By Topic

Quantum, Nano, and Micro Technologies, 2007. ICQNM '07. First International Conference on

2-6 Jan. 2007

Filter Results

Displaying Results 1 - 22 of 22
  • First International Conference on Quantum, Nano, and Micro Technologies - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • First International Conference on Quantum, Nano, and Micro Technologies - Title

    Publication Year: 2007, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • First International Conference on Quantum, Nano, and Micro Technologies - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (609 KB)
    Freely Available from IEEE
  • First International Conference on Quantum, Nano, and Micro Technologies - Table of contents

    Publication Year: 2007, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2007, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICQNM 2007 Technical Program Committee

    Publication Year: 2007, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • QSEC 2007 Technical Program Committee

    Publication Year: 2007, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Diner based Channel Access Protocol for Nano-Machines

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Diner based access channel (DAC) protocol is a dynamic channel allocation protocol. This protocol has been developed specifically for networking nano-machines, however, it can be utilized for any mobile ad hoc network (MANET). The operation of the protocol is based on the way a diner operates. This paper presents the DAC protocol for any MANET describes its concept, algorithm and working, and also... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of two bounds of the quantum correlation set

    Publication Year: 2007, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    From a geometric viewpoint, quantum nonlocality between two parties is represented as the difference of two convex bodies, namely the sets of possible results of classical and quantum correlation experiments, the latter of which is called the quantum correlation set. Whereas little is known about the quantum correlation set, Tsirelson's theorem (1980) can be seen as the exact characterization of p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anisotropic Plasmon Resonance of Surface Metallic Nanostructures Prepared by Ion Beam Mixing

    Publication Year: 2007, Page(s): 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    Nanodimensional island films prepared by ion beam mixing (IBM) of silver layer on oxide substrates are studied by means of optical absorption spectroscopy and scanning electron microscopy. During bombardment by 400 keV Ar+ ions the Ag film is transformed into surface islands having size in the range of 30 -120 nm and volume nanoclusters with diameter less than 10 nm. The silver islands,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DNA and quantum theory

    Publication Year: 2007, Page(s): 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Molecules are the basis of life. They can be considered as a quantum system. So it is necessary to enter quantum mechanics in biological discussions. In this paper we consider the DNA molecule as a quantum system. We discuss the relation between heredity, biology and DNA and quantum systems. We also find a relation between the quantum information and some bio-processes such as cell division, hered... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DFT studies of closely bound ground state of (N2-N2)+1 ionic dimmer

    Publication Year: 2007, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    A detailed DFT study of the ground state of (N2-N2)+1 ionic dimer has been carried out in closely bound region from 1.2 Aring to 2.50 Aring using different DFT methods and Basis sets. A real potential energy minima has been found to exist at r = 1.20 Aring and R = 1.63 Aring for D2h symmetry group. The potential energy levels and other physical propertie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbolic and numeric quantum circuit simulation

    Publication Year: 2007, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Simulation fulfills an important mechanism for the study and the development of many areas. Quantum computation simulation tools have become essential, because no effective quantum hardware has been implemented yet. However, the currently available simulators have serious deficiencies, which makes the description of this new computational paradigm incomplete. This article presents a universal quan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous-variable quantum information with three-mode Gaussian states: allotment,trade-off, teleportation, and telecloning

    Publication Year: 2007, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    We introduce a simple procedure - based on passive optical elements - to produce pure three-mode Gaussian states with arbitrary entanglement structure (upon availability of an initial single-mode squeezed state). We analyze in detail the properties of distributed entanglement, showing that the promiscuity of entanglement sharing is a feature peculiar to symmetric Gaussian states that survives even... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric Nanotechnology and Nonlinear Dynamics

    Publication Year: 2007, Page(s): 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5037 KB) | HTML iconHTML

    The biological approach to nanotechnology - biomimetic nanotechnology- is a new field in the area of nanostructuring and specially nonorobotic. Mimicking biology to extract useful strategies, needs good knowledge of its exquisite dynamic (evolutionary nonlinear dynamic) which arises from a vast network of molecular interactions and structure-function hierarchical solidity from small scales (nano) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transfering Proofs of Zero-Knowledge Systems with Quantum Correlations

    Publication Year: 2007, Page(s): 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5710 KB) | HTML iconHTML

    The use of quantum correlations to attack security protocols is an important research line deserving growing attention. An important class of cryptographic protocols used as building blocks for several other more complex protocols is zero-knowledge proof systems. One of the properties that zero-knowledge proof systems are assumed to satisfy is that it is impossible for the verifier to show to a th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum Key Distribution with Classical Bob

    Publication Year: 2007, Page(s): 10
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob) h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Qunits in Two Way Quantum Key Distribution

    Publication Year: 2007, Page(s): 11
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB) | HTML iconHTML

    Works in two way deterministic quantum cryptography protocols using qubits and qutrits have seen the nontrivial generalization of the protocol to accommodate the use of all mutually unbiased bases (MUB). Here we consider the use of qunits (quantum systems of n dimensional Hilbert space) in a similar protocol and working with cases where the number of MUB is n +1 we show that n qunits are necessary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymous Transmission of Quantum Information

    Publication Year: 2007, Page(s): 12
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    We propose first protocol for anonymous distribution of quantum information that can be used to implement either channel with anonymous sender or channel with anonymous receiver. Our protocol achieves anonymity and message secrecy with unconditional security. It uses classical anonymous transfer. It tolerates disruption of the protocol, but the number of disrupters must be limited by the quantum G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture of the Secoqc Quantum Key Distribution network

    Publication Year: 2007, Page(s): 13
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1447 KB) | HTML iconHTML

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Model-Checking Quantum Security Protocols

    Publication Year: 2007, Page(s): 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5284 KB) | HTML iconHTML

    Logics for reasoning about quantum states have been given in the literature. In this paper, we extend one such logic with temporal constructs mimicking the standard computational tree logic used to reason about classical transition systems. We investigate the model-checking problem for this temporal quantum logic and illustrate its use by reasoning about the BB84 key distribution protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum Entanglement, Non-Locality and Secure Computation

    Publication Year: 2007, Page(s): 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    In this paper, we demonstrate that nanoscale phenomenon can be applied not only in device level but also in high layer applications, such as secure computation. We study the possibility of performing secure computation by building non-local machines based on quantum entanglement and non-locality, which are phenomena available only at the nanometer scale. Comparing with classical secure computation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.