Results 241 to 250 of about 7,167,168 (283)
Underwater Wavelength Attack on Discrete Modulated Continuous-Variable Quantum Key Distribution. [PDF]
Feng K +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
Quantum key distribution (QKD) provides a means of secure communication between two parties. QKD exploits the principle that you cannot eavesdrop on a quantum communication channel without producing a detectable disturbance.
+4 more sources
Quantum key distribution (QKD) provides a means of secure communication between two parties. QKD exploits the principle that you cannot eavesdrop on a quantum communication channel without producing a detectable disturbance.
+4 more sources
Enhancing 802.11i key distribution using quantum key distribution
International Journal of Applied Research on Information Technology and Computing, 2011Security of data is one of the most important factors to take into account while elaborating any information system, especially when the information is transmitted over a wireless network like one of a company, a factory, a campus, or more importantly a battlefield.
Rima Djellab, Mohamed Benmohammed
openaire +1 more source
Proceedings of 1994 IEEE International Symposium on Information Theory, 2002
A key distribution scheme is a method used to distribute off-line initial private pieces of information among a set of users, such that each group of them can compute a common key for secure conference. This information is generated and distributed by a trusted server which is active only at the distribution phase. Key distribution is a central problem
C. Blundo, A. Cresti, U. Vaccaro
openaire +1 more source
A key distribution scheme is a method used to distribute off-line initial private pieces of information among a set of users, such that each group of them can compute a common key for secure conference. This information is generated and distributed by a trusted server which is active only at the distribution phase. Key distribution is a central problem
C. Blundo, A. Cresti, U. Vaccaro
openaire +1 more source
2003
Broadcast streams require authentication and confidentiality. Previous chapters present protocols for efficient authentication and signature protocols for broadcast streams. This chapter discusses confidentiality and access control.
Adrian Perrig, J. D. Tygar
openaire +1 more source
Broadcast streams require authentication and confidentiality. Previous chapters present protocols for efficient authentication and signature protocols for broadcast streams. This chapter discusses confidentiality and access control.
Adrian Perrig, J. D. Tygar
openaire +1 more source
2018
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Pramode K. Verma +2 more
openaire +1 more source
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Pramode K. Verma +2 more
openaire +1 more source
2014
The paper discussed on possible optimization set-ups for quantum key distribution (QKD). The large secret key resulting from QKD is a valuable resource in communication scenarios, e.g. for secret communication, authentication, identification and so forth.
openaire +1 more source
The paper discussed on possible optimization set-ups for quantum key distribution (QKD). The large secret key resulting from QKD is a valuable resource in communication scenarios, e.g. for secret communication, authentication, identification and so forth.
openaire +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly

