咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 3 篇 信息与通信工程
    • 2 篇 计算机科学与技术...
    • 2 篇 安全科学与工程
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 4 篇 理学
    • 3 篇 物理学
    • 1 篇 数学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...

主题

  • 7 篇 qkd protocols
  • 5 篇 quantum cryptogr...
  • 3 篇 quantum key dist...
  • 2 篇 variation of b92
  • 2 篇 security
  • 2 篇 b92 simulation
  • 2 篇 proposed protoco...
  • 1 篇 bb84 protocol
  • 1 篇 quantum sequence
  • 1 篇 simulation
  • 1 篇 qkd systems
  • 1 篇 three-stage prot...
  • 1 篇 authenticated cl...
  • 1 篇 quantum key dist...
  • 1 篇 quantum key dist...
  • 1 篇 initial authenti...
  • 1 篇 qkd
  • 1 篇 channel authenti...
  • 1 篇 key renewal func...
  • 1 篇 man-in-the-middl...

机构

  • 1 篇 ctr excellence s...
  • 1 篇 kennesaw state u...
  • 1 篇 amity univ amity...
  • 1 篇 graphic era hill...
  • 1 篇 school of comput...
  • 1 篇 jsc infotecs res...
  • 1 篇 krasnoprudnaya s...
  • 1 篇 inst teknol band...
  • 1 篇 labsiv faculty o...
  • 1 篇 univ nebraska om...
  • 1 篇 ned univ engn & ...
  • 1 篇 amity school of ...
  • 1 篇 amity univ rajas...

作者

  • 2 篇 kalra manish
  • 2 篇 poonia ramesh c.
  • 1 篇 khan ehtesham
  • 1 篇 meraj sumayya
  • 1 篇 parakh abhishek
  • 1 篇 syambas nana rac...
  • 1 篇 chhabra gunjan
  • 1 篇 urivskiy alexey
  • 1 篇 kaushik keshav
  • 1 篇 jha nitin
  • 1 篇 nurhadi ali ibnu...
  • 1 篇 khan muhammad mu...
  • 1 篇 amellal hicham
  • 1 篇 yadav suman avdh...
  • 1 篇 zhilyaev andrey
  • 1 篇 hajjami salma el
  • 1 篇 borodin mikhail
  • 1 篇 subramaniam maha...

语言

  • 5 篇 英文
  • 2 篇 其他
检索条件"主题词=QKD protocols"
7 条 记 录,以下是1-10 订阅
排序:
Quantum Man-in-the-Middle Attacks on qkd protocols: Proposal of a Novel Attack Strategy  6
Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Amellal, Hicham Hajjami, Salma El Kaushik, Keshav Chhabra, Gunjan Yadav, Suman Avdhesh LabSIV Faculty of Science Department of Computer Science Agadir Morocco School of Computer Sciences University of Petroleum and Energy Studies Uttarakhand Dehradun India Graphic Era Hill University Department of CSE Uttarakhand Dehradun India Amity School of Engineering and Technology Department of Computer Science Amity University Uttar Pradesh Greater Noida India
Quantum Key Distribution (qkd) protocols theo- retically propose a high-security level based on the advantages of quantum computing. This paper analyze the security level of one of the most well-known qkd protocols, B... 详细信息
来源: 评论
Security Analysis of qkd protocols: Simulation & Comparison  17
Security Analysis of QKD Protocols: Simulation & Comparison
收藏 引用
17th International Bhurban Conference on Applied Sciences and Technology (IBCAST)
作者: Khan, Ehtesham Meraj, Sumayya Khan, Muhammad Mubashir Ctr Excellence Sci & Appl Technol Islamabad Pakistan NED Univ Engn & Technol Karachi Pakistan
The inception of quantum key distribution (qkd) empowered the communication networks with unconditional security because of the unique characteristics of quantum mechanics. Since qkd genesis, various protocols have be... 详细信息
来源: 评论
Quantum Key Distribution (qkd) protocols: A Survey  4
Quantum Key Distribution (QKD) Protocols: A Survey
收藏 引用
4th International Conference on Wireless and Telematics (ICWT)
作者: Nurhadi, Ali Ibnun Syambas, Nana Rachmana Inst Teknol Bandung Sch Elect Engn & Informat Bandung Indonesia
The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key dist... 详细信息
来源: 评论
Effect of noise and topologies on multi-photon quantum protocols  4
Effect of noise and topologies on multi-photon quantum proto...
收藏 引用
Conference on Quantum Computing, Communication, and Simulation IV
作者: Jha, Nitin Parakh, Abhishek Subramaniam, Mahadevan Kennesaw State Univ Kennesaw GA 30144 USA Univ Nebraska Omaha NE USA
Quantum-augmented networks aim to use quantum phenomena to improve detection and protection against malicious actors in a classical communication network. This may include multiplexing quantum signals into classical f... 详细信息
来源: 评论
Key generation schemes for channel authentication in quantum key distribution protocol
IET QUANTUM COMMUNICATION
收藏 引用
IET QUANTUM COMMUNICATION 2021年 第3期2卷 90-97页
作者: Borodin, Mikhail Zhilyaev, Andrey Urivskiy, Alexey JSC InfoTeCS Res & Dev Ctr Moscow Russia Krasnoprudnaya St 13-52 Moscow 107140 Russia
Quantum key distribution (qkd) systems enable secure key generation between two parties. Such systems require an authenticated classical channel for qkd protocols to work. Usually, the initial authentication key for t... 详细信息
来源: 评论
Design a new protocol and comparison with B92 protocol for quantum key distribution
收藏 引用
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY 2019年 第3期12卷 153-156页
作者: Kalra, Manish Poonia, Ramesh C. Amity Univ Rajasthan Amity Inst Informat Technol Jaipur Rajasthan India
Quantum key distribution is the latest advancement in quantum cryptography. There are several qkd protocols like BB84, B92, Ekert91, COW, SARG04, etc. out of which B92 is the second protocol developed in 1992 based on... 详细信息
来源: 评论
Design a new protocol for quantum key distribution
收藏 引用
JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES 2017年 第6期38卷 1047-1054页
作者: Kalra, Manish Poonia, Ramesh C. Amity Univ Amity Inst Informat Technol Jaipur 303002 Rajasthan India
Quantum key distribution is the latest advancement in quantum cryptography. There are several qkd protocols like BB84, B92, Ekert91, COW, SARG04, etc. out of which B92 is the Second protocol developed in 1992 based on... 详细信息
来源: 评论