Secured shared authentication key with two-way clock synchronization over multiparty Quantum Communication (KIV)
Authentication is a security function that ensures the system’s proper security by identifying and verifying users. Despite the advantages of quantum computers, it is still difficult to enforce authentication on behalf of multiple quantum channel users without the involvement of a third party becaus...
| Main Authors: | Azahari, Nur Shahirah, Harun, Nur Ziadah, Ramli, Sofia Najwa, Zukarnain, Zuriati Binti Ahmad |
|---|---|
| Format: | Article |
| Published: |
Springer Nature
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/110041/ |
Similar Items
Quantum identity authentication for non-entanglement multiparty communication: A review, state of art and future directions
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Quantum key distribution for 5G networks: a review, state of art and future directions
by: Adnan, Mohd Hirzi, et al.
Published: (2022)
by: Adnan, Mohd Hirzi, et al.
Published: (2022)
Impact of the deafness problem on clock synchronization in a wireless sensor network
by: Al-Mekhlafi, Zeyad Ghaleb, et al.
Published: (2014)
by: Al-Mekhlafi, Zeyad Ghaleb, et al.
Published: (2014)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Opticalb Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Energy-efficient clock synchronization technique for IoT
by: Onyeka, Ezema Ernest
Published: (2019)
by: Onyeka, Ezema Ernest
Published: (2019)
Energy efficient on aspect of clock synchronization in a wireless sensor network
by: Al-Mekhlafi, Zeyad Ghaleb, et al.
Published: (2014)
by: Al-Mekhlafi, Zeyad Ghaleb, et al.
Published: (2014)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014)
by: Shamsul Shaari, Jesni
Published: (2014)
Quantum Cryptography Experiment using Optical Devices
by: Azahar, Nur Shahirah, et al.
Published: (2023)
by: Azahar, Nur Shahirah, et al.
Published: (2023)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
Implementation of two-way free space quantum key distribution
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Hybrid M-ary in braided single stage approach for multiphoton quantum secure direct communication protocol
by: Harun, Nur Ziadah, et al.
Published: (2019)
by: Harun, Nur Ziadah, et al.
Published: (2019)
Hybrid command shaping and PD controller for sway suppression of rotary crane system -- Thesis [KIV]
by: WAN ABDULLAH, WAN NUR AAINA AYUNI
Published: (2016)
by: WAN ABDULLAH, WAN NUR AAINA AYUNI
Published: (2016)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Checking noise correlations for safer two-way quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2014)
by: Shamsul Shaari, Jesni, et al.
Published: (2014)
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
Implemetation of BB84 quantum key distribution protocol’s with attacks.
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
An efficient modeling and simulation of quantum key distribution protocols using OptiSystem™
by: Buhari, Abudhahir, et al.
Published: (2012)
by: Buhari, Abudhahir, et al.
Published: (2012)
A single photon quantum user bi-directional authentication scheme over noiseless channel
by: Buhari, Abudhahir, et al.
Published: (2012)
by: Buhari, Abudhahir, et al.
Published: (2012)
A method for authentication of multi-user key management using quantum key distribution over noiseless channel
by: Buhari, Abudhahir
Published: (2015)
by: Buhari, Abudhahir
Published: (2015)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
MQC-MB: multiphoton quantum communication using multiple-beam concept in free space optical channel
by: Harun, Nur Ziadah, et al.
Published: (2021)
by: Harun, Nur Ziadah, et al.
Published: (2021)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
The Effects of Brand Strategy and Design Innovation on the Brand Performance of the Malaysian Furniture Firms -- UTM Thesis KIV
by: Tamyez, Puteri Fadzline
Published: (2014)
by: Tamyez, Puteri Fadzline
Published: (2014)
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
The clock is ticking
by: Zawawi, Dahlia, et al.
Published: (2009)
by: Zawawi, Dahlia, et al.
Published: (2009)
A secure data authentication in wireless body area network
for health monitoring using electrocardiogram-based
key agreement
by: Ramli, Sofia Najwa, et al.
Published: (2016)
by: Ramli, Sofia Najwa, et al.
Published: (2016)
Similar Items
-
Quantum identity authentication for non-entanglement multiparty communication: A review, state of art and future directions
by: Azahari, Nur Shahirah, et al.
Published: (2023) -
QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019) -
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007) -
Quantum key distribution for 5G networks: a review, state of art and future directions
by: Adnan, Mohd Hirzi, et al.
Published: (2022) -
Impact of the deafness problem on clock synchronization in a wireless sensor network
by: Al-Mekhlafi, Zeyad Ghaleb, et al.
Published: (2014)