Results 161 to 170 of about 10,496 (211)
Discrete-Modulated Coherent-State Quantum Key Distribution with Basis-Encoding. [PDF]
Guo M +6 more
europepmc +1 more source
Efficient data replication in distributed clouds via quantum entanglement algorithms. [PDF]
B PS +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cost-Efficient Quantum Key Distribution (QKD) Over WDM Networks
Journal of Optical Communications and Networking, 2019Quantum key distribution (QKD) uses the laws of quantum mechanics to distribute secret keys with information-theoretic security. To realize QKD for secure communications among multiple distant users, fiber-based QKD networks can be deployed with today's available technologies.
Yuan Cao +5 more
openaire +3 more sources
Drone-based quantum key distribution: QKD
Free-Space Laser Communications XXXIII, 2021Unmanned Aerial Vehicles (UAVs) are used in numerous applications ranging from defense, law enforcement, environmental monitoring, disaster recovery, aerial photography, and delivering consumer packages. Securing wireless communication between drones in-flight is critical to ensure safe operation during flight and avoid multiple types of attacks, e.g.,
Andrew Conrad +8 more
openaire +1 more source
4th Optics Young Scientist Summit (OYSS 2020), 2021
In this paper, we propose a multi-domain quantum key pool (QKP) capacity adaptive supplement scheme based on balance between key resource and routing hop in multi-domain QKD-ON, and we conduct the simulation and evaluate the performance of the proposed scheme in terms of service blocking probability and utilization of key resource.
qingping wang +4 more
openaire +1 more source
In this paper, we propose a multi-domain quantum key pool (QKP) capacity adaptive supplement scheme based on balance between key resource and routing hop in multi-domain QKD-ON, and we conduct the simulation and evaluate the performance of the proposed scheme in terms of service blocking probability and utilization of key resource.
qingping wang +4 more
openaire +1 more source
Practical Considerations on Quantum Key Distribution (QKD)
2013 International Conference on Advanced Computer Science Applications and Technologies, 2013The advancement of the quantum computing is challenging the foundation of the cryptography by its almost unlimited computation power to predict the secure key that is thought to be absolutely secure based on the currently used algorithms such as the RSA and the Diffie-Hellman and others.
Wajdi Al-Khateeb +3 more
openaire +1 more source
Quantum Key Distribution (QKD) Protocols: A Survey
2018 4th International Conference on Wireless and Telematics (ICWT), 2018The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using ...
Ali Ibnun Nurhadi, Nana Rachmana Syambas
openaire +1 more source
Multicast network security using quantum key distribution (QKD)
2012 International Conference on Computer and Communication Engineering (ICCCE), 2012We reviewed the confidentiality and authentication for multi-party applications. A conceptual model of a secure multicast network has been presented by adding a quantum key distribution (QKD) network to its architecture. The model is divided into three phases, the first phase, QKD network generate secure keys to encrypt not only data but also ...
Sellami Ali +2 more
openaire +1 more source

