jeanjean, Louis

    HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules Document written by the Housing Working Group of the association EURAXESS FRANCE #12;Housing guide Euraxess France................................................................................................................P.3 o Key Principles of House Renting in France...........................................P.4 o

  7. Using Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci

    E-Print Network [OSTI]

    Massacci, Fabio

    search [...]. Second, improvements in machine speed, memory size and implementations extended the rangeUsing Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci Dip. di Informatica e of cryptographic algorithms. Thus, cryptographic key search is often THE search problem for many governments

  8. Fast DES Implementations for FPGAs and its Application to a Universal KeySearch Machine ?

    E-Print Network [OSTI]

    of DES with strong emphasis on high­speed performance. Techniques like pipelining and loop unrolling were, We designed a universal key­search machine and used a high speed DES implementation for FPGAsFast DES Implementations for FPGAs and its Application to a Universal Key­Search Machine ? Jens

  9. Fast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ?

    E-Print Network [OSTI]

    with strong emphasis on high-speed performance. Techniques like pipelining and loop unrolling were used designed a universal key-search machine and used a high speed DES implementation for FPGAs as an algorithmFast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ? Jens

  10. Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

  11. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  12. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems

    E-Print Network [OSTI]

    Goldwasser, Shafi

    re­ vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

  13. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas portfolio of technology options that can provide abundant energy to power economic development and still

  14. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

  15. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  16. Granite Recrystallization The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb

    E-Print Network [OSTI]

    Sheffield, University of

    Granite Recrystallization ­ The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb, and hence the key to the entire strategy, depends on whether sufficient melting of granite host rock can-temperature, high-pressure experiments reported here demonstrate that granite can be partially melted and completely

  17. Key Benefits for the M.Sc. Students A monthly stipend of 10,000/-

    E-Print Network [OSTI]

    Rahman, A.K.M. Ashikur

    for app development 24-hours graduate lab facilities with air condition Key Benefits for the M with air condition Key Benefits for the Ph.D. Students (Full Time) A monthly stipend of 30,000/- Tuition for app development 24-hours graduate lab facilities with air condition Provision for research visit

  18. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

  19. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  20. US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns

    E-Print Network [OSTI]

    Watson, Craig A.

    US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns For Contractors their return to popularity. Overview of the City of Key Wests' BPAS Ordinance and Green Building. By Allison Design, Inc., ARCSA AP The role of Green Sustainability Organizations and the potential "Tipping Point

  1. Major Long Haul Truck Idling Generators in Key States ELECTRIC POWER RESEARCH INSTITUTE

    E-Print Network [OSTI]

    Major Long Haul Truck Idling Generators in Key States 1013776 #12;#12;ELECTRIC POWER RESEARCH-0813 USA 800.313.3774 650.855.2121 askepri@epri.com www.epri.com Major Long Haul Truck Idling Generators Haul Truck Idling Generators in Key States. EPRI, Palo Alto, CA: 2008. 1013776. #12;#12;v PRODUCT

  2. Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications

    E-Print Network [OSTI]

    Kai Wen; Gui Lu Long

    2005-08-27T23:59:59.000Z

    The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.

  3. Linkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

    E-Print Network [OSTI]

    of a dark water plume from near Charlotte Harbor, Florida, to the Dry Tortugas in the Florida Keys in mid, respectively. The dark color became increasingly dominated by colored dissolved organic matter, toward the DryLinkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

  4. Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal

    E-Print Network [OSTI]

    Koksal, Can Emre

    Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal Department of Electrical and Computer Engineering The Ohio State University, Columbus, 43210 Abstract--We consider secret of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can

  5. Secret-Key Agreement over a Non-Coherent Block-Fading MIMO Wiretap Channel

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Agreement over a Non-Coherent Block-Fading MIMO Wiretap Channel Mattias Andersson. Dept., Univ. of Toronto, Toronto, ON, Canada email: akhisti@comm.utoronto.ca Abstract--We study secret. In this case we show that secret-key agreement is still possible by using the wireless channel for discussion

  6. Information-Theoretic Key Agreement of Multiple Terminals -Part I: Source Model

    E-Print Network [OSTI]

    Anantharam, Venkat

    1 Information-Theoretic Key Agreement of Multiple Terminals - Part I: Source Model Amin Aminzadeh the widely studied source model. In the source model the terminals wishing to generate a secret key, as well of jointly distributed random variables, after which the terminals are allowed interactive authenticated

  7. Information-Theoretic Key Agreement of Multiple Terminals -Part II: Channel Model

    E-Print Network [OSTI]

    Anantharam, Venkat

    1 Information-Theoretic Key Agreement of Multiple Terminals - Part II: Channel Model Amin Aminzadeh the channel model. In the channel model, a set of two or more terminals wish to create a shared secret key that is information-theoretically secure from an eavesdropper. The first terminal can choose a sequence of inputs

  8. Correction of beam wander for a free-space quantum key distribution system operating in urban environment

    E-Print Network [OSTI]

    Alberto Carrasco-Casado; Natalia Denisenko; Veronica Fernandez

    2014-11-13T23:59:59.000Z

    Free-space quantum key distribution links in urban environment have demanding operating needs, such as functioning in daylight and under atmospheric turbulence, which can dramatically impact their performance. Both effects are usually mitigated with a careful design of the field of view of the receiver. However, a trade-off is often required, since a narrow field of view improves background noise rejection but it is linked to an increase in turbulence-related losses. In this paper, we present a high-speed automatic tracking system to overcome these limitations. Both a reduction in the field-of-view to decrease the background noise and the mitigation of the losses caused by atmospheric turbulence are addressed. Two different designs are presented and discussed, along with technical considerations for the experimental implementation. Finally, preliminary experimental results of beam wander correction are used to estimate the potential improvement of both the quantum bit error rate and secret key rate of a free space quantum key distribution system.

  9. Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

    SciTech Connect (OSTI)

    Tamaki, Kiyoshi; Koashi, Masato; Imoto, Nobuyuki [CREST Research Team for Interacting Carrier Electronics, School of Advanced Sciences, Graduate University for Advanced Studies (SOKENDAI), Hayama, Kanagawa 240-0193 (Japan)

    2003-03-01T23:59:59.000Z

    The security of two-state quantum-key distribution against individual attack is estimated when the channel has losses and noises. We assume that Alice and Bob use two nonorthogonal single-photon polarization states. To make our analysis simple, we propose a modified B92 protocol in which Alice and Bob make use of inconclusive results, and Bob performs a kind of symmetrization of received states. Using this protocol, Alice and Bob can estimate Eve's information gain as a function of a few parameters that reflect the imperfections of devices, or Eve's disturbance. In some parameter regions, Eve's maximum information gain shows counterintuitive behavior, namely, it decreases as the amount of disturbances increases. For a small noise rate, Eve can extract perfect information in the case where the angle between Alice's two states is small or large, while she cannot extract perfect information for intermediate angles. We also estimate the secret key gain, which is the net growth of the secret key per pulse. We show the region where the modified B92 protocol over a realistic channel is secure against individual attack.

  10. Key Distillation and the Secret-Bit Fraction

    E-Print Network [OSTI]

    Nick S. Jones; Lluis Masanes

    2008-05-12T23:59:59.000Z

    We consider distillation of secret bits from partially secret noisy correlations P_ABE, shared between two honest parties and an eavesdropper. The most studied distillation scenario consists of joint operations on a large number of copies of the distribution (P_ABE)^N, assisted with public communication. Here we consider distillation with only one copy of the distribution, and instead of rates, the 'quality' of the distilled secret bits is optimized, where the 'quality' is quantified by the secret-bit fraction of the result. The secret-bit fraction of a binary distribution is the proportion which constitutes a secret bit between Alice and Bob. With local operations and public communication the maximal extractable secret-bit fraction from a distribution P_ABE is found, and is denoted by Lambda[P_ABE]. This quantity is shown to be nonincreasing under local operations and public communication, and nondecreasing under eavesdropper's local operations: it is a secrecy monotone. It is shown that if Lambda[P_ABE]>1/2 then P_ABE is distillable, thus providing a sufficient condition for distillability. A simple expression for Lambda[P_ABE] is found when the eavesdropper is decoupled, and when the honest parties' information is binary and the local operations are reversible. Intriguingly, for general distributions the (optimal) operation requires local degradation of the data.

  11. Keys to success: Ten case studies of effective weatherization programs

    SciTech Connect (OSTI)

    Brown, M.A.; Berry, L.G.; Kolb, J.O.; White, D.L. [Oak Ridge National Lab., TN (United States); Kinney, L.F.; Wilson, T. [Synertech Systems Corp., Syracuse, NY (United States)

    1993-11-01T23:59:59.000Z

    In 1990, DOE initiated a nationwide evaluation of its Weatherization Program, with assistance from Oak Ridge National Laboratory and an advisory group of 40 weatherization professionals, program managers, and researchers. The evaluation is comprised of three impact studies covering the Program`s major market segments: Single-family homes, mobile homes, and dwellings in small (2 to 4-unit) multifamily buildings (the Single-Family Study), Single-family homes heated primarily with fuel oil (the Fuel-Oil Study), and Dwellings in buildings with five or more units (the Multifamily Study). The Single-Family Study, the subject of this report, is a critical part of this coordinated evaluation effort. Its focus on single-family dwellings, mobile homes, and dwellings in small multifamily buildings covers 83% of the income-eligible population and 96% of the dwellings weatherized during Program Year 1989. The first phase of the Single-Family Study involved the analysis of a massive data base of information collected from 368 local weatherization agencies and 543 electric and gas utilities. This analysis resulted in energy-saving and cost-effectiveness estimates for the Weatherization Program and the identification of a set of ten high-performing agencies located throughout the country. The second phase, which is the subject of this report, involves a ``process`` evaluation of these ten high performers, aimed at identifying those weatherization practices that explain their documented success.

  12. 100 km secure differential phase shift quantum key distribution with low jitter up-conversion detectors

    E-Print Network [OSTI]

    Eleni Diamanti; Hiroki Takesue; Carsten Langrock; M. M. Fejer; Yoshihisa Yamamoto

    2006-08-13T23:59:59.000Z

    We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 um single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.

  13. Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate

    E-Print Network [OSTI]

    Graeme Smith; Joseph M. Renes; John A. Smolin

    2008-04-28T23:59:59.000Z

    A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

  14. Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel

    E-Print Network [OSTI]

    Salimi, Somayeh

    2012-01-01T23:59:59.000Z

    A secret key agreement setup between three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. The three users observe i.i.d. outputs of correlated sources and there is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 for communication between the users. The secret key agreement is established using the correlated sources and the GDMMAC. In this setup, inner and outer bounds of the secret key capacity region are investigated. Moreover, for a special case where the channel inputs and outputs and the sources form Markov chains in some order, the secret key capacity region is derived. Also a Gaussian case is considered in this setup.

  15. Geothermal: Search Results

    Office of Scientific and Technical Information (OSTI)

    Search Results Geothermal Technologies Legacy Collection HelpFAQ | Site Map | Contact Us HomeBasic Search About Publications Advanced Search New Hot Docs News Related Links The...

  16. User Survey Results | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    have accessed computing resources during the prior year. The results of the most recent survey are posted here with management responses to concerns or issues identified by our...

  17. Overview of ALICE results

    E-Print Network [OSTI]

    Kryshen, E L

    2013-01-01T23:59:59.000Z

    Selected ALICE results on the global event properties, particle spectra, azimuthal anisotropy, heavy flavour and quarkonium production in Pb-Pb collisions at sqrt(s_NN) = 2.76 TeV are presented. First results on p-Pb collisions at sqrt(s_NN) = 5.02 TeV are briefly reviewed.

  18. Diffraction Results from CDF

    SciTech Connect (OSTI)

    Goulianos, Konstantin

    2012-04-01T23:59:59.000Z

    We present final results by the CDF II collaboration on diffractive W and Z production, report on the status of ongoing analyses on diffractive dijet production and on rapidity gaps between jets, and briefly summarize results obtained on exclusive production pointing to their relevance to calibrating theoretical models used to predict exclusive Higgs-boson production at the LHC.

  19. Recent results from TRISTAN

    SciTech Connect (OSTI)

    Enomoto, Ryoji [National Laboratory for High Energy Physics, Ibaraki (Japan)

    1997-01-01T23:59:59.000Z

    TRISTAN results on {gamma}{gamma} physics from 1994 to 1995 are reviewed in this report. We have systematically investigated jet production, the {gamma}-structure function, and charm pair production in {gamma}{gamma} processes. The results are discussed, and future prospects are presented.

  20. Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2, and 118-H-3 Solid Waste Burial Grounds

    SciTech Connect (OSTI)

    T. J. Rodovsky

    2007-04-12T23:59:59.000Z

    This report presents the final hazard categorization (FHC) for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

  1. Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2, and 118-H-3 Solid Waste Burial Grounds

    SciTech Connect (OSTI)

    T. J. Rodovsky

    2006-12-06T23:59:59.000Z

    This report presents the final hazard categorization (FHC) for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

  2. Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2 and 118-H-3 Solid Waste Burial Grounds

    SciTech Connect (OSTI)

    K. L. Vialetti

    2008-05-20T23:59:59.000Z

    This report presents the final hazard categorization for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

  3. Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths

    E-Print Network [OSTI]

    Masahito Hayashi; Ryota Nakayama

    2013-11-19T23:59:59.000Z

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

  4. Conversion of Human Steroid 5[beta]-Reductase (AKR1D1) into 3[beta]-Hydroxysteroid Dehydrogenase by Single Point Mutation E120H: Example of Perfect Enzyme Engineering

    SciTech Connect (OSTI)

    Chen, Mo; Drury, Jason E.; Christianson, David W.; Penning, Trevor M. (UPENN)

    2012-10-10T23:59:59.000Z

    Human aldo-keto reductase 1D1 (AKR1D1) and AKR1C enzymes are essential for bile acid biosynthesis and steroid hormone metabolism. AKR1D1 catalyzes the 5{beta}-reduction of {Delta}{sup 4}-3-ketosteroids, whereas AKR1C enzymes are hydroxysteroid dehydrogenases (HSDs). These enzymes share high sequence identity and catalyze 4-pro-(R)-hydride transfer from NADPH to an electrophilic carbon but differ in that one residue in the conserved AKR catalytic tetrad, His120 (AKR1D1 numbering), is substituted by a glutamate in AKR1D1. We find that the AKR1D1 E120H mutant abolishes 5{beta}-reductase activity and introduces HSD activity. However, the E120H mutant unexpectedly favors dihydrosteroids with the 5{alpha}-configuration and, unlike most of the AKR1C enzymes, shows a dominant stereochemical preference to act as a 3{beta}-HSD as opposed to a 3{alpha}-HSD. The catalytic efficiency achieved for 3{beta}-HSD activity is higher than that observed for any AKR to date. High resolution crystal structures of the E120H mutant in complex with epiandrosterone, 5{beta}-dihydrotestosterone, and {Delta}{sup 4}-androstene-3,17-dione elucidated the structural basis for this functional change. The glutamate-histidine substitution prevents a 3-ketosteroid from penetrating the active site so that hydride transfer is directed toward the C3 carbonyl group rather than the {Delta}{sup 4}-double bond and confers 3{beta}-HSD activity on the 5{beta}-reductase. Structures indicate that stereospecificity of HSD activity is achieved because the steroid flips over to present its {alpha}-face to the A-face of NADPH. This is in contrast to the AKR1C enzymes, which can invert stereochemistry when the steroid swings across the binding pocket. These studies show how a single point mutation in AKR1D1 can introduce HSD activity with unexpected configurational and stereochemical preference.

  5. Phase-remapping attack in practical quantum-key-distribution systems

    SciTech Connect (OSTI)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

    2007-03-15T23:59:59.000Z

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

  6. Security of high-dimensional quantum key distribution protocols using Franson interferometers

    E-Print Network [OSTI]

    Thomas Brougham; Stephen M. Barnett; Kevin T. McCusker; Paul G. Kwiat; Daniel J. Gauthier

    2013-05-20T23:59:59.000Z

    Franson interferometers are increasingly being proposed as a means of securing high-dimensional energy-time entanglement-based quantum key distribution (QKD) systems. Heuristic arguments have been proposed that purport to demonstrate the security of these schemes. We show, however, that such systems are vulnerable to attacks that localize the photons to several temporally separate locations. This demonstrates that a single pair of Franson interferometers is not a practical approach to securing high-dimensional energy-time entanglement based QKD. This observations leads us to investigate the security of modified Franson-based-protocols, where Alice and Bob have two or more Franson interferometers. We show that such setups can improve the sensitivity against attacks that localize the photons to multiple temporal locations. While our results do not constituting a full security proof, they do show that a single pair of Franson interferometers is not secure and that multiple such interferometers could be a promising candidate for experimentally realizable high-dimensional QKD.

  7. Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol

    SciTech Connect (OSTI)

    Tsurumaru, Toyohiro [Mitsubishi Electric Corporation, Information Technology R and D Center, 5-1-1 Ofuna, Kamakura-shi, Kanagawa, 247-8501 (Japan)

    2007-06-15T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum-key-distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. [Phys. Rev. A 73, 012344 (2006)]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the 'discretized Gaussian' intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100 km reported by Diamanti et al. [Opt. Express 14, 13073 (2006)] turns out to be insecure. Moreover, it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95 km.

  8. First-principles flocculation as the key to low energy algal biofuels processing.

    SciTech Connect (OSTI)

    Hewson, John C.; Wyatt, Nicholas B.; Pierce, Flint; Brady, Patrick Vane; Dwyer, Brian P.; Grillet, Anne Mary; Hankins, Matthew G; Hughes, Lindsey Gloe; Lechman, Jeremy B.; Mondy, Lisa Ann; Murton, Jaclyn K.; O'Hern, Timothy J; Parchert, Kylea Joy; Pohl, Phillip Isabio; Williams, Cecelia Victoria; Zhang, Xuezhi [Arizona State University, Mesa, AZ; Hu, Qiang [Arizona State University, Mesa, AZ; Amendola, Pasquale [Arizona State University, Mesa, AZ; Reynoso, Monica [Arizona State University, Mesa, AZ; Sommerfeld, Milton [Arizona State University, Mesa, AZ

    2012-09-01T23:59:59.000Z

    This document summarizes a three year Laboratory Directed Research and Development (LDRD) program effort to improve our understanding of algal flocculation with a key to overcoming harvesting as a techno-economic barrier to algal biofuels. Flocculation is limited by the concentrations of deprotonated functional groups on the algal cell surface. Favorable charged groups on the surfaces of precipitates that form in solution and the interaction of both with ions in the water can favor flocculation. Measurements of algae cell-surface functional groups are reported and related to the quantity of flocculant required. Deprotonation of surface groups and complexation of surface groups with ions from the growth media are predicted in the context of PHREEQC. The understanding of surface chemistry is linked to boundaries of effective flocculation. We show that the phase-space of effective flocculation can be expanded by more frequent alga-alga or floc-floc collisions. The collision frequency is dependent on the floc structure, described in the fractal sense. The fractal floc structure is shown to depend on the rate of shear mixing. We present both experimental measurements of the floc structure variation and simulations using LAMMPS (Large-scale Atomic/Molecular Massively Parallel Simulator). Both show a densification of the flocs with increasing shear. The LAMMPS results show a combined change in the fractal dimension and a change in the coordination number leading to stronger flocs.

  9. Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution

    SciTech Connect (OSTI)

    Shapiro, Jeffrey H. [Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

    2011-09-15T23:59:59.000Z

    The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard 1984 (BB84) protocol is evaluated. Two earth-space scenarios are examined: satellite-to-ground and ground-to-satellite transmission. Both lie in the far-field power-transfer regime. This work complements previous analysis of turbulence effects in near-field terrestrial BB84 QKD [J. H. Shapiro, Phys. Rev. A 67, 022309 (2003)]. More importantly, it shows that scintillation has virtually no impact on the sift and error probabilities in earth-space BB84 QKD, something that has been implicitly assumed in prior analyses for that application. This result contrasts rather sharply with what is known for high-speed laser communications over such paths, in which deep, long-lived scintillation fades present a major challenge to high-reliability operation.

  10. The Hubble Space Telescope Extragalactic Distance Scale Key Project. X. The Cepheid Distance to NGC 7331

    E-Print Network [OSTI]

    H0 Key Project; :; Shaun M. G. Hughes; Mingsheng Han; John Hoessel; Wendy L. Freedman; Robert C. Kennicutt; Jeremy. R. Mould; Abi Saha; Peter B. Stetson; Barry F. Madore; Nancy A. Silbermann; Paul Harding; Laura Ferrarese; Holland Ford; Brad K. Gibson; John A. Graham; Robert Hill; John Huchra; Garth D. Illingworth; Randy Phelps; Shoko Sakai

    1998-02-13T23:59:59.000Z

    The distance to NGC 7331 has been derived from Cepheid variables observed with HST/WFPC2, as part of the Extragalactic Distance Scale Key Project. Multi-epoch exposures in F555W (V) and F814W (I), with photometry derived independently from DoPHOT and DAOPHOT/ALLFRAME programs, were used to detect a total of 13 reliable Cepheids, with periods between 11 and 42 days. The relative distance moduli between NGC 7331 and the LMC, imply an extinction to NGC 7331 of A_V = 0.47+-0.15 mag, and an extinction-corrected distance modulus to NGC 7331 of 30.89+-0.14(random) mag, equivalent to a distance of 15.1 Mpc. There are additional systematic uncertainties in the distance modulus of +-0.12 mag due to the calibration of the Cepheid Period-Luminosity relation, and a systematic offset of +0.05+-0.04 mag if we applied the metallicity correction inferred from the M101 results of Kennicutt et al 1998.

  11. 2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS

    E-Print Network [OSTI]

    RadioAstronomie Millimétrique, Institut de (IRAM)

    2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS 829. WARM H2 IN THE GALACTIC CENTER. Hüttemeister 2001, A&A 365, 174 830. THE IRAM KEY-PROJECT: SMALL- SCALE STRUCTURE OF PRE-STAR FORMING REGIONS. Heithausen, E. Falgarone 2001, A&A 365, 275 831. METHODS AND CONSTRAINTS FOR THE CORRECTION OF THE ERROR BEAM

  12. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    E-Print Network [OSTI]

    Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

    2007-09-04T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

  13. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    SciTech Connect (OSTI)

    Lodewyck, Jerome; Fossier, Simon [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France); Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Bloch, Matthieu; McLaughlin, Steven W. [GeorgiaTech-CNRS UMI 2958, 2-3 rue Marconi, 57070 Metz (France); Garcia-Patron, Raul; Karpov, Evgueni; Cerf, Nicolas J. [Centre for Quantum Information and Communication, Ecole Polytechnique, CP 165/59, Universite libre de Bruxelles, 50 av. F. D. Roosevelt, B-1050 Brussels (Belgium); Diamanti, Eleni; Tualle-Brouri, Rosa; Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Debuisschert, Thierry [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France)

    2007-10-15T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient low-density parity check error correcting codes.

  14. Quantum key distribution using entangled-photon trains with no basis selection

    SciTech Connect (OSTI)

    Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan); NTT Basic Research Laboratories, NTT Corporation, Kanagawa 243-0198 (Japan); CREST, JST, Saitama 332-0012 (Japan); Takesue, Hiroki [NTT Basic Research Laboratories, NTT Corporation, Kanagawa 243-0198 (Japan); CREST, JST, Saitama 332-0012 (Japan)

    2006-03-15T23:59:59.000Z

    Conventional quantum key distribution (QKD) protocols include a basis selection process for providing a secure secret key. In contrast, this paper proposes an entanglement-based QKD with no basis selection procedure. Entangled-photon pulse trains with an average photon number less than one per pulse are sent to two legitimate parties, from which a secret key is created utilizing the entanglement nature. Eavesdropping on a transmission line is prevented by a condition of less than one photon per pulse, and sending classically correlated coherent pulses instead of quantum correlated ones is revealed by monitoring coincident count rate000.

  15. Sensitivity and Scenario Results

    E-Print Network [OSTI]

    Yu, Winston

    Presents the results of various scenarios using models used to study water, climate, agriculture and the economy in Pakistan's Indus Basin, and discusses the policy and investment implications. The water allocations per ...

  16. Electroweak results from CDF

    SciTech Connect (OSTI)

    D. S. Waters

    2004-06-02T23:59:59.000Z

    Inclusive W and Z production cross-sections have been measured by CDF and certain electroweak parameters extracted with high precision from these measurements. New results on diboson production at the Tevatron are also presented.

  17. Recent MEG results

    E-Print Network [OSTI]

    G. Cavoto

    2010-12-09T23:59:59.000Z

    New results of a search for the ultra-rare decay $\\mu \\to e \\gamma$ by the MEG collaboration are reported in this contribution. The data were taken during 2009 and correspond to approximately 6.5 10$^{13}$ muon stopped on target. A maximum likelihood analysis sets an upper limit at 90\\% C.L. on the branching ratio, BF($\\mu \\to e \\gamma$) $< $1.5 10$^{-11}$. The results presented here are preliminary.

  18. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect (OSTI)

    Abercrombie, R. K. [ORNL] [ORNL; Peters, Scott [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2014-05-28T23:59:59.000Z

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  19. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  20. A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey

    E-Print Network [OSTI]

    Utrecht, Universiteit

    A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey of the Menderes Massif in western Turkey, and subsequently a map-view restoration of its Neogene unroofing history

  1. Vit Plant receives and sets key air filtration equipment for Low Activity Waste Facility

    Broader source: Energy.gov [DOE]

    WTP lifted a nearly 100-ton carbon bed absorber into the Low-Activity Waste Facility. This key piece of air-filtration equipment will remove mercury and acidic gases before air is channeled through...

  2. Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Democracy Movement

    E-Print Network [OSTI]

    Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Digest | July 2010 | www.publicsectordigest.com underlying tensions and tough choices inherent to most

  3. Tritium inventory control in ITER Charles Skinner with key contributions from

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    Tritium inventory control in ITER Charles Skinner with key contributions from Charles Gentile permitted" Tritium inventory control Worrisome issue: Once at the tritium limit there won't be any more

  4. Reliable and efficient PUF-based key generation using pattern matching

    E-Print Network [OSTI]

    Paral, Zdenek (Sid)

    We describe a novel and efficient method to reliably provision and re-generate a finite and exact sequence of bits, for use with cryptographic applications, e.g., as a key, by employing one or more challengeable Physical ...

  5. Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action,

    E-Print Network [OSTI]

    Lubell, Mark

    Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action, environmentalism, collective interest model. Mark Lubell Department The literature on environmental activism has failed to produce a model of individual decision- making explicitly

  6. PPPL to launch major upgrade of key fusion energy test facility...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to launch major upgrade of key fusion energy test facility NSTX project will produce most powerful spherical torus in the world By John Greenwald January 9, 2012 Tweet Widget...

  7. Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies

    E-Print Network [OSTI]

    Kopec, Danny

    Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

  8. Test Scanning Request Form Please complete one form for each test and key.

    E-Print Network [OSTI]

    Pantaleone, Jim

    Test Scanning Request Form Please complete one form for each test and key. This Section to be completed by the Scanning Requestor Date Regarding This Scan Date Received Time Initials Number of Tests Scored: / / : A.M. P

  9. Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures

    E-Print Network [OSTI]

    Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures Staff Summary of Ecotope Recommendation: Staff Response and Recommended Action: 4.1.3 Ductless Heat Pumps Staff Summary of Ecotope Recommendation

  10. HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped

    E-Print Network [OSTI]

    MacAdam, Keith

    HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped SchoolofHumanEnvironmentalSciences HES 100 AN INTRODUCTION TO PROFESSIONS IN HUMAN ENVIRONMENTAL SCIENCES. (1) An orientation to human environmental sciences, its history, contemporary issues and philosophy

  11. Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2006-02-24T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

  12. Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2005-08-03T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

  13. QUADRATURE CHAOS SHIFT KEYING Zbigniew Galias and Gian Mario Maggio y

    E-Print Network [OSTI]

    Galias, Zbigniew

    shift keying communication system. The block diagram of the QCSK modulation scheme is shown in Fig. 1. 3: Dept. of Electrical Engi­ neering, University of Mining and Metallurgy, al. Mickiewicza 30, 30

  14. Cryptographic security of the quantum key distribution from the triangle inequality

    E-Print Network [OSTI]

    Pawel Kurzynski; Marcin Markiewicz; Dagomir Kaszlikowski

    2014-09-22T23:59:59.000Z

    We show that the Csiszar-Korner sufficient condition for secure cryptographic key generation with the help of quantum theory can be easily derived using the triangle inequality for an information-theoretic distance.

  15. Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management

    E-Print Network [OSTI]

    Foley, Simon

    Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management Simon N. Foley, Thomas B. Quillinan, John P. Morrison, David A. Power, James J. Kennedy. Department of Computer Science

  16. Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths

    E-Print Network [OSTI]

    Masahito Hayashi; Toyohiro Tsurumaru

    2012-05-17T23:59:59.000Z

    We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.

  17. Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution

    E-Print Network [OSTI]

    Shapiro, Jeffrey H.

    The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard ...

  18. Roles of key active-site residues in flavocytochrome P450 BM3

    E-Print Network [OSTI]

    Noble, Michael A.; Miles, Caroline S.; Chapman, Stephen K.; Lysek, Dominikus A.; MacKay, Angela C.; Reid, Graeme A.; Hanzlik, Robert P.; Munro, Andrew W.

    1999-01-01T23:59:59.000Z

    The effects of mutation of key active-site residues (Arg-47, Tyr-51, Phe-42 and Phe-87) in Bacillus megaterium flavocytochrome P450 BM3 were investigated. Kinetic studies on the oxidation of laurate and arachidonate showed ...

  19. Demand Response in the U.S.- Key trends and federal facility participation

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—provides demand response (DR) definition, current status of DR in the United States, key DR trends, and federal participation issues.

  20. Practical free-space quantum key distribution over 10 km in daylight and at night

    E-Print Network [OSTI]

    Richard J. Hughes; Jane E. Nordholt; Derek Derkacs; Charles G. Peterson

    2002-06-14T23:59:59.000Z

    We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency, we infer that free-space QKD will be practical over much longer ranges under these and other atmospheric and instrumental conditions.

  1. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel

    E-Print Network [OSTI]

    Yong Shen; Jian Yang; Hong Guo

    2009-06-29T23:59:59.000Z

    Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analyzed. Assuming the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare and measurement scheme and entanglement-based scheme are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and further, a lower bound to the secure key rate is derived.

  2. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  3. Tight bound on the coherent-state quantum key distribution with heterodyne detection

    SciTech Connect (OSTI)

    Lodewyck, Jerome [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France); Laboratoire Charles Fabry de l'Institut d'Optique, CNRS, UMR 8501, Campus Universitaire, Batiment 503, 91403 Orsay Cedex (France); Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique, CNRS, UMR 8501, Campus Universitaire, Batiment 503, 91403 Orsay Cedex (France)

    2007-08-15T23:59:59.000Z

    We propose an upper bound for the eavesdropper's information in the direct and reverse reconciliated coherent states quantum key distribution protocols with heterodyne detection. This bound is derived by maximizing the leaked information over the symplectic group of transformations that spans every physical Gaussian attack on individual pulses. We exhibit four different attacks that reach this bound, which shows that this bound is tight. Finally, we compare the secret key rate obtained with this bound to the homodyne rate.

  4. Plans, Implementation, and Results

    Broader source: Energy.gov [DOE]

    The Bioenergy Technologies Office carries out technology research, development, and deployment through an ongoing process of planning and analysis, implementation, and review. This Web page includes links to documents that support and document the program management process, and the results and public benefits that derive from it.

  5. Recent results from MAC

    SciTech Connect (OSTI)

    MAC Collaboration

    1982-05-01T23:59:59.000Z

    Some preliminary results from the MAC detector at PEP are presented. These include measurements of the angular distribution of ..gamma gamma.., ..mu mu.. and tau tau final states, a determination of the tau lifetime, a measurement of R, and a presentation of the inclusive muon p/sub perpendicular/ distribution for hadronic events.

  6. U.S. Geothermal Announces More Test Results from the Neal Hot...

    Open Energy Info (EERE)

    Announces More Test Results from the Neal Hot Springs Production Well and a Key Addition to Senior Staff Jump to: navigation, search OpenEI Reference LibraryAdd to library Report:...

  7. RESULTS OF SLICE MEASUREMENTS

    E-Print Network [OSTI]

    Rudolph, J

    2011-01-01T23:59:59.000Z

    The linear accelerator ELBE delivers high-brightness electron bunches to multiple user stations, including two IR-FEL oscillators [1], [2]. In the framework of an upgrade program the current thermionic injector is being replaced by a SRF-photoinjector [3], [4]. The SRF injector promises higher beam quality, especially required for future experiments with high power laser radiation. During the commissioning phase, the SRF-injector was running in parallel to the thermionic gun. After installation of a injection beamline (dogleg), beam from the SRF-injector can now be injected into the ELBE linac. Detailed characterization of the electron beam quality delivered by the new electron injector includes vertical slice emittance measurements in addition to measurements of projected emittance values. This report gives an overview of the status of the project and summarizes first measurement results as well as results of simulations performed with measurement settings.

  8. Tevatron Top Results

    E-Print Network [OSTI]

    Christophe Clement

    2006-05-28T23:59:59.000Z

    I present the latest results from the CDF and D0 collaborations on top quark production (single top and top quark pair production) at the Tevatron proton-antiproton collider at sqrt(s) =1.96 TeV, measurements of the top quark decay properties such as the branching ratio B(t -> Wb), the W helicity in t -> Wb decays, and measurements of fundamental parameters such as the top quark charge and mass.

  9. Double Chooz: Latest results

    E-Print Network [OSTI]

    J. I. Crespo-Anadón; for the Double Chooz collaboration

    2014-12-11T23:59:59.000Z

    The latest results from the Double Chooz experiment on the neutrino mixing angle $\\theta_{13}$ are presented. A detector located at an average distance of 1050 m from the two reactor cores of the Chooz nuclear power plant has accumulated a live time of 467.90 days, corresponding to an exposure of 66.5 GW-ton-year (reactor power $\\times$ detector mass $\\times$ live time). A revised analysis has boosted the signal efficiency and reduced the backgrounds and systematic uncertainties compared to previous publications, paving the way for the two detector phase. The measured $\\sin^2 2\\theta_{13} = 0.090^{+0.032}_{-0.029}$ is extracted from a fit to the energy spectrum. A deviation from the prediction above a visible energy of 4 MeV is found, being consistent with an unaccounted reactor flux effect, which does not affect the $\\theta_{13}$ result. A consistent value of $\\theta_{13}$ is measured in a rate-only fit to the number of observed candidates as a function of the reactor power, confirming the robustness of the result.

  10. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Aysajan Abidin; Jan-Åke Larsson

    2013-03-01T23:59:59.000Z

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman & Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal$_2$ hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability $\\epsilon$ and the authentication key has an $\\epsilon'$ trace distance to the uniform, then under ITS, the adversary's success probability conditioned on an authentic message-tag pair is only bounded by $\\epsilon+|\\mT|\\epsilon'$, where $|\\mT|$ is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to $|\\mT|\\epsilon'$ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than $\\epsilon+\\epsilon'$. This proves that the scheme is ($\\epsilon+\\epsilon'$)-UC-secure, without using the composability theorem.

  11. Similarities and Differences between Coronal Holes and the Quiet Sun: Are Loop Statistics the Key?

    E-Print Network [OSTI]

    T. Wiegelmann; S. K. Solanki

    2008-02-01T23:59:59.000Z

    Coronal holes (CH) emit significantly less at coronal temperatures than quiet-Sun regions (QS), but can hardly be distinguished in most chromospheric and lower transition region lines. A key quantity for the understanding of this phenomenon is the magnetic field. We use data from SOHO/MDI to reconstruct the magnetic field in coronal holes and the quiet Sun with the help of a potential magnetic model. Starting from a regular grid on the solar surface we then trace field lines, which provide the overall geometry of the 3D magnetic field structure. We distinguish between open and closed field lines, with the closed field lines being assumed to represent magnetic loops. We then try to compute some properties of coronal loops. The loops in the coronal holes (CH) are found to be on average flatter than in the QS. High and long closed loops are extremely rare, whereas short and low-lying loops are almost as abundant in coronal holes as in the quiet Sun. When interpreted in the light of loop scaling laws this result suggests an explanation for the relatively strong chromospheric and transition region emission (many low-lying, short loops), but the weak coronal emission (few high and long loops) in coronal holes. In spite of this contrast our calculations also suggest that a significant fraction of the cool emission in CHs comes from the open flux regions. Despite these insights provided by the magnetic field line statistics further work is needed to obtain a definite answer to the question if loop statistics explain the differences between coronal holes and the quiet Sun.

  12. Recent Results from HAPPEX

    SciTech Connect (OSTI)

    Robert Michaels

    2006-09-18T23:59:59.000Z

    New measurements of the parity-violating asymmetry in elastic scattering of 3GeV electrons off hydrogen and helium-4 targets at theta{sub lab} = 6 degrees are reported. The helium-4 result is A = (+6.40 {+-} 0.23 (stat) {+-} 0.12 (syst)) * 10{sup -6}. The hydrogen result is A = (-1.58 {+-} 0.12 (stat) {+-} 0.04 (syst)) * 10{sup -6}. The asymmetry for hydrogen is a function of a linear combination of G{sub E}{sup s} and G{sub M}{sup s}, the strange quark contributions to the electric and magnetic form factors of the nucleon respectively, and that for helium-4 is a function solely of G{sub E}{sup s}. The combination of the two measurements separates G{sub E}{sup s} and G{sub M}{sup s} and provide new limits on the role of strange quarks in the nucleon charge and magnetization distributions. We extract G{sub E}{sup s} = 0.002 {+-} 0.014 {+-} 0.007 at Q{sup 2} = 0.077 GeV{sup 2} and G{sub E}{sup s} + 0.09 G{sub M}{sup s} = 0.007 {+-} 0.011 {+-} 0.006 at Q{sup 2} = 0.109 GeV{sup 2}.

  13. Organic Separation Test Results

    SciTech Connect (OSTI)

    Russell, Renee L.; Rinehart, Donald E.; Peterson, Reid A.

    2014-09-22T23:59:59.000Z

    Separable organics have been defined as “those organic compounds of very limited solubility in the bulk waste and that can form a separate liquid phase or layer” (Smalley and Nguyen 2013), and result from three main solvent extraction processes: U Plant Uranium Recovery Process, B Plant Waste Fractionation Process, and Plutonium Uranium Extraction (PUREX) Process. The primary organic solvents associated with tank solids are TBP, D2EHPA, and NPH. There is concern that, while this organic material is bound to the sludge particles as it is stored in the tanks, waste feed delivery activities, specifically transfer pump and mixer pump operations, could cause the organics to form a separated layer in the tank farms feed tank. Therefore, Washington River Protection Solutions (WRPS) is experimentally evaluating the potential of organic solvents separating from the tank solids (sludge) during waste feed delivery activities, specifically the waste mixing and transfer processes. Given the Hanford Tank Waste Treatment and Immobilization Plant (WTP) waste acceptance criteria per the Waste Feed Acceptance Criteria document (24590-WTP-RPT-MGT-11-014) that there is to be “no visible layer” of separable organics in the waste feed, this would result in the batch being unacceptable to transfer to WTP. This study is of particular importance to WRPS because of these WTP requirements.

  14. Final Hazard Categorization and Auditable Safety Analysis for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2 and 118-H-3 Solid Waste Burial Grounds

    SciTech Connect (OSTI)

    T. J. Rodovsky

    2006-03-01T23:59:59.000Z

    This report presents the initial hazard categorization, final hazard categorization and auditable safety analysis for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

  15. Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2, and 118-H-3 Solid Waste Burial Grounds

    SciTech Connect (OSTI)

    J.D. Ludowise

    2009-06-17T23:59:59.000Z

    This report presents the final hazard categorization for the remediation of the 118-D-1, 118-D-2, 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site. A material at risk calculation was performed that determined the radiological inventory for each burial ground to be Hazard Category 3.

  16. Results from NEMO 3

    E-Print Network [OSTI]

    R. L. Flack; for the NEMO 3 collaboration

    2008-10-30T23:59:59.000Z

    The NEMO 3 experiment is located in the Modane Underground Laboratory and has been taking data since 2003 with seven isotopes. It is searching for the double beta decay process with two or zero neutrinos emitted in the final state. Precision measurements of the half-life of the isotopes due to two neutrino double beta decay have been performed and new results for 96Zr, 48Ca and 150Nd are presented here. Measurements of this process are important for reducing the uncertainties on the nuclear matrix elements. No evidence for zero neutrino double beta decay has been found and a 90% Confidence Level lower limit on the half-life of this process is derived. From this an upper limit can be set on the effective Majorana neutrino mass using the most recent nuclear matrix elements calculations.

  17. MELCOR validation results

    SciTech Connect (OSTI)

    Leigh, C.D.; Byers, R.K.; Shaffer, C.J.

    1986-01-01T23:59:59.000Z

    Recent comparisons of MELCOR predictions to three sets of experiments, the ABCOVE Aerosol Experiments, the HDR-V44 Steam Blowdown Experiments, and the Battelle-Frankfurt Gas Mixing Experiments are presentd. All three comparisons involve conditions that are of concern in an LWR containment during a severe accident. MELCOR results are compared to the experimental data and the predictions of at least one other state-of-the-art code for each test. In the ABCOVE comparisons, the MELCOR aerosol modeling is demonstrated. In comparisons to the HDR-V44 Steam Blowdown Experiments, MELCOR predictions of the response of the containment to the release of steam from the primary system are shown, and in the Battelle-Frankfurt comparisons, MELCOR predictions of the diffusion in a containment of an injected hydrogen-nitrogen gas are studied. These comparisons provide critical testing of the MELCOR control volume hydrodynamics package, the radionuclide package, and the flow path package.

  18. Results from NA49

    E-Print Network [OSTI]

    C. Hoehne

    2005-10-17T23:59:59.000Z

    An overview of results from the CERN experiment NA49 is presented with emphasis on most recent measurements. NA49 has systematically studied the dependence of hadron production on energy and system size or centrality. At top-SPS energy the detailed investigation of hadron production, now also extending to elliptic flow of Lambda-baryons and to identified particle yields at high p_t, shows that the created matter behaves in a similar manner as at RHIC energies. In the lower SPS energy range a distinct structure is observed in the energy dependence of the rate of strangeness production and in the slopes of p_t-spectra suggesting the onset of the creation of a deconfined phase of matter.

  19. Wellcome Trust SUBMISSION OF EVIDENCE Wellcome Trust response to Department for Education: Reforming Key Stage 4 qualifications

    E-Print Network [OSTI]

    Rambaut, Andrew

    : Reforming Key Stage 4 qualifications December 2012 Department for Education: Reforming Key Stage 4 science skills. 2. We are pleased to have the opportunity to respond to the consultation on reforms to Key consultations on the reform to curriculum and assessment at various stages of schooling. There is an opportunity

  20. A SECRET KEY BASED MULTISCALE FRAGILE WATERMARK IN THE WAVELET Hua Yuan and Xiao-Ping Zhang

    E-Print Network [OSTI]

    Zhang, Xiao-Ping

    A SECRET KEY BASED MULTISCALE FRAGILE WATERMARK IN THE WAVELET DOMAIN Hua Yuan and Xiao-Ping Zhang. In this paper, a secret key based fragile watermarking scheme is presented based on this statistical model and modified in a way to form special relationships for image authentication. The secret key is designed

  1. Efficient heralding of O-band passively spatial-multiplexed photons for noise-tolerant quantum key distribution

    E-Print Network [OSTI]

    Mao Tong Liu; Han Chuen Lim

    2014-08-07T23:59:59.000Z

    When implementing O-band quantum key distribution on optical fiber transmission lines carrying C-band data traffic, noise photons that arise from spontaneous Raman scattering or insufficient filtering of the classical data channels could cause the quantum bit-error rate to exceed the security threshold. In this case, a photon heralding scheme may be used to reject the uncorrelated noise photons in order to restore the quantum bit-error rate to a low level. However, the secure key rate would suffer unless one uses a heralded photon source with sufficiently high heralding rate and heralding efficiency. In this work we demonstrate a heralded photon source that has a heralding efficiency that is as high as 74.5%. One disadvantage of a typical heralded photon source is that the long deadtime of the heralding detector results in a significant drop in the heralding rate. To counter this problem, we propose a passively spatial-multiplexed configuration at the heralding arm. Using two heralding detectors in this configuration, we obtain an increase in the heralding rate by 37% and a corresponding increase in the heralded photon detection rate by 16%. We transmitted the O-band photons over 10 km of noisy optical fiber to observe the relation between quantum bit-error rate and noise-degraded second-order correlation function of the transmitted photons. The effects of afterpulsing when we shorten the deadtime of the heralding detectors are also observed and discussed.

  2. Knowledge, skills, and abilities for key radiation protection positions at DOE facilities

    SciTech Connect (OSTI)

    NONE

    1997-01-01T23:59:59.000Z

    This document provides detailed qualification criteria for contractor key radiation protection personnel. Although federal key radiation protection positions are also identified, qualification standards for federal positions are provided in DOE O 360.1 and the DOE Technical Qualifications Program. Appendices B and D provide detailed listings for knowledge, skills, and abilities for contractor and DOE federal key radiation protection positions. This information may be used in developing position descriptions and individual development plans. Information provided in Appendix C may be useful in developing performance measures and assessing an individual`s performance in his or her specific position. Additionally, Federal personnel may use this information to augment their Office/facility qualification standards under the Technical Qualifications Program.

  3. Coexistence of high-bit-rate quantum key distribution and data on optical fiber

    E-Print Network [OSTI]

    K. A. Patel; J. F. Dynes; I. Choi; A. W. Sharpe; A. R. Dixon; Z. L. Yuan; R. V. Penty; A. J. Shields

    2012-11-30T23:59:59.000Z

    Quantum key distribution (QKD) uniquely allows distribution of cryptographic keys with security verified by quantum mechanical limits. Both protocol execution and subsequent applications require the assistance of classical data communication channels. While using separate fibers is one option, it is economically more viable if data and quantum signals are simultaneously transmitted through a single fiber. However, noise-photon contamination arising from the intense data signal has severely restricted both the QKD distances and secure key rates. Here, we exploit a novel temporal-filtering effect for noise-photon rejection. This allows high-bit-rate QKD over fibers up to 90 km in length and populated with error-free bidirectional Gb/s data communications. With high-bit rate and range sufficient for important information infrastructures, such as smart cities and 10 Gbit Ethernet, QKD is a significant step closer towards wide-scale deployment in fiber networks.

  4. Deterministic quantum-public-key encryption: forward search attack and randomization

    E-Print Network [OSTI]

    Georgios M. Nikolopoulos; Lawrence M. Ioannou

    2009-03-27T23:59:59.000Z

    In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

  5. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01T23:59:59.000Z

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  6. Long-distance continuous-variable quantum key distribution with a Gaussian modulation

    SciTech Connect (OSTI)

    Jouguet, Paul [Institut Telecom / Telecom ParisTech, CNRS LTCI, 46, rue Barrault, F-75634 Paris Cedex 13 (France); SeQureNet, 23 avenue d'Italie, F-75013 Paris (France); Kunz-Jacques, Sebastien [SeQureNet, 23 avenue d'Italie, F-75013 Paris (France); Leverrier, Anthony [ICFO-Institut de Ciencies Fotoniques, E-08860 Castelldefels (Barcelona) (Spain)

    2011-12-15T23:59:59.000Z

    We designed high-efficiency error correcting codes allowing us to extract an errorless secret key in a continuous-variable quantum key distribution (CVQKD) protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signal-to-noise ratios on an additive white Gaussian noise channel with a binary modulation and can be combined with a multidimensional reconciliation method proven secure against arbitrary collective attacks. This improved reconciliation procedure considerably extends the secure range of a CVQKD with a Gaussian modulation, giving a secret key rate of about 10{sup -3} bit per pulse at a distance of 120 km for reasonable physical parameters.

  7. Experimental study on discretely modulated continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Shen Yong; Zou Hongxin; Chen Pingxing; Yuan Jianmin [Department of Physics, National University of Defense Technology, Changsha 410073 (China); Tian Liang [Department of Physics, National University of Defense Technology, Changsha 410073 (China); College of Optoelectronic Science and Engineering, National University of Defense Technology, Changsha 410073 (China)

    2010-08-15T23:59:59.000Z

    We present a discretely modulated continuous-variable quantum key distribution system in free space by using strong coherent states. The amplitude noise in the laser source is suppressed to the shot-noise limit by using a mode cleaner combined with a frequency shift technique. Also, it is proven that the phase noise in the source has no impact on the final secret key rate. In order to increase the encoding rate, we use broadband homodyne detectors and the no-switching protocol. In a realistic model, we establish a secret key rate of 46.8 kbits/s against collective attacks at an encoding rate of 10 MHz for a 90% channel loss when the modulation variance is optimal.

  8. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using “Omics”

    SciTech Connect (OSTI)

    Myrold, David D. [Oregon State University; Bottomely, Peter J. [Oregon State University; Jumpponen, Ari [Kansas State University; Rice, Charles W. [Kansas State University; Zeglin, Lydia H. [Kansas State University; David, Maude M. [Lawrence Berkeley National Laboratory; Jansson, Janet K. [Lawrence Berkeley National Laboratory; Prestat, Emmanuel [Lawrence Berkeley National Laboratory; Hettich, Robert L. [Oak Ridge National Laboratory

    2014-09-17T23:59:59.000Z

    Soils process and store large amounts of C; however, considerable uncertainty still exists about the details of that influence microbial partitioning of C into soil C pools, and what are the main influential forces that control the fraction of the C input that is stabilized. The soil microbial community is genotypically and phenotypically diverse. Despite our ability to predict the kinds of regional environmental changes that will accompany global climate change, it is not clear how the microbial community will respond to climate-induced modification of precipitation and inter-precipitation intervals, and if this response will affect the fate of C deposited into soil by the local plant community. Part of this uncertainty lies with our ignorance of how the microbial community adapts genotypically and physiologically to changes in soil moisture brought about by shifts in precipitation. Our overarching goal is to harness the power of multiple meta-omics tools to gain greater understanding of the functioning of whole-soil microbial communities and their role in C cycling. We will do this by meeting the following three objectives: 1. Further develop and optimize a combination of meta-omics approaches to study how environmental factors affect microbially-mediated C cycling processes. 2. Determine the impacts of long-term changes in precipitation timing on microbial C cycling using an existing long-term field manipulation of a tallgrass prairie soil. 3. Conduct laboratory experiments that vary moisture and C inputs to confirm field observations of the linkages between microbial communities and C cycling processes. We took advantage of our state-of-the-art expertise in community “omics” to better understand the functioning soil C cycling within the Great Prairie ecosystem, including our ongoing Konza Prairie soil metagenome flagship project at JGI and the unique rainfall manipulation plots (RaMPs) established at this site more than a decade ago. We employed a systems biology approach, considering the complex soil microbial community as a functioning system and using state-of-the-art metatranscriptomic, metaproteomic, and metabolomic approaches. These omics tools were refined, applied to field experiments, and confirmed with controlled laboratory studies. Our experiments were designed to specifically identify microbial community members and processes that are instrumental players in processing of C in the prairie soils and how these processes are impacted by wetting and drying events. This project addresses a key ecosystem in the United States that current climate models predict will be subjected to dramatic changes in rainfall patterns as a result of global warming. Currently Mollisols, such as those of the tallgrass prairie, are thought to sequester more C than is released into the atmosphere, but it is not known what changes in rainfall patterns will have on future C fluxes. Through an analysis of the molecular response of the soil microbial community to shifts in precipitation cycles that are accompanied by phenologically driven changes in quality of plant C rhizodeposits, we gained deeper insight into how the metabolism of microbes has adapted to different precipitation regimes and the impact of this adaption on the fate of C deposited into soil. In doing so, we addressed key questions about the microbial cycling of C in soils that have been identified by the DOE.

  9. LSND neutrino oscillation results

    SciTech Connect (OSTI)

    Louis, W.C.; LSND Collaboration

    1996-10-01T23:59:59.000Z

    The LSND (Liquid Scintillator Neutrino Detector) experiment at Los Alamos has conducted a search for muon antineutrino {r_arrow} electron antineutrino oscillations using muon neutrinos from antimuon decay at rest. The electron antineutrinos are detected via the reaction electron antineutrino + proton {r_arrow} positron + neutron, correlated with the 2.2-MeV gamma from neutron + proton {r_arrow} deuteron + gamma. The use of tight cuts to identify positron events with correlated gamma rays yields 22 events with positron energy between 36 and 60 MeV and only 4.6 {+-} 0.6 background events. The probability that this excess is due entirely to a statistical fluctuation is 4.1 {times} 10{sup -8}. A chi-squared fit to the entire positron sample results in a total excess of 51.8 {sup +18.7}{sub -16.9} {+-} 8.0 events with positron energy between 20 and 60 MeV. If attributed to muon antineutrino {r_arrow} electron antineutrino oscillations, this corresponds to an oscillation probability (averaged over the experimental energy and spatial acceptance) of (0.31 {+-} 0.12 {+-} 0.05){percent}. 10 refs., 7 figs., 1 tab.

  10. LSND neutrino oscillation results

    SciTech Connect (OSTI)

    White, D.H.; LSND Collaboration

    1997-11-01T23:59:59.000Z

    The LSND experiment at Los Alamos has conducted a search for {anti v}{sub {mu}} {yields} {anti v}{sub e} oscillations using {anti v}{sub {mu}} from {mu}{sup +} decay at rest. The {anti v}{sub e} are detected via the reaction {anti v}{sub e} p {yields} e{sup +}n, correlated with the 2.2 MeV {gamma} from n p {yields} d {gamma}. The use of tight cuts to identify e{sup +} events with correlated {gamma} rays yielded 22 events with e{sup +} energy between 36 and 60 MeV and only 4.6 {+-} 0.6 background events. The probability that this excess is due entirely to a statistical fluctuation is 4.1 {times} 10{sup {minus}8}. A {chi}{sup 2} fit to the entire e{sup +} sample results in a total excess of 51.8{sub {minus}16.9}{sup +18.7} {+-} 8.0 events with e{sup +} energy between 20 and 60 MeV. If attributed to {anti v}{sub {mu}} {yields} {anti v}{sub e} oscillations, this corresponds to an oscillation probability (averaged over the experimental energy and spatial acceptance) of 0.31 {+-} 0.12 {+-} 0.05%.

  11. A 24 km fiber-based discretely signaled continuous variable quantum key distribution system

    E-Print Network [OSTI]

    Quyen Dinh Xuan; Zheshen Zhang; Paul L. Voss

    2009-10-06T23:59:59.000Z

    We report a continuous variable key distribution system that achieves a final secure key rate of 3.45 kb/sec over a distance of 24.2 km of optical fiber. The protocol uses discrete signaling and post-selection to improve reconciliation speed and quantifies security by means of quantum state tomography. Polarization multiplexing and a frequency translation scheme permit transmission of a continuous wave local oscillator and suppression of noise from guided acoustic wave Brillouin scattering by more than 27 dB.

  12. Membrane analogy for torsion of cylindrical bars with a slotted key-way

    E-Print Network [OSTI]

    Meiners, Herman Paul

    1964-01-01T23:59:59.000Z

    MEMBRANE ANALOGY FOR TORSION OF CYLINDRICAL BARS WITH A SLOTTED KEY-WAY A Thesis By HERMAN PAUL MEINERS, JR. Submitted to tj e Graduate College of the Texas ASM University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE May 1964 Major Subject: Aerospace Engineering MEMBRANE ANALOGY FOR TORSION OF CYLINDRICAL BARS WITH A SLOTTED KEY-WAY A Thesis By HERMAN PAUL MEINERS, JR. Approved as to style and content b (Chairman of Com ittee) (Head of Department...

  13. Double blinding-attack on entanglement-based quantum key distribution protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-06-14T23:59:59.000Z

    We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

  14. Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption

    E-Print Network [OSTI]

    Kam Wai Clifford Chan; Mayssaa El Rifai; Pramode K. Verma; Subhash Kak; Yuhua Chen

    2015-03-19T23:59:59.000Z

    This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the intercept-resend attack, the photon number splitting attack, and the man-in-the-middle attack. It is found that the mean photon number can be much larger than one. This complements the recent interest in multi-photon quantum communication protocols that require a pre-shared key between the legitimate users.

  15. Short period fluctuations of sea level in the West Florida Keys

    E-Print Network [OSTI]

    Hsu, Sangem

    1978-01-01T23:59:59.000Z

    stages at each station. It is found that seiches at Vaca Key show strong correlations with weather conditions and also that short period fluctuations at several stations are influenced by effects of non-linear residual tidal currents (effects through... Fluctuations of Sea Level at Stations with Data Recorded in April. 4. 3 Short Period Fluctuations of Sea Level at Stations with Data Recorded in June. 21 21 24 vi 4. 4 Residual Tidal Currents 4. 5 Seiches in Vaca Key 4. 6 The Effects of Friction...

  16. A Study of the Key Variables Affecting Bus Replacement Age Decisions and1 Total Costs2

    E-Print Network [OSTI]

    Bertini, Robert L.

    A Study of the Key Variables Affecting Bus Replacement Age Decisions and1 Total Costs2 3 Jesse operational3 and maintenance (O&M) per-mile costs increase as buses age. From a purely economic4 perspective, there is a cost tradeoff between the lower O&M costs of newer fleets and their5 higher initial capital costs

  17. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14

    E-Print Network [OSTI]

    Dixon, Peter

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  18. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14

    E-Print Network [OSTI]

    Dixon, Peter

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14 Are you starting a full-time course at university or college in the autumn? · Find out what student finance is available to you finance. Apply online by 31 May 2013. · Giving Student Finance England your UK passport number and your

  19. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13

    E-Print Network [OSTI]

    Oakley, Jeremy

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  20. Key Factors for Information Dissemination on Communicating Products and Fixed Databases

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Key Factors for Information Dissemination on Communicating Products and Fixed Databases Sylvain, a multitude of informational vectors take place in such environments like fixed databases or manufactured products on which we are able to em- bed significant proportion of data. By considering distributed