Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
BB84
biblio
The Role of Quantum and Post-Quantum Techniques in Wireless Network Security - Status, Challenges and Future Trends
Submitted by grigby1 on Thu, 07/14/2022 - 2:43pm
pubcrawl
Scalability
Protocols
Computers
quantum computing
wireless networks
quantum cryptography
Market research
data communication
BB84
E91
Post-quantum
QKD.
quantum
quantum computing security
biblio
Hyper Secure Cognitive Radio Communications in an Internet of Space Things Network Based on the BB84 Protocol
Submitted by aekwall on Mon, 03/15/2021 - 11:03am
Internet of space things
Tungsten
telecommunication security
Task Analysis
Space vehicles
Space Things network
Satellite broadcasting
Resiliency
quantum cryptography
pubcrawl
Protocols
probability
BB84
internet
hyper secure Cognitive Radio communications
geocentric orbital satellites
Cryptographic Protocols
constant thread
collaborative manner
Cognitive Radio Security
cognitive radio
Bennet-Brassard
BB84 protocol
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 12:47pm
digital signatures
secure cloud data communication
Receivers
Quantum Key Distribution
quantum computing
public key cryptography
malicious client
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature
elliptic curve
Elliptic curve cryptography
data exchange
Cryptographic Protocols
Cloud Computing
BB84
authentication
Metrics
Resiliency
Scalability
pubcrawl
biblio
Quantum Cryptography on IBM QX
Submitted by grigby1 on Wed, 03/04/2020 - 3:13pm
quantum key distribution protocol
pubcrawl
quantum
quantum bit commitment
quantum computation
quantum computers
quantum computing security
quantum computing
quantum cryptography
Quantum Key Distribution
Protocols
quantum machines
quantum protocols
Qubit
Resiliency
Scalability
security shifts
statistical analysis
telecommunication security
theoretical cryptography
distributed keys
BB84 protocol
BB84 theoretical expected results
classical computers
composability
Compositionality
computational power
Cryptographic Protocols
cryptographic solutions
Cryptography
BB84
electronic transactions
encoding functions
existing classical algorithms 100% breakable
IBM QX software
intended parties
Logic gates
mathematical complexity
practical implementation results
Predictive Metrics