Fiber based practical QKD system
A method to estimate parameters of the decoy state method based on one decoy state protocol for both BB84 and SARG04 has been presented. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single...
| Main Authors: | Ali, Sellami, Ahmed, Abdallah Hassen, Mohammed, Sellami, Chowdhury, Md. Sazzad Hossien, Hassan Abdalla Hashim, Aisha, Mahmoud, Omer |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28455/ http://irep.iium.edu.my/28455/1/Ali_paper.pdf http://irep.iium.edu.my/28455/2/ICMAE_2012_PROCEEDINGS-cover_pages_with_table_of_content.pdf |
Similar Items
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Estimation of decoy state parameters for practical QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Practical SARG04 quantum key distribution
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
Security performance of QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Eavesdropping attacks on QKD channels
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
An accurate analytic solution for differential and integral equations by modified homotopy perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2013)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2013)
A new reliable algorithm for analytical treatment of differential and integral equations
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2013)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2013)
Quantum key distribution in real life
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
The multistage homotopy-perturbation method: A powerful scheme for handling the Chaotic Lorenz system
by: Chowdhury, Md. Sazzad Hossien
Published: (2010)
by: Chowdhury, Md. Sazzad Hossien
Published: (2010)
Application of multistage homotopy-perturbation method for the solutions of the Chen system
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
Homotopy-perturbation method applied to system of ordinary differential equations (ODEs)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Adaptation of homotopy-perturbation method for numeric–analytic solution of system of ODEs
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2008)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2008)
A comparison between the modified homotopy perturbation method and adomian decomposition method for solving nonlinear heat transfer equations
by: Chowdhury, Md. Sazzad Hossien
Published: (2011)
by: Chowdhury, Md. Sazzad Hossien
Published: (2011)
Solution of classical Lane-Emden equation by homotopy-perturbation method
by: Chowdhury, Md. Sazzad Hossien
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien
Published: (2007)
Solution of predator-prey problem by multistage Adomian decomposition method
by: Chowdhury, Md. Sazzad Hossien
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien
Published: (2007)
Simulation of the predator-prey problem by the homotopy-perturbation method revised
by: Chowdhury, Md. Sazzad Hossien
Published: (2008)
by: Chowdhury, Md. Sazzad Hossien
Published: (2008)
An accurate solution to the Lotka-Volterra equations by modified Homotopy perturbation method
by: Chowdhury, Md. Sazzad Hossien
Published: (2012)
by: Chowdhury, Md. Sazzad Hossien
Published: (2012)
A powerful Numeric-analytic Technique for handling prey-predator problems
by: Chowdhury, Md. Sazzad Hossien
Published: (2012)
by: Chowdhury, Md. Sazzad Hossien
Published: (2012)
Direct solutions of nth-order IVPs by homotopyperturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2010)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2010)
Application of homotopy-perturbation method to the time-dependent singular initial value problems
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Homotopy-perturbation method for direct solution of nonlinear initial value problem
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Homotopy-perturbation solution of the isothermal gas sphetres
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Numerical solution of fin problem using decomposition method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2006)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2006)
On decomposition solutions of fins with temperature dependent surface 232 heat flux: Multi-boiling heat transfer
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2006)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2006)
A modified homotopy perturbation method for purely nonlinear fin-type problems
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Analytical solutions to heat transfer equations by homotopy-perturbation method revisited
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2008)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2008)
Application of homotopy-perturbation method
to Klein–Gordon and sine-Gordon equations
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
Solutions of a class of singular second-order IVPs by homotopy-perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Solutions of Emden–Fowler equations by homotopy-perturbation
methods
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
Solutions of time-dependent Emden–Fowler type equations
by homotopy-perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Analytical solution of the fin problem by extended homotopy perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
A new application of homotopy perturbation method to the reaction-diffusion Brusselator model
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2010)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2010)
Taylor-newton homotopy method for computing the depth of flow rate for a channel
by: Hasan, Talib Hashim, et al.
Published: (2010)
by: Hasan, Talib Hashim, et al.
Published: (2010)
Homotopy-perturbation method for power-law fin-type problems
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
On multistage homotopy-perturbation method applied
to nonlinear biochemical reaction model
by: Hashim, Ishak, et al.
Published: (2008)
by: Hashim, Ishak, et al.
Published: (2008)
Solution of prey–predator problem by numeric–analytic technique
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2007)
Solution of prey–predator problem by numeric–analytic technique
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
Similar Items
-
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012) -
Estimation of decoy state parameters for practical QKD
by: Ali, Sellami, et al.
Published: (2011) -
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013) -
Practical SARG04 quantum key distribution
by: Ali, Sellami, et al.
Published: (2012) -
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)