Loading...
Search for:
tabebordbar--najmeh
0.033 seconds
Formal Analysis of Security Protocols using Theorem Proving
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Security protocols are mostly verified using tools based on model checking approach. These tools are automatic but they can be used for verifying protocols with low complexity and limited number of participants. The other approach that can be used in these cases is theorem proving. Inductive method is a theorem proving approach which is based on induction in mathematics. Inductive method has been applied for verifying several classical and real-world protocols.
The basic concepts in this method are event and trace. Using the concept of event, the network traffic can be modeled through various events occurring in the network. Atrace is a list of events and model a history of the network....
The basic concepts in this method are event and trace. Using the concept of event, the network traffic can be modeled through various events occurring in the network. Atrace is a list of events and model a history of the network....
Entanglement Distribution By Separable States
, Ph.D. Dissertation Sharif University of Technology ; Karimipour, Vahid (Supervisor) ; Memarzadeh Esfahani, Laleh (Co-Advisor)
Abstract
Entanglement is a type of quantum correlations which due to its unique features plays a crucial role in quantum information processing. Hence trying to find new approaches in entanglement generation, distribution and also presenting strategies to optimize these processes by considering the fragility of entanglement, is always one of the most important initial steps in many quantum information processes. In this thesis we provide a systematic method to distribute entanglement by separable states and by means of separable ancilla during the process. It is worth mentioning that having separable ancilla during the process of entanglement distribution leads to more robustness against noise to...