A secure quantum telephone system
The present invention relates to a secure quantum telephone system for two communication parties to communicate securely. Saud secure quantum telephone system comprises of a means for two communicating parties in a secure environment by invoking the basic principle in quantum mechanics and wherein f...
| Main Authors: | Said, Ressa Suhardiman, Shamsul Shaari, Jesni, Wahiddin, Mohamed Ridza |
|---|---|
| Format: | Patent |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/12805/ http://irep.iium.edu.my/12805/1/id00000008123566.pdf |
Similar Items
Deterministic six states protocol for quantum communication
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
Generation of three-qubit entangled W-state by nonlinear optical state truncation
by: Said, Ressa Suhardiman, et al.
Published: (2006)
by: Said, Ressa Suhardiman, et al.
Published: (2006)
Quantum-trajectory simulations of a two-level atom cascaded to a cavity QED laser
by: Abdul Hadi, Muhammad Salihi, et al.
Published: (2003)
by: Abdul Hadi, Muhammad Salihi, et al.
Published: (2003)
Nonentagled qutrits in two way deterministic QKD
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014)
by: Shamsul Shaari, Jesni
Published: (2014)
A new quantum theory in accordance with Islamic science
by: Jaafar, Ab. Nasir, et al.
Published: (2016)
by: Jaafar, Ab. Nasir, et al.
Published: (2016)
Quantum phase fluctuations of coherent and thermal light coupled to a non-degenerate parametric oscillator beyond rotating wave approximation
by: Alam, Mohosin D.Najib, et al.
Published: (2017)
by: Alam, Mohosin D.Najib, et al.
Published: (2017)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Blind encoding into qudits
by: Shamsul Shaari, Jesni, et al.
Published: (2008)
by: Shamsul Shaari, Jesni, et al.
Published: (2008)
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016)
by: Kamaruddin, Suhaili, et al.
Published: (2016)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Quantum optics for beginners
by: Ficek, Zbigniew, et al.
Published: (2014)
by: Ficek, Zbigniew, et al.
Published: (2014)
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
Indistinguishable encoding for bidirectional quantum key distribution: Theory to experiment
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
Coupled-mode theory for Bose–Einstein condensates with time dependent atomic scattering length
by: Abdullaev, Fatkhulla Kh., et al.
Published: (2005)
by: Abdullaev, Fatkhulla Kh., et al.
Published: (2005)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Device-independent quantum key distribution using single-photon entanglement
by: Kamaruddin, Suhaili, et al.
Published: (2015)
by: Kamaruddin, Suhaili, et al.
Published: (2015)
Quantum trajectory theory for a two-level atom in a squeezed vacuum field with non-radiative dephasing
by: Akram, Uzma, et al.
Published: (1998)
by: Akram, Uzma, et al.
Published: (1998)
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
Apparatus for flipping the polarization state of an optical pulse between a transmitter and a receiver in quantum key distribution and method thereof
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
A linear atomic quantum coupler
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Telephone indicator.
by: Zaibonisah, Mohamad Amin.
Published: (2000)
by: Zaibonisah, Mohamad Amin.
Published: (2000)
Modified telephone
by: Fam, J.C
Published: (2001)
by: Fam, J.C
Published: (2001)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Checking noise correlations for safer two-way quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2014)
by: Shamsul Shaari, Jesni, et al.
Published: (2014)
Implementation of decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
by: Becir, A, et al.
Published: (2012)
by: Becir, A, et al.
Published: (2012)
Method and apparatus for quantum-mechanically generating a random number
by: , Suryadi, et al.
Published: (2010)
by: , Suryadi, et al.
Published: (2010)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
On the quantum phase fluctuations of coherent light coupled to a degenerate parametric amplifier
by: Alam, Mohosin, et al.
Published: (2016)
by: Alam, Mohosin, et al.
Published: (2016)
Telephone for hazardous area
by: Zakiah, Binti Jerani
Published: (2000)
by: Zakiah, Binti Jerani
Published: (2000)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
A system and method for exchangeable quantum key distribution
by: ,, Suryadi, et al.
Published: (2012)
by: ,, Suryadi, et al.
Published: (2012)
Dispatcher experiences in handling telephone CPR
by: Nurumal, Mohd. Said, et al.
Published: (2016)
by: Nurumal, Mohd. Said, et al.
Published: (2016)
Similar Items
-
Deterministic six states protocol for quantum communication
by: Shamsul Shaari, Jesni, et al.
Published: (2006) -
Generation of three-qubit entangled W-state by nonlinear optical state truncation
by: Said, Ressa Suhardiman, et al.
Published: (2006) -
Quantum-trajectory simulations of a two-level atom cascaded to a cavity QED laser
by: Abdul Hadi, Muhammad Salihi, et al.
Published: (2003) -
Nonentagled qutrits in two way deterministic QKD
by: Shamsul Shaari, Jesni, et al.
Published: (2007) -
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014)