The decoy state method in quantum key distribution
| Main Authors: | Ali, Sellami, Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/24092/ http://irep.iium.edu.my/24092/1/chp10.pdf |
Similar Items
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Implementation of SARG04 decoy state quantum key distribution
by: Sellami , Ali, et al.
Published: (2011)
by: Sellami , Ali, et al.
Published: (2011)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
Implementation of decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
Estimation of decoy state parameters for practical QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
by: Becir, A, et al.
Published: (2012)
by: Becir, A, et al.
Published: (2012)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
FPGA control of quantum channel security
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Theory of Erbium Doped Fiber Lasers (EDFLS) and Erbium Doped Fiber Amplifiers (EDFAS)
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Security performance of QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Eavesdropping attacks on QKD channels
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
Practical quantum key distribution
by: Ali, Sellami
Published: (2012)
by: Ali, Sellami
Published: (2012)
Erbium Doped Fiber Amplifier with a Quadruple Pass
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Erbium Doped Fiber Lasers with double tunable bandpass filter
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Quantum key distribution in real life
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Practical SARG04 quantum key distribution
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Electronic remote monitoring of industrial system
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
Avalanche Photo Diodes as a single photon detectors
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
Epitaxial growth of thin ZnS films
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
Transparent electrodes for optoelectronic displays
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
Design of digital electricity meter
by: Al-Khateeb, Khalid A. Saeed
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed
Published: (2010)
Similar Items
-
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009) -
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009) -
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011) -
Implementation of SARG04 decoy state quantum key distribution
by: Sellami , Ali, et al.
Published: (2011) -
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)