Quantum key distribution (QKD) protocols: A survey
AI Nurhadi, NR Syambas - 2018 4th International Conference …, 2018 - ieeexplore.ieee.org
The security strength of key distribution of most conventional cryptography is relied on
mathematical complexity and the irrational time needed to break the algorithm. But it will be …
mathematical complexity and the irrational time needed to break the algorithm. But it will be …
Data authentication and anonymization in IoT scenarios and future 5G networks using chaotic digital watermarking
B Bordel, R Alcarria, T Robles, MS Iglesias - IEEE Access, 2021 - ieeexplore.ieee.org
Future Internet-of-Things (IoT) scenarios and applications are envisioned to be supported by
emerging 5G networks. In this context, complex routing schemes for pervasive …
emerging 5G networks. In this context, complex routing schemes for pervasive …
On the security and confidentiality of quantum key distribution
AB Al‐Ghamdi, A Al‐Sulami… - Security and …, 2020 - Wiley Online Library
Cryptography is a scientific method that is used to transmit secret information. In contrast,
quantum cryptography depends on physical laws to encrypt information; when the quantum …
quantum cryptography depends on physical laws to encrypt information; when the quantum …
[PDF][PDF] Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets.
The formal modeling and verification of aircraft takeoff is a challenge because it is a complex
safety-critical operation. The task of aircraft takeoff is distributed amongst various computer …
safety-critical operation. The task of aircraft takeoff is distributed amongst various computer …
Formal verification techniques using quantum process calculus
TAS Davidson - 2012 - wrap.warwick.ac.uk
Quantum communication is a rapidly growing area of research and development. While the
successful construction of a large-scale quantum computer may be some years away, there …
successful construction of a large-scale quantum computer may be some years away, there …
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the
secure distribution of a bit string, used as key in cryptographic protocols. When it was noted …
secure distribution of a bit string, used as key in cryptographic protocols. When it was noted …
The effectiveness of brief, spaced practice on student difficulties with basic and essential engineering skills
BD Mikula, AF Heckler - 2013 IEEE Frontiers in Education …, 2013 - ieeexplore.ieee.org
Through extensive testing and interviews of sophomore, junior, and senior engineering
students in a Materials Science Engineering course at The Ohio State University, we found …
students in a Materials Science Engineering course at The Ohio State University, we found …
[PDF][PDF] Improving TLS security by quantum cryptography
ABSTRACT Quantum Cryptography or Quantum Key Distribution (QKD) solves the key
distribution problem by allowing the exchange of a cryptographic key between two remote …
distribution problem by allowing the exchange of a cryptographic key between two remote …
[PDF][PDF] Verification of quantum cryptography protocols by model checking
Unlike classical cryptography which is based on mathematical functions, Quantum
Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to …
Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to …
[PDF][PDF] Formal verification of the security of a free-space quantum key distribution system
V Fernández, MJ García-Martínez… - Proc. World Congr …, 2011 - core.ac.uk
Distribution (QKD) system is analyzed by using PRISM, a probabilistic model checker.
Disturbances and misalignments causing an imperfect channel are considered. The security …
Disturbances and misalignments causing an imperfect channel are considered. The security …