Zobrazeno 1 - 10
of 210
pro vyhledávání: '"BB84 Protocol"'
Publikováno v:
Journal of Telecommunications and Information Technology, Vol 98, Iss 4 (2024)
The Tree Multiparty Quantum Key Agreement Protocol (TMQKAP) is introduced as a novel solution for secure quantum key agreement among multiple participants, specifically tailored for tree topologies. Based on the BB84 protocol, TMQKAP employs hierarch
Externí odkaz:
https://doaj.org/article/4fc4f904ee4640c6860d765358b23d4c
Publikováno v:
Baghdad Science Journal, Vol 20, Iss 5(Suppl.) (2023)
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of life, which makes it is a promising technology in the future. In the coming days, as attack technologies become more improved, security will have an
Externí odkaz:
https://doaj.org/article/4a58dd31f907464eb6415bf6ba51eb68
Autor:
Burak Kebapci, Vecdi Emre Levent, Sude Ergin, Gorkem Mutlu, Ibrahim Baglica, Anilcan Tosun, Pietro Paglierani, Konstantinos Pelekanakis, Roberto Petroccia, Joao Alves, Murat Uysal
Publikováno v:
IEEE Photonics Journal, Vol 15, Iss 4, Pp 1-10 (2023)
As threats in the maritime domain diversify, securing data transmission becomes critical for underwater wireless networks designed for the surveillance of critical infrastructure and maritime border protection. This has sparked interest in underwater
Externí odkaz:
https://doaj.org/article/e4a4ac3cd94d4dd1992033c1e9eb5678
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Grote Olaf, Ahrens Andreas
Publikováno v:
Electrical, Control and Communication Engineering, Vol 18, Iss 1, Pp 43-49 (2022)
The Quantum Key Distribution (QKD) is a well-researched secure communication method for exchanging cryptographic keys only known by the shared participants. The vulnerable problem of a secret key distribution is the negotiation and the transfer over
Externí odkaz:
https://doaj.org/article/e5cbc07640db4a6e9607b2afe7823c33
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 22, Iss 1, Pp 101-113 (2022)
Secured transmission between users is essential for communication system models. Recently, cryptographic schemes were introduced for secured transmission and secret transmission between cloud users. In a cloud environment, there are many security iss
Externí odkaz:
https://doaj.org/article/443178a926a34135aa55d5297e652643
Publikováno v:
IEEE Access, Vol 10, Pp 72743-72757 (2022)
Quantum Cryptography emerged from the limitations of classical cryptography. It will play a vital role in information security after the availability of expected powerful quantum computers. Still many quantum primitives like quantum money, blind quan
Externí odkaz:
https://doaj.org/article/fabd93ddb27b4232b4f0ae9388b31648
Autor:
Jaydip Kumar, Vipin Saxena
Publikováno v:
Baghdad Science Journal, Vol 19, Iss 6(Suppl.) (2022)
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is t
Externí odkaz:
https://doaj.org/article/85ef903833564badb20b7446e8664cbb
Publikováno v:
IEEE Photonics Journal, Vol 13, Iss 6, Pp 1-9 (2021)
Nowadays, a high level of security is required for the transmission of critical information. Quantum Key Distribution (QKD) systems are considered the best option to protect such information. Many studies have shown the efficiency of the QKD optical
Externí odkaz:
https://doaj.org/article/0b730ef2c84f4d10a8047a361ca3ddea