Quantum key distribution (QKD) protocols: A survey

AI Nurhadi, NR Syambas - 2018 4th International Conference …, 2018 - ieeexplore.ieee.org
The security strength of key distribution of most conventional cryptography is relied on
mathematical complexity and the irrational time needed to break the algorithm. But it will be …

Data authentication and anonymization in IoT scenarios and future 5G networks using chaotic digital watermarking

B Bordel, R Alcarria, T Robles, MS Iglesias - IEEE Access, 2021 - ieeexplore.ieee.org
Future Internet-of-Things (IoT) scenarios and applications are envisioned to be supported by
emerging 5G networks. In this context, complex routing schemes for pervasive …

On the security and confidentiality of quantum key distribution

AB Al‐Ghamdi, A Al‐Sulami… - Security and …, 2020 - Wiley Online Library
Cryptography is a scientific method that is used to transmit secret information. In contrast,
quantum cryptography depends on physical laws to encrypt information; when the quantum …

[PDF][PDF] Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets.

M Jamal, NA Zafar, D Musleh… - … , Materials & Continua, 2022 - researchgate.net
The formal modeling and verification of aircraft takeoff is a challenge because it is a complex
safety-critical operation. The task of aircraft takeoff is distributed amongst various computer …

Formal verification techniques using quantum process calculus

TAS Davidson - 2012 - wrap.warwick.ac.uk
Quantum communication is a rapidly growing area of research and development. While the
successful construction of a large-scale quantum computer may be some years away, there …

Analysis of the Security of BB84 by Model Checking

M Elboukhari, M Azizi, A Azizi - arXiv preprint arXiv:1005.4504, 2010 - arxiv.org
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the
secure distribution of a bit string, used as key in cryptographic protocols. When it was noted …

The effectiveness of brief, spaced practice on student difficulties with basic and essential engineering skills

BD Mikula, AF Heckler - 2013 IEEE Frontiers in Education …, 2013 - ieeexplore.ieee.org
Through extensive testing and interviews of sophomore, junior, and senior engineering
students in a Materials Science Engineering course at The Ohio State University, we found …

[PDF][PDF] Improving TLS security by quantum cryptography

M Elboukhari, M Azizi, A Azizi - … Journal of Network Security & Its …, 2010 - academia.edu
ABSTRACT Quantum Cryptography or Quantum Key Distribution (QKD) solves the key
distribution problem by allowing the exchange of a cryptographic key between two remote …

[PDF][PDF] Verification of quantum cryptography protocols by model checking

M Elboukhari, M Azizi, A Azizi - Int. J. Network Security & Appl, 2010 - academia.edu
Unlike classical cryptography which is based on mathematical functions, Quantum
Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to …

[PDF][PDF] Formal verification of the security of a free-space quantum key distribution system

V Fernández, MJ García-Martínez… - Proc. World Congr …, 2011 - core.ac.uk
Distribution (QKD) system is analyzed by using PRISM, a probabilistic model checker.
Disturbances and misalignments causing an imperfect channel are considered. The security …