Rigorous Evaluation of Computer Processors with Statistical Model Checking

F Mazurek, A Tschand, Y Wang, M Pajic… - Proceedings of the 56th …, 2023 - dl.acm.org
Experiments with computer processors must account for the inherent variability in
executions. Prior work has shown that real systems exhibit variability, and random effects …

[PDF][PDF] Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets.

M Jamal, NA Zafar, D Musleh… - … , Materials & Continua, 2022 - researchgate.net
The formal modeling and verification of aircraft takeoff is a challenge because it is a complex
safety-critical operation. The task of aircraft takeoff is distributed amongst various computer …

Quantum key distribution by using public key algorithm (RSA)

A Odeh, K Elleithy, M Alshowkan… - Third International …, 2013 - ieeexplore.ieee.org
Classical cryptography is based on the computational difficulty to compute the secret key
using the current computing systems. Depending only on the difficulty of computational …

Enhancement of quantum key distribution protocol BB84

AA Abdullah, YH Jassem - Journal of Computational and …, 2019 - ingentaconnect.com
Quantum key distribution (QKD) is one of the secure ways of distributing the keys among
entities involved in communication. BB84 is the first protocol for QKD in year 1984. In this …

Modified BB84 quantum key distribution protocol using legendre symbol

AA Abdullah, RZ Khalaf… - 2019 2nd Scientific …, 2019 - ieeexplore.ieee.org
Quantum key distribution is considered as one of the safe ways of distributing keys among
the frames employed in communication. In 1984, BB84 appeared first as a protocol for QKD …

Impact security enhancement in chaotic quantum cryptography

MH Al Hasani, KA Al Naimee - Optics & Laser Technology, 2019 - Elsevier
In this paper the experimental and the numerical study of an optical key distribution quantum
cryptography using BB84 protocol has been achieved. We create secret quantum key and …

Quantitative Assurance and Synthesis of Controllers from Activity Diagrams

K Ye, F Yan, S Gerasimou - arXiv preprint arXiv:2403.00169, 2024 - arxiv.org
Probabilistic model checking is a widely used formal verification technique to automatically
verify qualitative and quantitative properties for probabilistic models. However, capturing …

[PDF][PDF] Improving TLS security by quantum cryptography

M Elboukhari, M Azizi, A Azizi - … Journal of Network Security & Its …, 2010 - academia.edu
ABSTRACT Quantum Cryptography or Quantum Key Distribution (QKD) solves the key
distribution problem by allowing the exchange of a cryptographic key between two remote …

Vulnerabilities and verification of cryptographic protocols and their future in wireless body area networks

J Chaudhry, UA Qidwai… - 2012 International …, 2012 - ieeexplore.ieee.org
In network security goals such as confidentiality, authentication, integrity and non-
repudiation can be achieved using cryptographic techniques. Cryptographic techniques are …

[PDF][PDF] Verification of quantum cryptography protocols by model checking

M Elboukhari, M Azizi, A Azizi - Int. J. Network Security & Appl, 2010 - academia.edu
Unlike classical cryptography which is based on mathematical functions, Quantum
Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to …