Showing 601 - 620 results of 918 for search '"key distribution"', query time: 0.25s Refine Results
  1. 601
  2. 602

    Low-density random matrices for secret key extraction by Zhou, Hongchao, Chandar, Venkat B., Wornell, Gregory W.

    Published 2014
    “…Motivated by the requirements of high-speed quantum key distribution, we study secret-key extraction methods with simple and efficient hardware implementations, in particular, linear transformations based on low-density random matrices. …”
    Get full text
    Get full text
    Article
  3. 603

    Quality-improved and secure multicast delivery method in mobile IPv6 networks by Mehdizadeh, Abbas, Hashim, Fazirulhisyam, Raja Abdullah, Raja Syamsul Azmir, Mohd Ali, Borhanuddin, Othman, Mohamed

    Published 2011
    “…With widespread deployment of multicast over Wireless Local Area Networks (WLANs), several issues including fixed data rate transmission, multicast key distribution security, and overlapped multicast address have to be addressed for accommodating an efficient multicast scheme for WLANs. …”
    Get full text
    Conference or Workshop Item
  4. 604

    Women in physics: an interview with Urbasi Sinha

    Published 2024-03-01
    “…Her research is in the field of quantum technologies, where she uses experimental methods to investigate quantum information processing, precision tests of quantum mechanics, photonic quantum computing as well as quantum communications including quantum key distribution (QKD) in free space, fibre and integrated photonics.…”
    Get full text
    Article
  5. 605

    Building a quantum wireless network by O'Brien, DC, Schreir, A, Lee, V

    Published 2024
    “…Quantum Key Distribution (QKD) over optical fibres is a well-established area of research. …”
    Conference item
  6. 606

    A classical groupoid model for quantum networks by Reutter, D, Vicary, J

    Published 2017
    “…This network architecture allows the direct execution of a number of protocols that are usually associated with quantum networks, including teleportation, dense coding and secure key distribution.…”
    Conference item
  7. 607

    Securing Group Patient Communication in 6G-Aided Dynamic Ubiquitous Healthcare with Real-Time Mobile DNA Sequencing by Tuan-Vinh Le

    Published 2023-07-01
    “…Since heath data and medical information are very sensitive, security and privacy concerns in the communication systems have become extremely important. (3) Purpose: the author aims to propose a dynamic group-based patient-authenticated key distribution protocol for 6G-aided U-healthcare services enabled by mobile DNA sequencing. …”
    Get full text
    Article
  8. 608

    Transmission of O-band wavelength-division-multiplexed heralded photons over a noise-corrupted optical fiber channel by Liu, Mao Tong., Lim, Han Chuen.

    Published 2014
    “…We discussed and clarified the prospects and limitations of the photon heralding scheme for noise-tolerant quantum key distribution.…”
    Get full text
    Get full text
    Journal Article
  9. 609

    Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review by Mohamed, Nur Nabila, Mohd Yussoff, Yusnani, Saleh, Mohammed Ahmed, Hashim, Habibah

    Published 2020
    “…On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. …”
    Get full text
    Article
  10. 610

    A classical groupoid model for quantum networks by David J. Reutter, Jamie Vicary

    Published 2019-03-01
    “…This network architecture allows the direct execution of a number of protocols that are usually associated with quantum networks, including teleportation, dense coding and secure key distribution.…”
    Get full text
    Article
  11. 611

    Eavesdropping on quantum-cryptographical systems. by Ekert, A, Huttner, B, Palma, G, Peres, A

    Published 1994
    “…In this paper, we analyze various eavesdropping techniques, which may be either translucent or opaque to the transmitted photons, and we estimate the error rate above which the key distribution is deemed unsafe and should be abandoned. © 1994 The American Physical Society.…”
    Journal article
  12. 612

    Continuous-variable quantum cryptography with discrete alphabets: Composable security under collective Gaussian attacks by Panagiotis Papanastasiou, Stefano Pirandola

    Published 2021-01-01
    “…We consider continuous-variable quantum key distribution with discrete-alphabet encodings. In particular, we study protocols where information is encoded in the phase of displaced coherent (or thermal) states, even though the results can be directly extended to any protocol based on finite constellations of displaced Gaussian states. …”
    Get full text
    Article
  13. 613

    Genuine multipartite Bell inequality for device-independent conference key agreement by Timo Holz, Hermann Kampermann, Dagmar Bruß

    Published 2020-05-01
    “…A class of genuine multipartite Bell inequalities is presented, which is designed for multipartite device-independent (DI) quantum key distribution (QKD). We prove the classical bounds of this inequality and compute DI secret-key rates based on its violation. …”
    Get full text
    Article
  14. 614

    Cryptographic Protection in Maintenance and Management System of Ground Vehicles by M. M. Gruntovich, A. N. Syomkin

    Published 2012-03-01
    “…Messages from BT to CC are signed. Key distribution is provided by Key Management Center. …”
    Get full text
    Article
  15. 615

    High-stability time-domain balanced homodyne detector for ultrafast optical pulse applications by Cooper, M, Söller, C, Smith, B

    Published 2011
    “…Low-noise, efficient, phase-sensitive time-domain optical detection is essential for foundational tests of quantum physics based on optical quantum states and the realization of numerous applications ranging from quantum key distribution to coherent classical telecommunications. …”
    Conference item
  16. 616

    Effects of reduced measurement independence on Bell-based randomness expansion. by Koh, D, Hall, M, Setiawan, Pope, J, Marletto, C, Kay, A, Scarani, V, Ekert, A

    Published 2012
    “…With the advent of quantum information, the violation of a Bell inequality is used to witness the absence of an eavesdropper in cryptographic scenarios such as key distribution and randomness expansion. One of the key assumptions of Bell's theorem is the existence of experimental "free will," meaning that measurement settings can be chosen at random and independently by each party. …”
    Journal article
  17. 617

    On the Development of a Protection Profile Module for Encryption Key Management Components by Nan Sun, Chang-Tsun Li, Hin Chan, Md Zahidul Islam, Md Rafiqul Islam, Warren Armstrong

    Published 2023-01-01
    “…The quantum-safe aspect of key distribution protocols is further investigated to support EKM products with quantum-resistant algorithms and quantum key distribution features. …”
    Get full text
    Article
  18. 618

    Exact rate analysis for quantum repeaters with imperfect memories and entanglement swapping as soon as possible by Lars Kamin, Evgeny Shchukin, Frank Schmidt, Peter van Loock

    Published 2023-05-01
    “…In an even more realistic setting, we consider additional tools and parameters such as memory cutoffs, multiplexing, initial state and swapping gate fidelities, and finite link coupling efficiencies in order to identify potential regimes in memory-assisted quantum key distribution beyond one middle station that exceed the rates of the smallest quantum repeaters as well as those obtainable in all-optical schemes unassisted by stationary memory qubits and two-way classical communication. …”
    Get full text
    Article
  19. 619

    Hybrid cryptographic approach for internet of things applications: a review by Mohamed, Nur Nabila, Mohd Yussoff, Yusnani, Ahmed Saleh, Mohammed, Hashim, Habibah

    Published 2020
    “…On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. …”
    Get full text
    Article
  20. 620

    THE RISE OF MOBILE BANKING by IMOLA DRIGĂ

    Published 2015-12-01
    “…The paper aims to provide an overview of the latest electronic financial channel, underlining various aspects of mobile banking as it represents a key distribution channel for a growing number of customers.…”
    Get full text
    Article