Results 61 to 70 of about 1,706 (214)

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Quantum Computing: Foundations, Architecture and Applications

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
This paper presents a study on quantum computing's theoretical foundations and applications, illustrated by a quantum circuit diagram featuring gates and measurements that demonstrate qubit manipulation and entanglement. ABSTRACT Quantum computing exploits the principles of quantum mechanics to address computational problems that are intractable to ...
Christopher Columbus Chinnappan   +4 more
wiley   +1 more source

A new quantum key distribution protocol to reduce afterpulse and dark counts effects

open access: yesResults in Optics
The most important goal of quantum communication is to distribute the encryption key between the transmitter and the receiver. The optimal situation in Quantum Key Distribution (QKD) between transmitter and receiver is to increase the key distribution ...
Mahdi Rahmanpour   +4 more
doaj   +1 more source

Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated Learning [PDF]

open access: green, 2022
Rakpong Kaewpuang   +5 more
openalex   +1 more source

Hybrid Encoder for Discrete and Continuous Variable QKD

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 8, August 2025.
This work demonstrates a hybrid QKD encoder that bridges the advantages of discrete and continuous variables. Utilizing a self‐compensating iPOGNAC design, the encoder is compatible with space‐based and terrestrial quantum networks. The approach simplifies system complexity, improves stability, and ensures cost‐effective integration, paving the way for
Mattia Sabatini   +4 more
wiley   +1 more source

Transport Layer Protocols for the Secoqc Quantum Key Distribution (QKD) Network

open access: yes32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007
Quantum Key Distribution (QKD) is an alternative key distribution technique that, unlike the classical approaches, can provide unconditionally secure keys for data communications over public communication networks. The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally ...
Dianati, M, Alléaume, R
openaire   +3 more sources

Deterministic Fabrication of GaAs‐Quantum‐Dot Micropillar Single‐Photon Sources

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 8, August 2025.
Deterministic integration of droplet‐etched GaAs quantum dots into micropillar cavities is demonstrated with 100% positioning yield. The devices emit high‐purity single photons, and p‐shell excitation enables the generation of indistinguishable photons.
Abdulmalik A. Madigawa   +8 more
wiley   +1 more source

Continuous-Variable Quantum Key Distribution Over Air Quantum Channel With Phase Shift

open access: yesIEEE Access, 2020
Continuous-variable quantum key distribution (CV-QKD) over air quantum channel enables to provide unconditional information security, which is the one of most promising techniques for information wireless transfer. Since the air channel is of fluctuation
Ming Li, Tianyi Wang
doaj   +1 more source

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

Quantum key distribution through quantum machine learning: a research review

open access: yesFrontiers in Quantum Science and Technology
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj   +1 more source

Home - About - Disclaimer - Privacy