Quantum Key Distribution: Simulation and Characterizations

All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks). Therefore, nowadays Quantum Key Distribution (QKD) promises a s...

Full description

Saved in:
Bibliographic Details
Published in:Procedia computer science Vol. 65; pp. 701 - 710
Main Authors: Jasim, Omer K., Abbas, Safia, El-Horbaty, El-Sayed M., Salem, Abdel-Badeeh M.
Format: Journal Article
Language:English
Published: Elsevier B.V 2015
Subjects:
ISSN:1877-0509, 1877-0509
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first