Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Analysis (1)
- Arbitrary state (1)
- Characterization (1)
- Communication (1)
- Density matrix (1)
-
- Designated verifier (1)
- Diffie-Hellman problem (1)
- Digital signature (1)
- Email address (1)
- Engineering teams (1)
- Entangled state (1)
- Hilbert space (1)
- Internet of things (1)
- Key generation (1)
- Momentum operator (1)
- One-time-pad (OTP) (1)
- Operational units (1)
- Position operator (1)
- Protocols (1)
- Public key (1)
- Quantum channel (1)
- Quantum circuit (1)
- Quantum computing (1)
- Quantum cryptography (1)
- Quantum information (1)
- Quantum key distribution (1)
- Quantum mechanics (1)
- Quantum signature (1)
- Quantum simulation (1)
- Quantum state (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Entire DC Network
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Understanding The Impact Of Emergent Conflict On Communication And Team Cognition: A Multilevel Study In Engineering Teams, Francisco Cima
Understanding The Impact Of Emergent Conflict On Communication And Team Cognition: A Multilevel Study In Engineering Teams, Francisco Cima
Engineering Management & Systems Engineering Theses & Dissertations
The development of team cognition is crucial for fostering high-performing teams. In cognitive-intensive fields like engineering, effective communication serves as a primary precursor to team knowledge development, enabling group members to effectively retrieve and utilize each other's expertise. Despite the critical role of communication, there is a lack of empirical research examining how conflict situations, which are critical emerging factors inherent to teamwork, interact with communication processes to constrain team knowledge development and utilization. This study, rooted in information processing theory, investigates how emerging conflict shapes multilevel team knowledge structures by interacting with communication processes in engineering project teams. Prior …
Structural Characterization Of A Tritruss Module, Lauren M. Simmons
Structural Characterization Of A Tritruss Module, Lauren M. Simmons
Mechanical & Aerospace Engineering Theses & Dissertations
The TriTruss is a novel structural module developed by researchers at NASA Langley Research Center (LaRC) that can be used in space to assemble large support structures for a variety of applications. One such application is the metering truss or primary mirror backbone support structure of an In-Space Assembled Telescope (iSAT). For the iSAT application, the TriTruss will be supporting mirror segments, payloads, and instruments, all of which require the TriTruss to have a high stiffness. Structural characterization from testing and analysis is needed to ensure the integrity of the struts that make up a TriTruss module is maintained when …
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
VMASC Publications
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …