Explorative Implementation of Quantum Key Distribution Algorithms for Secure Consumer Electronics Networks

MS Peelam, S Sai, V Chamola - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Key distribution techniques are indispensable for maintaining privacy, preventing
unauthorized access, and safeguarding sensitive data in consumer electronics networks …

A quantum router for the entangled web

BA Huberman, B Lund - Information Systems Frontiers, 2020 - Springer
Qubit transmission protocols are presently point-to-point, and thus restrictive in their
functionality. A quantum router is necessary for the quantum Internet to become a reality. We …

Use of Quantum Cryptography Environment For Authentication In Online Banking Transactions Security

UP Madje, MB Pande - 2021 IEEE 2nd International …, 2021 - ieeexplore.ieee.org
With online transactions and processing, a large amount of data is generated in today's
internet world, and securing this information is a challenge. It considers security and privacy …

[PDF][PDF] Quantum Key Distribution for Internet of Things (IoT)-A

T Kowsalya, S Sukirtha, S Krithika - researchgate.net
Abstract-In recent years the concept of IOT has gained so much attention that it is merely
impossible to imagine our lives without it. IOT is the process of connecting, interacting and …