Showing 641 - 660 results of 1,613 for search '"BB84"', query time: 0.24s Refine Results
  1. 641
  2. 642
  3. 643
  4. 644
  5. 645

    EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY by Sufyan T. Faraj

    Published 2008-04-01
    “…A simplified version of QSSL based on BB84 (Bennett-Brassard 84) quantum key distribution (QKD) protocol has been implemented and experimentally tested. …”
    Get full text
    Article
  6. 646
  7. 647
  8. 648
  9. 649
  10. 650
  11. 651
  12. 652

    Finite-key security analysis for quantum key distribution with leaky sources by Weilong Wang, Kiyoshi Tamaki, Marcos Curty

    Published 2018-01-01
    “…Phys. 18 065008) to the finite-key regime, and we evaluate the security of a leaky decoy-state BB84 protocol with biased basis choice, which is one of the most implemented QKD schemes today. …”
    Get full text
    Article
  13. 653

    LabView design for electronic control interface by Chua, Benny Chong Peng

    Published 2021
    “…MDI-QKD allows two systems, commonly known as Alice and Bob, to individually transmit Weak Coherent Pulses (WCP) with decoy states in four BB84 polarization states to a mid-way station named "Charlie," which contains a beam splitter. …”
    Get full text
    Final Year Project (FYP)
  14. 654

    New estimates of single photon parameters for satellite-based QKD by Ali, Sellami, Wahiddin, Mohamed Ridza

    Published 2009
    “…A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state. …”
    Get full text
    Article
  15. 655

    Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication by Khalid, Roszelinda, Ahmad Zukarnain, Zuriati

    Published 2014
    “…In order to do so, in this research paper we are proposing a method that use the law of physics in communication in terms of cryptography and key distribution by applying quantum theorems and principle. Using BB84 protocol as a base in quantum key distribution together with the implementation of tight finite key that compress the Shannon entropy and Von Neumann theory. …”
    Get full text
    Conference or Workshop Item
  16. 656
  17. 657
  18. 658
  19. 659
  20. 660