Cloud Data Security through BB84 Protocol and Genetic Algorithm
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authen...
Main Authors: | Jaydip Kumar, Vipin Saxena |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
College of Science for Women, University of Baghdad
2022-12-01
|
Series: | Baghdad Science Journal |
Subjects: | |
Online Access: | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7281 |
Similar Items
-
Bases selection with pseudo-random functions in BB84 scheme
by: Emir Dervisevic, et al.
Published: (2024-01-01) -
FPGA-Based Implementation of an Underwater Quantum Key Distribution System With BB84 Protocol
by: Burak Kebapci, et al.
Published: (2023-01-01) -
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
by: Aleksei Reutov, et al.
Published: (2023-11-01) -
Development of Quantum Protocol Modification CSLOE–2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84
by: Larissa V. Cherckesova, et al.
Published: (2022-11-01) -
Semi device independence of the BB84 protocol
by: Erik Woodhead
Published: (2016-01-01)