Simulation of Bennet and Brassard 84 protocol with Eve's attacks
A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. The simulation is divided into two categories which are without security attacks scenario and with several attacks scenario that consists of Intercept and Resend and sent new qubits. The simulation results meet...
| Main Authors: | Mohamed Halip, Nor Hafizah, Mokhtar, M., Buhari, A. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/55951/ http://psasir.upm.edu.my/id/eprint/55951/1/Simulation%20of%20Bennet%20and%20Brassard%2084%20protocol%20with%20Eve%27s%20attacks.pdf |
Similar Items
The probe attack on the Bennett-Brassard 1984 protocol in the presences of noisy amplitude damping channel
by: Abdel-Hameed, Hossam Farouk, et al.
Published: (2017)
by: Abdel-Hameed, Hossam Farouk, et al.
Published: (2017)
Implemetation of BB84 quantum key distribution protocol’s with attacks.
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
Eve (at Brisbane Powerhouse) 2017
by: Brown Ash, Margi, et al.
Published: (2017)
by: Brown Ash, Margi, et al.
Published: (2017)
Strategic Issues & Recommendations for The Eve Appeal
by: Marler, Christine
Published: (2011)
by: Marler, Christine
Published: (2011)
Detecting eve in communication with continuous-variable Einstein-Podolsky-Rosen correlations
by: Messikh, Azeddin
Published: (2007)
by: Messikh, Azeddin
Published: (2007)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
Shahidan terima 84 pencalonan
Published: (2009)
Published: (2009)
Event Volunteering Evaluation (EVE) Project: Challenging the Methodological Limits of Event Volunteering Research
by: Lockstone-Binney, L., et al.
Published: (2014)
by: Lockstone-Binney, L., et al.
Published: (2014)
The creation of Adam and Eve in the Bible and the Qur'an: a comparative analysis of its theological implications
by: Wan Yusuf, Wan Sabri, et al.
Published: (2010)
by: Wan Yusuf, Wan Sabri, et al.
Published: (2010)
Registration open for pre-conference workshop on eve of ICCS event, 08 July 2013
by: The Borneo Post Online
Published: (2013)
by: The Borneo Post Online
Published: (2013)
Exploiting pyrolysis protocols on BTDA‐TDI/MDI (P84) polyimide/nanocrystalline cellulose carbon membrane for gas separations
by: Norazlianie, Sazali, et al.
Published: (2019)
by: Norazlianie, Sazali, et al.
Published: (2019)
Napkin disposal unit: Eve – Women’s discreet solution (Sanitary napkin disposal unit for home use)
by: Husin, Muhammad, et al.
Published: (2010)
by: Husin, Muhammad, et al.
Published: (2010)
Populariti Adenan melonjak sehingga 84 peratus
by: The Borneo, Post
Published: (2016)
by: The Borneo, Post
Published: (2016)
Road accidents, one death every 84 minutes
by: Makkal Osai
Published: (2022)
by: Makkal Osai
Published: (2022)
Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment.
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
The effectiveness of using poetry writing activities to teach parts of speech in Malaysian secondary language classroom / Gloria Eve Jikim
by: Jikim, Gloria Eve
Published: (2014)
by: Jikim, Gloria Eve
Published: (2014)
Simulation System To Educate People On Phivisp Attack
by: Salman, Khairul Anuar
Published: (2023)
by: Salman, Khairul Anuar
Published: (2023)
8.4 GHz VLBI observations of SN 2004et in NGC 6946
by: Marti-Vidal, I., et al.
Published: (2007)
by: Marti-Vidal, I., et al.
Published: (2007)
A WGS84-AHD Profile over the Darling Fault: Western Australia
by: Friedlieb, Owen, et al.
Published: (1997)
by: Friedlieb, Owen, et al.
Published: (1997)
Production Of Prodigiosin By Serratia Marcescens Ibrl Usm84 For Lipstick Formulation
by: Nazari, Teh Faridah
Published: (2018)
by: Nazari, Teh Faridah
Published: (2018)
Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
An efficient modeling and simulation of quantum key distribution protocols using OptiSystem™
by: Buhari, Abudhahir, et al.
Published: (2012)
by: Buhari, Abudhahir, et al.
Published: (2012)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
Utilizing first hop redundancy protocol to mitigate the effects of denial-of-service attack
by: Khong, Johnson
Published: (2018)
by: Khong, Johnson
Published: (2018)
The influence of coating-carbonization cycles toward P84 co-polyimide/nanocrystalline cellulose
by: Norazlianie, Sazali, et al.
Published: (2019)
by: Norazlianie, Sazali, et al.
Published: (2019)
84 masjid di Pahang dibenar solat Subuh berjemaah, solat Jumaat
by: Nik Amirul Mu'min, Nik Min
Published: (2020)
by: Nik Amirul Mu'min, Nik Min
Published: (2020)
Relation of Alcohol Consumption to Risk of Heart Failure in Patients Aged 65 to 84 Years With Hypertension
by: Sahle, B., et al.
Published: (2018)
by: Sahle, B., et al.
Published: (2018)
Active control of base pressure in suddenly expanded flow for area ratio 4.84
by: Ali Baig, Maughal Ahmed, et al.
Published: (2012)
by: Ali Baig, Maughal Ahmed, et al.
Published: (2012)
Effect of mach number in a suddenly expanded flow for area ratio 4.84
by: Baig, Maugal Ahmed Ali, et al.
Published: (2012)
by: Baig, Maugal Ahmed Ali, et al.
Published: (2012)
P84 Co-Polyimide-based Tubular Carbon Membrane: Effect of Pyrolysis Temperature
by: Norazlianie, Sazali, et al.
Published: (2019)
by: Norazlianie, Sazali, et al.
Published: (2019)
P84 co-polyimide-based tubular carbon membrane: effect of pyrolysis temperature
by: Sazali, N., et al.
Published: (2019)
by: Sazali, N., et al.
Published: (2019)
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
Single longitudinal mode fiber laser with integration of gallium-erbium co-doped fiber
by: Mohamed Halip, Nor Hafizah
Published: (2016)
by: Mohamed Halip, Nor Hafizah
Published: (2016)
Development of Simulation Environment for Agent Interaction Protocol
by: Latif, N.A., et al.
Published: (2010)
by: Latif, N.A., et al.
Published: (2010)
Christmas is not just for Christmas: an exploration of the Christmas story and its meaning, as told by members of the congregation at the Festival of Nine Lessons and Carols held at York Minster on Christmas Eve 2007
by: Phillips, Rachel
Published: (2011)
by: Phillips, Rachel
Published: (2011)
Oxygen separation through p84 copolyimide/nanocrystalline cellulose carbon membrane: Impact of heating rates
by: Norazlianie, Sazali, et al.
Published: (2019)
by: Norazlianie, Sazali, et al.
Published: (2019)
P84 Co-Polyimide Based-Tubular Carbon Membrane: Effect of Heating Rates on Helium Separations
by: Norazlianie, Sazali, et al.
Published: (2018)
by: Norazlianie, Sazali, et al.
Published: (2018)
A wide and collimated radio jet in 3C84 on the scale of a few hundred gravitational radii
by: Giovannini, G., et al.
Published: (2018)
by: Giovannini, G., et al.
Published: (2018)
Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
by: Mina, Malekzadeh, et al.
Published: (2011)
by: Mina, Malekzadeh, et al.
Published: (2011)
Similar Items
-
The probe attack on the Bennett-Brassard 1984 protocol in the presences of noisy amplitude damping channel
by: Abdel-Hameed, Hossam Farouk, et al.
Published: (2017) -
Implemetation of BB84 quantum key distribution protocol’s with attacks.
by: Muhammad, Nur Atiqah, et al.
Published: (2009) -
Eve (at Brisbane Powerhouse) 2017
by: Brown Ash, Margi, et al.
Published: (2017) -
Strategic Issues & Recommendations for The Eve Appeal
by: Marler, Christine
Published: (2011) -
Detecting eve in communication with continuous-variable Einstein-Podolsky-Rosen correlations
by: Messikh, Azeddin
Published: (2007)