Quantum key distribution protocols
| Main Authors: | Ali, Sellami, Al-Khateeb, Khalid A. Saeed |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/24093/ http://irep.iium.edu.my/24093/1/chp8.pdf |
Similar Items
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
FPGA control of quantum channel security
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Theory of Erbium Doped Fiber Lasers (EDFLS) and Erbium Doped Fiber Amplifiers (EDFAS)
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Security performance of QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Eavesdropping attacks on QKD channels
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
Erbium Doped Fiber Amplifier with a Quadruple Pass
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Erbium Doped Fiber Lasers with double tunable bandpass filter
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Practical quantum key distribution
by: Ali, Sellami
Published: (2012)
by: Ali, Sellami
Published: (2012)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Electronic remote monitoring of industrial system
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
Avalanche Photo Diodes as a single photon detectors
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
Epitaxial growth of thin ZnS films
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
Transparent electrodes for optoelectronic displays
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed
Published: (2011)
Design of digital electricity meter
by: Al-Khateeb, Khalid A. Saeed
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed
Published: (2010)
Quantum key distribution in real life
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
An analytical framework for distributed and centralized mobility management protocols
by: Balfaqih, Mohammed, et al.
Published: (2020)
by: Balfaqih, Mohammed, et al.
Published: (2020)
Modern electronic display systems
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Theoretical analysis of a double stages Erbium Doped Fiber Amplifier
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Modeling CMOS wafer production line using promodel software
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Medical care system for remote monitoring of foetal ECG
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Intelligent auto tracking in 3D space by image processing
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Supervisory Control and Data Acquisition System (SCADA) using microcontroller
by: Azman Shah, Mohammad, et al.
Published: (2011)
by: Azman Shah, Mohammad, et al.
Published: (2011)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
Practical SARG04 quantum key distribution
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Dynamic traffic light sequence algorithm using RFID
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Dynamic traffic light sequence algorithm using RFID
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
MANET routing protocols
by: Alawi, Mahmoud, et al.
Published: (2011)
by: Alawi, Mahmoud, et al.
Published: (2011)
Advanced RFID security framework for dynamic traffic management
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Toward confidential distributed medical emergency system and security service
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Vehicle to vehicle routing protocols
by: Alawi, Mahmoud, et al.
Published: (2011)
by: Alawi, Mahmoud, et al.
Published: (2011)
Similar Items
-
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011) -
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010) -
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013) -
FPGA control of quantum channel security
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)