A protocol for secret key infusion from satellite transmissions
In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development...
| Main Authors: | Wahiddin, Mohamed Ridza, Noor Sham, Noor Shamilla Shanaz, Saeb, Magdy M., Mior Hamdan, Mior Hadi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJCNS
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/14010/ http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf |
Similar Items
A novel secret key generation based on image link
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Adaptive Concurrent Transmission Protocol for
Wireless Mesh Network
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Performance analysis of MAC protocol for cooperative MIMO transmissions in WSN
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
Comparison between transmission control protocol schemes on wireless environment
by: M. Albareki, Mustafa Ali
Published: (2008)
by: M. Albareki, Mustafa Ali
Published: (2008)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Performance evaluation of MAC protocols for cooperative MIMO transmissions in sensor networks
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
MAC protocol for cooperative MIMO transmissions in asynchronous wireless sensor networks
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
Quantum trajectory theory for a two-level atom in a squeezed vacuum field with non-radiative dephasing
by: Akram, Uzma, et al.
Published: (1998)
by: Akram, Uzma, et al.
Published: (1998)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014)
by: Hoo, Mei Hui
Published: (2014)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A hierarchical group key management with host mobility protocol in wireless mobile environment / Babak Daghighi
by: Babak, Daghighi
Published: (2016)
by: Babak, Daghighi
Published: (2016)
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
by: Modares, Hero
Published: (2013)
by: Modares, Hero
Published: (2013)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Case Based Reasoning for Green Information Systems Infusion and Assimilation among IT Professionals in University Campuses
by: Jnr, Bokolo Anthony, et al.
Published: (2019)
by: Jnr, Bokolo Anthony, et al.
Published: (2019)
Squeezing, mixed mode squeezing, amplitude squared
squeezing and principal squeezing in a non-degenerate
parametric oscillator
by: Alam, Mohosin, et al.
Published: (2018)
by: Alam, Mohosin, et al.
Published: (2018)
Logico-linguistic semantic representation of documents
by: Wani, Sharyar, et al.
Published: (2016)
by: Wani, Sharyar, et al.
Published: (2016)
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013)
by: Ghaffar, Abid, et al.
Published: (2013)
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
Transient entropy squeezing of a single-Cooper-pair box placed inside a phase-damped cavity
by: Abdel-Shafi F., Obada, et al.
Published: (2008)
by: Abdel-Shafi F., Obada, et al.
Published: (2008)
A Data-driven Sigmoid-based Secretion Rate of Neuroendocrine-PID Control for TRMS System
by: Mohd Riduwan, Ghazali, et al.
Published: (2021)
by: Mohd Riduwan, Ghazali, et al.
Published: (2021)
Investigation of adoption behaviour for social commerce
in the Kingdom of Saudi Arabia
by: Aldhahery, Muhammad, et al.
Published: (2019)
by: Aldhahery, Muhammad, et al.
Published: (2019)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Interfaces and protocols
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
AI-infused web décor shop
by: Wee, Cindy Zi Wei
Published: (2023)
by: Wee, Cindy Zi Wei
Published: (2023)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Efficient algorithms for the key representation auditing scheme.
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
Similar Items
-
A novel secret key generation based on image link
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018) -
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010) -
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010) -
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)