Results 31 to 40 of about 48,172 (181)

A two-stage amplifier of laser eavesdropping model based on waveguide fiber taper

open access: yesDefence Technology, 2019
In order to improve ability of amplification about optical arrival angle in laser eavesdropping system, and enhance receiving field of view (FOV) of laser eavesdropping system, this paper presents a new multi-stage amplifier laser eavesdropping model ...
Mei-ting Wang, Yan Zhu, Yi-ning Mu
doaj   +1 more source

A novel quantum key distribution scheme with orthogonal product states [PDF]

open access: yes, 2001
The general conditions for the orthogonal product states of the multi-state systems to be used in quantum key distribution (QKD) are proposed, and a novel QKD scheme with orthogonal product states in the 3x3 Hilbert space is presented.
A. Ekert   +15 more
core   +2 more sources

Optimal eavesdropping in cryptography with three-dimensional quantum states

open access: yes, 2002
We study optimal eavesdropping in quantum cryptography with three-dimensional systems, and show that this scheme is more secure than protocols using two-dimensional states. We generalize the according eavesdropping transformation to arbitrary dimensions,
C. Fuchs   +12 more
core   +1 more source

Johnson(-like)-Noise-Kirchhoff-Loop Based Secure Classical Communicator Characteristics, for Ranges of Two to Two Thousand Kilometers, via Model-Line [PDF]

open access: yes, 2008
A pair of Kirchhoff-Loop-Johnson(-like)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line performance characteristics were obtained for ranges beyond the ranges of any ...
Bennett   +14 more
core   +2 more sources

Modeling and Analysis of Eavesdropping Attack in 802.11ad mmWave Wireless Networks

open access: yesIEEE Access, 2019
Next generation wireless communication networks utilizing 60 GHz millimeter wave (mmWave) frequency bands are expected to achieve multi-gigabit throughput with the use of highly directional phased-array antennas.
Sarankumar Balakrishnan   +3 more
doaj   +1 more source

Proactive Eavesdropping via Jamming over HARQ-Based Communications

open access: yes, 2017
This paper studies the wireless surveillance of a hybrid automatic repeat request (HARQ) based suspicious communication link over Rayleigh fading channels.
Duan, Lingjie   +3 more
core   +1 more source

Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities [PDF]

open access: yes, 2001
Quantum secret-sharing protocols involving N partners (NQSS) are key distribution protocols in which Alice encodes her key into $N-1$ qubits, in such a way that all the other partners must cooperate in order to retrieve the key.
A. Ekert   +24 more
core   +3 more sources

MIMO Terahertz Quantum Key Distribution Under Restricted Eavesdropping

open access: yesIEEE Transactions on Quantum Engineering, 2023
Quantum key distribution (QKD) can provide unconditional security to next-generation communication networks guaranteed by the laws of quantum physics.
Neel Kanth Kundu   +4 more
doaj   +1 more source

Intercept Probability Analysis of Cooperative Wireless Networks with Best Relay Selection in the Presence of Eavesdropping Attack

open access: yes, 2013
Due to the broadcast nature of wireless medium, wireless communication is extremely vulnerable to eavesdropping attack. Physical-layer security is emerging as a new paradigm to prevent the eavesdropper from interception by exploiting the physical ...
Shen, Weiming   +2 more
core   +1 more source

Quantum Cryptography using larger alphabets [PDF]

open access: yes, 1999
Like all of quantum information theory, quantum cryptography is traditionally based on two level quantum systems. In this letter, a new protocol for quantum key distribution based on higher dimensional systems is presented.
A. Karlsson   +22 more
core   +2 more sources

Home - About - Disclaimer - Privacy