Search Results - Strings (band)
-
1
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
Published 2010“…The essential part of the protocol depends on sending a string of random characters from sender to receiver. …”
Get full text
Get full text
-
2
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
Published 2010“…The essential part of the protocol depends on sending a string of random characters from sender to receiver. …”
Get full text
Get full text
-
3
Front-end design of low power radio access point for radio over fiber technology
Published 2007“…Whereas wiring a business, home, or school often requires stringing many cables through walls and ceilings, wireless networking offers the ability to reduce - or eliminate entirely - the stringing of cables. …”
Get full text
Get full text
-
4
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
Published 2010“…It employed an out-of-band authentication methodology based on quantum theory, which uses entangled pairs of photons. …”
Get full text
Get full text
-
5
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
Published 2010“…It employed an out-of-band authentication methodology based on quantum theory, which uses entangled pairs of photons. …”
Get full text
Get full text
-
6
Physicochemical parameters and microbiological quality of water from local fish farm
Published 2013“…The phylogenetic tree was constructed based on the DNA banding pattern from the (GTG)5 PCR. Suspicious species were identified using API 20 E Diagnostic Kit. …”
Get full text
Get full text