Results 291 to 300 of about 1,613,397 (323)
Some of the next articles are maybe not open access.

Exploring the significance of quantum cryptography in future network security protocols

World Journal of Advanced Research and Reviews
In an era of unprecedented technological advancement, the rise of quantum computing poses both opportunities and challenges to network security. While quantum computers promise to revolutionize data processing and problem-solving, they also render ...
Philip Chidozie Nwaga   +1 more
semanticscholar   +1 more source

Analyzing the Impact of Quantum Cryptography on Network Security

2024 International Conference on Integrated Circuits and Communication Systems (ICICACS)
Quantum cryptography is a field that employs principles of quantum physics to communicate via networks. It has developed as an ability to handle the growing risks to network security, including cyber-attacks and data breaches.
Sanjaikanth E Vadakkethil Somanathan Pillai   +1 more
semanticscholar   +1 more source

Chaotic Quantum Cryptography

2008 The Fourth International Conference on Information Assurance and Security, 2008
Quantum cryptographic systems use quantum mechanical concepts that are based on qubit superposition of states, and on the no cloning or no copying theorem to establish unbreakable cipher keys. Using optical communications the most commonly quantum mechanical property used is the polarization state of photon.
openaire   +1 more source

Cryptography And Network Security

INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
-Cryptography and network security are foundational domains in the field of information technology and cybersecurity. As digital communication continues to expand, protecting data from unauthorized access, tampering, and interception is paramount.
Krisha Patel
semanticscholar   +1 more source

Quantum Cryptography

Handbook of Information and Communication Security, 2019
Christian Monyk
semanticscholar   +1 more source

Stopover; then on to Quantum Cryptography

2013
This chapter is exceptional insofar as the formalism is not developed further. Rather, it serves to collect our previously acquired knowledge, to compare and to check where there are open questions of form or content. In the second part of the chapter, we take up quantum cryptography.
openaire   +1 more source

Quantum cryptography based on Bell's theorem.

Physical Review Letters, 1991
A. Ekert
semanticscholar   +1 more source

Quantum Cryptography: A Survey

2019
This paper represents the overview of Quantum Cryptography. Cryptography is the art of secrecy and it is the use of quantum mechanical properties to perform cryptographic tasks. It is a way of securing the channel using quantum mechanics properties.
openaire   +1 more source

Transitioning organizations to post-quantum cryptography

Nature, 2022
David Joseph   +9 more
semanticscholar   +1 more source

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

Computer Communications, 2021
Vinay Chamola, Senior Member, Ieee   +2 more
exaly  

Home - About - Disclaimer - Privacy