Results 291 to 300 of about 1,613,397 (323)
Some of the next articles are maybe not open access.
Exploring the significance of quantum cryptography in future network security protocols
World Journal of Advanced Research and ReviewsIn an era of unprecedented technological advancement, the rise of quantum computing poses both opportunities and challenges to network security. While quantum computers promise to revolutionize data processing and problem-solving, they also render ...
Philip Chidozie Nwaga +1 more
semanticscholar +1 more source
Analyzing the Impact of Quantum Cryptography on Network Security
2024 International Conference on Integrated Circuits and Communication Systems (ICICACS)Quantum cryptography is a field that employs principles of quantum physics to communicate via networks. It has developed as an ability to handle the growing risks to network security, including cyber-attacks and data breaches.
Sanjaikanth E Vadakkethil Somanathan Pillai +1 more
semanticscholar +1 more source
2008 The Fourth International Conference on Information Assurance and Security, 2008
Quantum cryptographic systems use quantum mechanical concepts that are based on qubit superposition of states, and on the no cloning or no copying theorem to establish unbreakable cipher keys. Using optical communications the most commonly quantum mechanical property used is the polarization state of photon.
openaire +1 more source
Quantum cryptographic systems use quantum mechanical concepts that are based on qubit superposition of states, and on the no cloning or no copying theorem to establish unbreakable cipher keys. Using optical communications the most commonly quantum mechanical property used is the polarization state of photon.
openaire +1 more source
Cryptography And Network Security
INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT-Cryptography and network security are foundational domains in the field of information technology and cybersecurity. As digital communication continues to expand, protecting data from unauthorized access, tampering, and interception is paramount.
Krisha Patel
semanticscholar +1 more source
Handbook of Information and Communication Security, 2019
Christian Monyk
semanticscholar +1 more source
Christian Monyk
semanticscholar +1 more source
Stopover; then on to Quantum Cryptography
2013This chapter is exceptional insofar as the formalism is not developed further. Rather, it serves to collect our previously acquired knowledge, to compare and to check where there are open questions of form or content. In the second part of the chapter, we take up quantum cryptography.
openaire +1 more source
Quantum cryptography based on Bell's theorem.
Physical Review Letters, 1991A. Ekert
semanticscholar +1 more source
Quantum Cryptography: A Survey
2019This paper represents the overview of Quantum Cryptography. Cryptography is the art of secrecy and it is the use of quantum mechanical properties to perform cryptographic tasks. It is a way of securing the channel using quantum mechanics properties.
openaire +1 more source
Transitioning organizations to post-quantum cryptography
Nature, 2022David Joseph +9 more
semanticscholar +1 more source

