A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from send...
| Main Authors: | Al-Khateeb, Khalid A. Saeed, A. Majeed, Mohammed Munther, M. Saeb, Magdy, Wahiddin, Mohamed Ridza |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/5426/ http://irep.iium.edu.my/5426/1/A_Secure_Protocol_Using_6DP_for_Quantum_Authentication_and_Hash_Functions_for_Key__Distribution_%28KDP-6DP%29.pdf |
Similar Items
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
Theoretical analysis, optimization, and experimental evaluation of dual function DP R-EDFA
by: Hossain, Nadir, et al.
Published: (2007)
by: Hossain, Nadir, et al.
Published: (2007)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Extracellular Polyhydroxyalkanoate Depolymerase by Acidovorax sp. DP5
by: Vigneswari, S., et al.
Published: (2015)
by: Vigneswari, S., et al.
Published: (2015)
Scaling and numerical simulation analysis of 50 nm MOSFET incorporating dielectric pocket (DP-MOSFET)
by: M. N., Zul Atfyi Fauzan, et al.
Published: (2008)
by: M. N., Zul Atfyi Fauzan, et al.
Published: (2008)
Abandoned housing projects in Malaysia and the prospect of DP: an overview
by: Abdul Razak, Dzuljastri, et al.
Published: (2015)
by: Abdul Razak, Dzuljastri, et al.
Published: (2015)
A novel design of 4-Gbps and 6-Gbps IR-UWB pulse generator
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
FPGA control of quantum channel security
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Evaluation of MIPv6 approach to provide multicast to mobile nodes
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
by: Azana Hafizah Mohd, Aman, et al.
Published: (2017)
by: Azana Hafizah Mohd, Aman, et al.
Published: (2017)
Handoff latency analysis of mobile IPv6 protocol variations
by: Haseeb, Shariq, et al.
Published: (2007)
by: Haseeb, Shariq, et al.
Published: (2007)
Agonist stimulus trafficking by human prostanoid CRTH2 (DP2) receptors.
by: McArthur Wilson, Richard John
Published: (2007)
by: McArthur Wilson, Richard John
Published: (2007)
RNA helicase DP103 and TAK1: a new connection in cancer
by: Shin, E., et al.
Published: (2015)
by: Shin, E., et al.
Published: (2015)
Comparative performance analysis of mobile IPv6 protocols: special reference to simultaneous bindings
by: Haseeb, Shariq, et al.
Published: (2006)
by: Haseeb, Shariq, et al.
Published: (2006)
DEAD-box helicase DP103 defines metastatic potential of human breast cancers
by: Shin, E., et al.
Published: (2014)
by: Shin, E., et al.
Published: (2014)
Quantum estimation of impurity effect for KDP crystal growth
by: Asakuma, Y., et al.
Published: (2008)
by: Asakuma, Y., et al.
Published: (2008)
Ubiquitous RFID network for highway monitoring and management
by: Johari, Jaiz A. Y, et al.
Published: (2014)
by: Johari, Jaiz A. Y, et al.
Published: (2014)
Real time tracking in 3D space by robotic vision
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2007)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2007)
Recovery modeling in MPLS networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2014)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2014)
Availability evaluation of scalable complex networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2012)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2012)
Modelling numerical simulation of DP590 steel
undergoing finite strain deformation of
uniaxial tensile test
by: Kamarulzaman, M. F., et al.
Published: (2022)
by: Kamarulzaman, M. F., et al.
Published: (2022)
Dark Current mechanisms in quantum dot laser structures
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2011)
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2011)
Data mining technique on Cardioid graph based ECG biometric authentication
by: Sidek, Khairul Azami, et al.
Published: (2011)
by: Sidek, Khairul Azami, et al.
Published: (2011)
The influence of EDFA's configurations on the behavioral trends of gain and noise figure
by: Sellami , Ali, et al.
Published: (2014)
by: Sellami , Ali, et al.
Published: (2014)
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
Intelligent auto tracking in 3D space by image processing
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
Low cost SCADA system with auto fault detection using micro controller
by: Shah, M. Azman, et al.
Published: (2005)
by: Shah, M. Azman, et al.
Published: (2005)
An Example Proposal: An Examination of Effects of Self-Concept, Destination Personality, and SC-DP Congruence on Tourist Behavior.
by: Li, X., et al.
Published: (2011)
by: Li, X., et al.
Published: (2011)
Fast and accurate algorithm for ECG authentication using residual depthwise separable convolutional neural networks
by: Ihsanto, Eko, et al.
Published: (2020)
by: Ihsanto, Eko, et al.
Published: (2020)
An enhanced scheme for QoS in mobile IPv6 environment
by: Hussien, Loay F., et al.
Published: (2011)
by: Hussien, Loay F., et al.
Published: (2011)
Effect of modulation p-doping on the optical properties of quantum dot laser structure
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2010)
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2010)
An emergency medical care network system for fetal ECG monitoring
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2011)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2011)
Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm
by: Mohd Hassan Wong , Fadhli Wong, et al.
Published: (2001)
by: Mohd Hassan Wong , Fadhli Wong, et al.
Published: (2001)
Discovery of fevipiprant (NVP-QAW039), a potent and selective DP2 receptor antagonist for treatment of asthma
by: Sandham, David A., et al.
Published: (2017)
by: Sandham, David A., et al.
Published: (2017)
Similar Items
-
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010) -
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010) -
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013) -
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)