Quantum key distribution in real life
The quantum key distribution (QKD) technique establishes secret keys shared between two communicating parties. Theoretically, unconditional security provided by QKD is guaranteed by the fundamental laws of quantum physics. in the real life, it is still possible to obtain unconditionally secure QK...
| Main Authors: | Ali, Sellami, Ahmed, Abdallah Hassen, Habaebi, Mohamed Hadi, Chowdhury, Md. Sazzad Hossien |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IDOSI Publication
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28060/ http://irep.iium.edu.my/28060/1/5.pdf |
Similar Items
Reliable cooperative multicasting for MBS WiMAX traffic
by: Elrabiei, Sara Moftah, et al.
Published: (2012)
by: Elrabiei, Sara Moftah, et al.
Published: (2012)
Challenges in online secure authentication and authorization methodology: a review
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Performance analysis of QoS scheme supported in MIPV6 network
by: Hussein, Loay Faisal, et al.
Published: (2013)
by: Hussein, Loay Faisal, et al.
Published: (2013)
Analytical evaluation of intra domain mobility approach in NEMO environment
by: Shayla, Islam, et al.
Published: (2014)
by: Shayla, Islam, et al.
Published: (2014)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
Improved voice over Internet protocol for wireless devices
by: Roslin, Raihan Jannati, et al.
Published: (2018)
by: Roslin, Raihan Jannati, et al.
Published: (2018)
4G coverage in Malaysia
by: Ab Aziz, Nur Faizah, et al.
Published: (2015)
by: Ab Aziz, Nur Faizah, et al.
Published: (2015)
Comments and improvements of “HOTA: Handover optimized
ticketbased authentication in networkbased mobility
management”
by: Alizadeh, Mojtaba, et al.
Published: (2017)
by: Alizadeh, Mojtaba, et al.
Published: (2017)
Determination of complex-valued parametric model coefficients using artificial neural network technique
by: Aibinu, Abiodun Musa, et al.
Published: (2010)
by: Aibinu, Abiodun Musa, et al.
Published: (2010)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
A framework for developing Real-Time OLAP algorithm using multi-core processing and GPU: Heterogeneous computing
by: Alzeini, Haytham I M, et al.
Published: (2013)
by: Alzeini, Haytham I M, et al.
Published: (2013)
A framework for developing Real-Time OLAP algorithm using multi-core processing and GPU: heterogeneous computing
by: Alzeini, Haytham I M, et al.
Published: (2013)
by: Alzeini, Haytham I M, et al.
Published: (2013)
Optimal throughput and self-adaptability of robust real-time IEEE 802.15.4 MAC for AMI Mesh network
by: Shabani, Hikma, et al.
Published: (2013)
by: Shabani, Hikma, et al.
Published: (2013)
Optimal throughput and self-adaptability of robust real-time IEEE 802.15.4 MAC for AMI Mesh network
by: Shabani, Hikma, et al.
Published: (2013)
by: Shabani, Hikma, et al.
Published: (2013)
A packet scheduling scheme for improving real-time applications performance in downlink LTE–advanced
by: Elsheikh, Elsheikh Mohamed Ahmed, et al.
Published: (2018)
by: Elsheikh, Elsheikh Mohamed Ahmed, et al.
Published: (2018)
Robust real-time IEEE802.15.4 MAC protocol in multi-hop mesh network for distribution smart grid-AMI
by: Shabani, Hikma, et al.
Published: (2013)
by: Shabani, Hikma, et al.
Published: (2013)
Broad bandwidth SOA-based multiwavelength laser incorporating a bidirectional lyot filter
by: Sulaiman, Abdul Hadi, et al.
Published: (2018)
by: Sulaiman, Abdul Hadi, et al.
Published: (2018)
Macro/micro-mobility fast handover in hierarchical mobile IPv6
by: Habaebi, Mohamed Hadi
Published: (2006)
by: Habaebi, Mohamed Hadi
Published: (2006)
BSCL: Blockchain-Oriented SDN Controlled cloud based Li-Fi communication architecture for smart city network
by: Khan, Fazeel Ahmed, et al.
Published: (2018)
by: Khan, Fazeel Ahmed, et al.
Published: (2018)
Sensor node clutter distribution in LoRa LPWAN
by: Zainal, Nur Aishah, et al.
Published: (2017)
by: Zainal, Nur Aishah, et al.
Published: (2017)
Cluttered traffic distribution in LoRa LPWAN
by: Zainal, Nur Aishah, et al.
Published: (2018)
by: Zainal, Nur Aishah, et al.
Published: (2018)
Effects of shadowing on LoRa LPWAN Radio links
by: Habaebi, Mohamed Hadi, et al.
Published: (2017)
by: Habaebi, Mohamed Hadi, et al.
Published: (2017)
Gateway sink placement for sensor node grid distribution in LoRa smart city networks
by: Zainal, Nur Aishah, et al.
Published: (2019)
by: Zainal, Nur Aishah, et al.
Published: (2019)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Autonomic schemes for threat mitigation in internet of things
by: Ashraf, Qazi Mamoon, et al.
Published: (2015)
by: Ashraf, Qazi Mamoon, et al.
Published: (2015)
Empirical evaluation of LORA link performance for Smart City/Smart Campus environments
by: Ismail, Muhammad Danial, et al.
Published: (2019)
by: Ismail, Muhammad Danial, et al.
Published: (2019)
Adaptive framed pseudo-Bayesian Aloha algorithm with priorities
by: Habaebi, Mohamed Hadi, et al.
Published: (2000)
by: Habaebi, Mohamed Hadi, et al.
Published: (2000)
Adaptive reservation TDMA protocol for wireless multimedia traffic
by: Habaebi, Mohamed Hadi, et al.
Published: (2001)
by: Habaebi, Mohamed Hadi, et al.
Published: (2001)
The FPBA algorithm with controlled capture ICC2001
by: Habaebi, Mohamed Hadi, et al.
Published: (2001)
by: Habaebi, Mohamed Hadi, et al.
Published: (2001)
A new MAC protocol for wireless ATM networks
by: Habaebi, Mohamed Hadi, et al.
Published: (2000)
by: Habaebi, Mohamed Hadi, et al.
Published: (2000)
Reliable battery-aware cooperative multicasting for MBS WiMAX traffic
by: Elrabiei, Sara Moftah, et al.
Published: (2011)
by: Elrabiei, Sara Moftah, et al.
Published: (2011)
Effect of 3 key factors on average end to end delay and jitter in MANET
by: Hakak, Saqib Iqbal, et al.
Published: (2014)
by: Hakak, Saqib Iqbal, et al.
Published: (2014)
A critique study on phase optimized generalized discrete fourier transform based partial transmit sequence for PAPR in OFDM systems
by: Habaebi, Mohamed Hadi, et al.
Published: (2015)
by: Habaebi, Mohamed Hadi, et al.
Published: (2015)
Harvesting WiFi Received Signal Strength
Indicator (RSSI) for control/automation
system in SOHO indoor environment with
ESP8266
by: Habaebi, Mohamed Hadi, et al.
Published: (2016)
by: Habaebi, Mohamed Hadi, et al.
Published: (2016)
Utilising signal measurement in bandwidth reservation scheme for QoS provisioning in multimedia wireless networks
by: ,, Prihandoko, et al.
Published: (2003)
by: ,, Prihandoko, et al.
Published: (2003)
Aggregate history of user mobility pattern for QoS provisioning in multimedia wireless networks
by: ,, Prihandoko, et al.
Published: (2004)
by: ,, Prihandoko, et al.
Published: (2004)
Adapted packet scheduling algorithm for robust real-time multimedia
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2016)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2016)
Coalition formation for throughput enhancement in cognitive radio wireless networks
by: Tahir, Mohammad, et al.
Published: (2015)
by: Tahir, Mohammad, et al.
Published: (2015)
Phased array antenna design for 5G mobile networks
by: Habaebi, Mohamed Hadi, et al.
Published: (2015)
by: Habaebi, Mohamed Hadi, et al.
Published: (2015)
Similar Items
-
Reliable cooperative multicasting for MBS WiMAX traffic
by: Elrabiei, Sara Moftah, et al.
Published: (2012) -
Challenges in online secure authentication and authorization methodology: a review
by: Dar, Humaira, et al.
Published: (2013) -
Performance analysis of QoS scheme supported in MIPV6 network
by: Hussein, Loay Faisal, et al.
Published: (2013) -
Analytical evaluation of intra domain mobility approach in NEMO environment
by: Shayla, Islam, et al.
Published: (2014) -
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)