|
|
|
Georgios M. Nikolopoulos and Marc Fischlin
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used...
ver más
|
|
|
|
|
|
|
Shuai Zhang, Heng Wang, Yan Pan, Yun Shao, Tao Zhang, Wei Huang, Yang Li and Bingjie Xu
Dual-polarization division multiplexing (DPDM) is considered to be a potential method to boost the secure key rate (SKR) of the continuous-variable quantum key distribution (CV-QKD) system. In this article, we propose a pilot alternately assisted local l...
ver más
|
|
|
|
|
|
|
Gabriel M. Carral, Jesús Liñares, Eduardo F. Mateo and Xesús Prieto-Blanco
We analyze autocompensation possibilities in entanglement-based QKD protocols. In particular, we study the seminal BBM92 protocol and find that an autocompensating technique is possible, although with severe limitations. This prompts the introduction of ...
ver más
|
|
|
|
|
|
|
Nathan K. Long, Robert Malaney and Kenneth J. Grant
Continuous-variable quantum key distribution (CV-QKD) shows potential for the rapid development of an information-theoretic secure global communication network; however, the complexities of CV-QKD implementation remain a restrictive factor. Machine learn...
ver más
|
|
|
|
|
|
|
Ignazio Pedone and Antonio Lioy
Quantum Key Distribution (QKD) represents a reasonable countermeasure to the advent of Quantum Computing and its impact on current public-key cryptography. So far, considerable efforts have been devoted to investigate possible application scenarios for Q...
ver más
|
|
|
|
|
|
|
Weiqing Tao, Mengyu Ma, Chen Fang, Wei Xie, Ming Ding, Dachao Xu and Yangqing Shi
The wide area measurement system (WAMS) based on synchronous phasor measurement technology has been widely used in power transmission grids to achieve dynamic monitoring and control of the power grid. At present, to better realize real-time situational a...
ver más
|
|
|
|
|
|
|
Xinchao Ruan, Hang Zhang, Wei Zhao, Xiaoxue Wang, Xuan Li and Ying Guo
We investigate the optical absorption and scattering properties of four different kinds of seawater as the quantum channel. The models of discrete-modulated continuous-variable quantum key distribution (CV-QKD) in free-space seawater channel are briefly ...
ver más
|
|
|
|
|
|
|
Pramod T. C., Thejas G. S., S. S. Iyengar and N. R. Sunitha
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breac...
ver más
|
|
|
|
|
|
|
Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Ryan Engle, Colin McLaughlin and Gerald Baumgartner
Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keying material for cryptographic purposes. To date, several commercially viable decoy state enabled QKD systems have been successfully demonstrated and show ...
ver más
|
|
|
|
|
|
|
Chun Zhou, Yu Zhou, Yangbin Xu, Yang Wang, Yifei Lu, Musheng Jiang, Xiaoxu Zhang and Wansu Bao
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2-dec...
ver más
|
|
|
|
|
|
|
Mohd Hirzi Adnan, Zuriati Ahmad Zukarnain and Nur Ziadah Harun
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this...
ver más
|
|
|
|
|
|
|
Yaxi Pan, Ling Zhang and Duan Huang
As the existence of non-zero reflection coefficients in the real component of continuous-variable quantum key distribution (CV-QKD) systems, Eve can probe the system by sending the bright light pulses into Alice?s set-up. With the analysis of back-reflec...
ver más
|
|
|
|
|
|
|
Menachem Domb and Guy Leshem
|
|
|
|
|
|
|
Mi-Jung Bae and Young-Seuk Park
Freshwater organisms are facing threats from various natural and anthropogenic disturbances. Using data sampled on a nationwide scale from streams in South Korea, we identified the crucial environmental factors influencing the distribution and abundance ...
ver más
|
|
|
|
|
|
|
Seyed Pouria Zahraei
Pág. 21 - 27
Matrix schemes of preliminary key distribution are considered in the paper, they are constructed on the basis of the Blom scheme. Such schemes are used, in particular, in wireless sensor networks and allow effectively changing secret key parameters of a ...
ver más
|
|
|
|
|
|
|
David M. Makori, Ayuka T. Fombong, Elfatih M. Abdel-Rahman, Kiatoko Nkoba, Juliette Ongus, Janet Irungu, Gladys Mosomtai, Sospeter Makau, Onisimo Mutanga, John Odindi, Suresh Raina and Tobias Landmann
|
|
|
|
|
|
|
Magda Zafeiropoulou, Ioannis Mentis, Nenad Sijakovic, Aleksandar Terzic, Georgios Fotis, Theodoros I. Maris, Vasiliki Vita, Emmanouil Zoulias, Vladan Ristic and Lambros Ekonomou
With the increase in the complexity of the topology of transmission and distribution systems, associated with the predictability in the management of the dispatch of prosumers, new techniques for state estimation, and application of metaheuristics are ne...
ver más
|
|
|
|
|
|
|
Salekul Islam
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protoco...
ver más
|
|
|
|
|
|
|
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner...
ver más
|
|
|
|
|
|
|
Xianliang Wang, Jin He, Mingyue Bai, Lei Liu, Shang Gao, Kun Chen and Haiyang Zhuang
The traffic-induced soil compaction in the field has gradually become an important constraint to sustainable agricultural development. A field experiment was conducted to acquire the stress transmitted caused by multiple passes with different types of tr...
ver más
|
|
|
|