Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quantum cryptography
biblio
New Quantum Secret Sharing Protocol Using Entangled Qutrits
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
Communication channels
quantum computing security
security amplification
quantum secure direct communication
quantum secret sharing protocol
Quantum secret sharing
quantum memory
ping-pong protocol
Optimized production technology
entangled qutrits
entangled qubits
eavesdropping attack
detection of eavesdropping
Scalability
Quantum entanglement
Predictive Metrics
quantum cryptography
quantum computing
Cryptography
composability
pubcrawl
Resiliency
eavesdropping
Protocols
telecommunication security
biblio
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
promptly developed areas
document circulation
extended classification
human life
important directions
information confidentiality
information transactions
loophole of the device
mini-computer
non-coherent attack
open communication networks
cryptographic methods
quantum cryptography methods
quantum cryptography systems
quantum cryptosystems
quantum hacking
quantum key distribution equipment
reliable information security technology
reliable security
specific quantum systems
traditional cryptography methods
quantum computing security
Reliability
Computer crime
Scalability
data privacy
telecommunication security
Protocols
Resiliency
pubcrawl
composability
classification
Handheld computers
security of data
quantum cryptography
quantum computing
Predictive Metrics
information technologies
Quantum Key Distribution
quantum protocols
abstract eavesdropper model
coherent attack
commercially available quantum key distribution system
biblio
Quantum Services Architecture in Softwarized Infrastructures
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
quantum technologies
mature development
network integration
open Interfaces.
QKD systems
quantum principles
quantum random number generators
quantum resources
Quantum services architecture
Quantum Switch
quantum switches
Madrid Quantum Network
quantum-safe methods
SDN quantum node architecture
secure bit streams
service automation
single network element
software-defined networking architectures
softwarized infrastructures
specific network cards
Telecommunication standards
quantum computing security
quantum cryptography
security
Protocols
computer architecture
software defined networking
Resiliency
pubcrawl
composability
standards
software-defined networking
quantum computing
Scalability
quality of service
random number generation
security infrastructure
Switches
Predictive Metrics
Quantum Key Distribution
current networking technology
forward key material
key exchange primitive
logically centralized SDN controller
biblio
Demonstrating Quantum Advantage in Security and Efficiency with Practical Photonic Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
entangled resources
quantum computing security
telecommunication network infrastructures
secret key distribution
quantum optics
quantum networks
quantum money
Quantum entanglement
quantum advantage
practical photonic systems
Photonics
photonic systems
maximal security guarantees
future quantum-safe communications
Scalability
central quantum network protocols
quantum communication
network environment
Predictive Metrics
quantum cryptography
quantum computing
composability
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Cryptography
biblio
Quantum Electronic Generator of Random Numbers for Information Security in Automatic Control Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Random walks
quantum computing
quantum computing security
quantum cryptography
quantum electronic generator
quantum random numbers generator
random number generation
random numbers
random numbers application
Random sequences
pubcrawl
Reliability
resilience
Resiliency
Scalability
Scientific Computing Security
semiconductor electronic components
statistical testing
tunneling
tunnelling
Cryptography
automatic control systems
communication lines
composability
Compositionality
computer systems
computer units
computing nodes
control system security
cryptographic keys
automated driving systems
electron-quantum generator
electrons tunneling
Generators
information security
neural nets
NIST
NIST statistical tests
Predictive Metrics
biblio
Reinforcement Learning Based Multi-Tenant Secret-Key Assignment for Quantum Key Distribution Networks
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
quantum cryptography
predictability
Security Heuristics
tenant-request blocking probability
quantum key distribution networks
online multitenant secret-key assignment algorithm
Benchmark testing
Heuristic algorithms
Artificial Neural Networks
Scalability
Training
Reinforcement learning
resource management
pubcrawl
Resiliency
learning (artificial intelligence)
security
biblio
Quantum Cryptography on IBM QX
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
quantum key distribution protocol
pubcrawl
quantum
quantum bit commitment
quantum computation
quantum computers
quantum computing security
quantum computing
quantum cryptography
Quantum Key Distribution
Protocols
quantum machines
quantum protocols
Qubit
Resiliency
Scalability
security shifts
statistical analysis
telecommunication security
theoretical cryptography
distributed keys
BB84 protocol
BB84 theoretical expected results
classical computers
composability
Compositionality
computational power
Cryptographic Protocols
cryptographic solutions
Cryptography
BB84
electronic transactions
encoding functions
existing classical algorithms 100% breakable
IBM QX software
intended parties
Logic gates
mathematical complexity
practical implementation results
Predictive Metrics
biblio
A High-Speed Key Management Method for Quantum Key Distribution Network
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
quantum key distribution network
one-time pad tunnel manager
Photonics
private key cryptography
pubcrawl
public key cryptography
QKD key generation
QKD network
quantum cryptography
Quantum Key Distribution
one-time pad
Receivers
resilience
Resiliency
Scalability
secure communication
transparent encryption link
unconditional secure communication
Web API
high-speed key management method
application communication
application key consumption
application program interfaces
data communication
eavesdropping
encryption
encryption key sharing
global key manager
adjacent nodes
high-speed method
high-speed QKD system
Human behavior
Human Factors
key management
local key manager
Metrics
network systems
biblio
Image Encryption Based on Quantum-Assisted DNA Coded System
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
quantum
Image Processing
information security
information stockpiling
Metrics
Predictive Metrics
privacy
Protocols
pubcrawl
image encryption
quantum channel
quantum cryptography
quantum-assisted DNA coded system
resilience
Resiliency
traditional encryption plans
unauthorised client
DNA cryptography
2D logistic maps
BB84 protocol
biocomputing
chaotic communication
Chaotic maps
Ciphers
Correlation
DNA
1D logistic maps
DNA encoding
DNA subtraction
encrypted image DNA decoding
encryption
Entropy
Histograms
Human behavior
biblio
A Dynamic DNA for Key-Based Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 10:50am
geographical cryptography
traditional cryptographic approaches
text file
Resiliency
resilience
Reliability
Receivers
quantum cryptography
pubcrawl
privacy
plain text characters
Metrics
key-based cryptography
image file
Human behavior
audio file
encryption
encoding
effective cryptographic systems
dynamic DNA
DNA sequences
DNA digital coding
DNA cryptography
DNA
decryption
Cryptography
Ciphers
biometrics (access control)
biometric cryptography
biocomputing
« first
‹ previous
1
2
3
4
5
6
next ›
last »