Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Spencer, Robert. The Palestinian Delusion: The Catastrophic History of the Middle East Peace Process. Bombardier Books, 2019. Heisenberg, Werner. "Uber den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik." Zeitschrift fur Physik 43 (1927): 172-198. Van Assche, Gilles. Quantum Cryptography and Secret-Key Distillation . Cambridge: Cambridge University Press, 2006. Bennett, Charles H., and Gilles Brassard. Public Key Distribution and Coin Tossing In IEEE International Conference on Computers, Systems, and Signal Processing., 1984. Niemiec, Marcin, and Andrzej R. Pach. "The Measure of Security in Quantum Cryptography." In Cryptog¬raphy,” IEEE Global Telecommunications Conference - GLOBECOM (2012)., 2012. Niemiec, Marcin, and Andrzej R. Pach. "Management of security in quantum cryptography." IEEE Communications Magazine 51, no. 8 (2013): 36-41. Hartley, Ralph V.. "Transmission of information." Bell System Technical Journal 7 (1928): 535-563. Niemiec, Marcin. Design, Construction and Verification of a High-Level Security Protocol Allowing to Apply the Quantum Cryptography in Communication Networks. Vol. Ph.D. Thesis. AGH University of Science and Technology, 2011. Niemiec, Marcin, Łukasz Romański, and Marcin Święty. "Quantum cryptography protocol simulator." Communications in Computer and Information Science, Multimedia communications, services and security 149 (2011): 286-292. Random number generation using quantum physics. Random number generation using quantum physics., 2010. Bennett, Charles H., and J. Wiesner. "Communication via one- and two-particle operators on Einstein–Podolsky–Rosen states." Phys. Rev. Lett. 69 (1992): 2881-2884. Roberts, Lawrence G.. "ALOHA Packet System With and Without Slots and Capture." Computer Communications Review 5, no. 2 (1975): 28-42. Imre, Sandor. "Quantum Hyperdense Coding for Distributed Communications." Quantum Physics arXiv:1210.2856 (2012). Ekert, Artur, Patrick Hayden, and Hitoshi Inamori. "Basic concepts in quantum computation." Quantum Physics arXiv:quant-ph/0011013 (2010). Grove, Lov K.. "A fast quantum mechanical algorithm for database search." Quantum Physics arXiv:quant-ph/9605043 (1996). Shor, Peter W.. Algorithms for quantum computation: discrete logarithms and factoring In Annual Symposium on Foundations of Computer Science. Santa Fe, NM, USA , 1994. Wehner, Stephanie, David Elkouss, and Ronald Hanson. "Quantum Internet: A Vision for the Road Ahead." Science 362, no. 6412 (2018). Korus, Paweł, and Andrzej Dziech. "Efficient Method for Content Reconstruction with Self-Embedding." IEEE Transaction on Image Processing 22, no. 3 (2013): 1134-1147. Alexandre, Girod. "Computerized Classification of the Shoeprints of Burglar’s Soles." Forensic Science International 82, no. 1 (1996): 59-65. Murray, Edelman J.. "Footprints Can Play an Important Role in Solving Crimes." Footprint Lab. (2011). Srihari, Sargur N.. Analysis of Footwear Impression Evidence In US DoJ Report., 2011. Adair., T. W., J. Lemay, A. Mcdonald, R. Shaw, and R. Tewes. "The Mount Bierstadt Study: An Experiment in Unique Damage Formation in Footwear." Journal of Forensic Identification 57, no. 2 (2007): 199-205. Ashley, Wayne. "What Shoe Was That? The use of Computerised Image Database to Assist in Identification." Forensic Science International 82, no. 1 (1996): 7-20. Sawyer, N., and C. Monckton. "‘Shoe-fit’ - A Computerised Shoe Print Database." In European Convention on Security and Detection, 86-89. Brighton, UK, 1995. Luostarinen, Tapio, and Antti Lehmussola. "Measuring the Accuracy of Automatic Shoeprint Recognition Methods." Journal of Forensic Sciences 59, no. 6 (2014): 1627-1634. Pages« първа ‹ предишна … 378 379 380 381 382 383 384 385 386 … следваща › последна »