Showing 41 - 60 results of 1,613 for search '"BB84"', query time: 0.30s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48
  9. 49

    Simulation of Bennet and Brassard 84 protocol with Eve's attacks by Mohamed Halip, Nor Hafizah, Mokhtar, M., Buhari, A.

    Published 2014
    “…A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. …”
    Get full text
    Conference or Workshop Item
  10. 50
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55

    Practical quantum key distribution by Ali, Sellami

    Published 2012
    “…We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
    Get full text
    Book Chapter
  16. 56

    Estimation of decoy state parameters for practical QKD by Ali, Sellami, Mahmoud, Omer, Saeed, Rashid Abdelhaleem

    Published 2011
    “…We have presented a method to estimate parameters of the decoy state method based on one decoy state protocol for both BB84 and SARG04. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
    Get full text
    Article
  17. 57
  18. 58
  19. 59
  20. 60

    Alternative discrete variable protocol for point to point Quantum Key Distribution system by Ahmad Ghazali, Lizal Iswady

    Published 2012
    “…The SARG04 is more robust against photon number splitting attacks and double the BB84 critical transmission distance. Nevertheless SARG04 protocol still has lower percentage of sifted key bit compared to BB84 protocol. …”
    Get full text
    Thesis