In the context of the top-color-assisted technicolor (TC2) model, the flavor-changing neutral-current (FCNC) interaction induced by the top-higgs (hOt) are predicted at tree level. We study the relevant processe...In the context of the top-color-assisted technicolor (TC2) model, the flavor-changing neutral-current (FCNC) interaction induced by the top-higgs (hOt) are predicted at tree level. We study the relevant processes of e+e-(γγ)→tcht0 at the International Linear Collider (ILC). It is found that these rare processes production rates can be enhanced significantly in the TC2 model. Especially for the process γγ→tcht0, the total cross section will reach a few fb in the reasonable parameter space. We also calculate the distributions of transverse momenta, pseudo-rapid and invariant mass of the top-higgs. In view of the main decay modes of top-higgs for mho 〈 2mr, we find that there will be several hundreds FCNC events produced at the ILC with annually integral luminosity of 500 fb-1. Due to the clean background, such FCNC signals can possibly be detected at the ILC.展开更多
According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. Fir...According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols.展开更多
In this paper,we investigate the production of a pair of doubly charged leptons associated with a gauge boson V(γ or Z) at future linear colliders via e^+e^-and γγ collisions.The numerical results show that the pos...In this paper,we investigate the production of a pair of doubly charged leptons associated with a gauge boson V(γ or Z) at future linear colliders via e^+e^-and γγ collisions.The numerical results show that the possible signals of the doubly charged leptons may be detected via the processes e^+e~→VX^(++)X^(--)and γγ→VX^(++)X^(--)at future ILC or CLIC experiments.展开更多
基金Supported in part by the National Natural Science Foundation of China (NNSFC) under Grant Nos.10975047,10979008,and 10775039 Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20094104110001
文摘In the context of the top-color-assisted technicolor (TC2) model, the flavor-changing neutral-current (FCNC) interaction induced by the top-higgs (hOt) are predicted at tree level. We study the relevant processes of e+e-(γγ)→tcht0 at the International Linear Collider (ILC). It is found that these rare processes production rates can be enhanced significantly in the TC2 model. Especially for the process γγ→tcht0, the total cross section will reach a few fb in the reasonable parameter space. We also calculate the distributions of transverse momenta, pseudo-rapid and invariant mass of the top-higgs. In view of the main decay modes of top-higgs for mho 〈 2mr, we find that there will be several hundreds FCNC events produced at the ILC with annually integral luminosity of 500 fb-1. Due to the clean background, such FCNC signals can possibly be detected at the ILC.
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols.
基金Supported in part by the National Natural Science Foundation of China under Grants Nos.11275088,11205023,11375248the Program for Liaoning Excellent Talents in University under Grant No.LJQ2014135
文摘In this paper,we investigate the production of a pair of doubly charged leptons associated with a gauge boson V(γ or Z) at future linear colliders via e^+e^-and γγ collisions.The numerical results show that the possible signals of the doubly charged leptons may be detected via the processes e^+e~→VX^(++)X^(--)and γγ→VX^(++)X^(--)at future ILC or CLIC experiments.