Search for dissertations about: "hack"

Found 3 swedish dissertations containing the word hack.

  1. 1. Breaking the Unbreakable : Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography

    Author : Jonathan Jogenfors; Jan-Åke Larsson; Fredrik Karlsson; Marek Żukowski; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Abstract : In this thesis we study device-independent quantum key distribution based on energy-time entanglement. This is a method for cryptography that promises not only perfect secrecy, but also to be a practical method for quantum key distribution thanks to the reduced complexity when compared to other quantum key distribution protocols. READ MORE

  2. 2. Veils of irony : The development of narrative technique in women's novels of the 1790s

    Author : Anna Morris; Uppsala universitet; []
    Keywords : HUMANIORA; HUMANITIES; English language; West-Jane; Smith-Charlotte; Bennett-Anna-Maria; novel; eighteenth-century; circulating-library; review; parody; irony; free-indirect-discourse; innovation; common-reader; gossip; Quixote; education; Engelska; English language; Engelska språket; English; engelska;

    Abstract : This thesis situates the innovations of three English novels from the 1790s by three relatively unknown women writers, Jane West, Charlotte Smith, and Anna Maria Bennett, against the background of a literary climate characterised by highly conventional forms of fiction in either sentimental or satiric modes. Their innovations consisted in the fashioning of parodic forms that would balance emotionality with irony. READ MORE

  3. 3. Optical Document Security: Measurement, Characterization and Visualization : in the Light of Visual Evaluation

    Author : Mikael Lindstrand; Björn Kruse; Sasan Gooran; Volker Lohweg; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : Documents of high value, such as passports, tickets and banknotes, facilitate means for authentication. Authentication processes aim at mitigating counterfeit “passable products”. READ MORE