-
641
Machining Strategy to Adapt Cutting Conditions under Digital Copy Milling Concept
Published 2010-08-01Get full text
Article -
642
Pathological lesions of acute sodium chloride toxicity in common carp: Case report
Published 2021-04-01Get full text
Article -
643
-
644
-
645
EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY
Published 2008-04-01“…A simplified version of QSSL based on BB84 (Bennett-Brassard 84) quantum key distribution (QKD) protocol has been implemented and experimentally tested. …”
Get full text
Article -
646
A Blockchain Based Secure IoT System Using Device Identity Management
Published 2022-10-01Get full text
Article -
647
Dropout Intentions in Higher Education: Systematic Literature Review
Published 2023-06-01Get full text
Article -
648
-
649
-
650
-
651
Educación superior y educación comparada: tensiones y complementariedad entre dos campos de estudio
Published 2017-12-01Get full text
Article -
652
Finite-key security analysis for quantum key distribution with leaky sources
Published 2018-01-01“…Phys. 18 065008) to the finite-key regime, and we evaluate the security of a leaky decoy-state BB84 protocol with biased basis choice, which is one of the most implemented QKD schemes today. …”
Get full text
Article -
653
LabView design for electronic control interface
Published 2021“…MDI-QKD allows two systems, commonly known as Alice and Bob, to individually transmit Weak Coherent Pulses (WCP) with decoy states in four BB84 polarization states to a mid-way station named "Charlie," which contains a beam splitter. …”
Get full text
Final Year Project (FYP) -
654
New estimates of single photon parameters for satellite-based QKD
Published 2009“…A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state. …”
Get full text
Article -
655
Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication
Published 2014“…In order to do so, in this research paper we are proposing a method that use the law of physics in communication in terms of cryptography and key distribution by applying quantum theorems and principle. Using BB84 protocol as a base in quantum key distribution together with the implementation of tight finite key that compress the Shannon entropy and Von Neumann theory. …”
Get full text
Conference or Workshop Item -
656
-
657
Glomerulogenesis: Can it predict the gestational age? A study of 176 fetuses
Published 2012-01-01Get full text
Article -
658
Clinical profile and spectrum of bacteriuria in patients with diabetes: An analytical study
Published 2022-01-01Get full text
Article -
659
-
660
Correlation of porosity and properties of recycled fine aggregate concrete with fly ash
Published 2022-03-01Get full text
Article