Specific to security issues concerning identity authentication of mobile applications, a quantum identity authentication protocol based on optical transmission and face recognition is put forward in this paper with consideration of the unconditional security characteristic of quantum key. As for this protocol, optical transmission technology is adopted to acquire quantum key and identity authentication encrypted by quantum key can thus be realized, for which key feature points of face image and user password serve as dual authentication factors. Experimental result and security analysis indicate that this protocol can resist illegal attack and ensure security of identity authentication of mobile applications, which also has great operating ...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Quantum cryptography is a new method of communication offering the security of the inviolability by ...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...
Specific to security issues concerning identity authentication of mobile applications, a quantum ide...
The quantum communication technology is an evolving design which connects multiple quantum enabled d...
To guarantee information security in communication, quantum identity authentication plays a key role...
A successful implementation of any secure communication protocols requires the identity authenticati...
AbstractEnhancement of security and privacy in mobile data centers is challengeable with efficient s...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
In this paper, we propose a quantum user authentication protocol with single photon based on short s...
Abstract. After 20 years of basic research, quantum cryptography has meanwhile led to first commerci...
The today\u2019s technology allows us to design simple quantum cryptography circuits embeddable in m...
The authentication bugs of SIM cards in Global System for Mobile (GSM) have led us to write the new ...
Abstract: In this paper we provide a quantum authentication protocol. The two parties share a sequen...
Background: A new approach for the implementation of Quantum Cryptography is proposed in this paper....
Problem statement: In previous researches, we investigated the security of communication channels, w...
Quantum cryptography is a new method of communication offering the security of the inviolability by ...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...
Specific to security issues concerning identity authentication of mobile applications, a quantum ide...
The quantum communication technology is an evolving design which connects multiple quantum enabled d...
To guarantee information security in communication, quantum identity authentication plays a key role...
A successful implementation of any secure communication protocols requires the identity authenticati...
AbstractEnhancement of security and privacy in mobile data centers is challengeable with efficient s...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
In this paper, we propose a quantum user authentication protocol with single photon based on short s...
Abstract. After 20 years of basic research, quantum cryptography has meanwhile led to first commerci...
The today\u2019s technology allows us to design simple quantum cryptography circuits embeddable in m...
The authentication bugs of SIM cards in Global System for Mobile (GSM) have led us to write the new ...
Abstract: In this paper we provide a quantum authentication protocol. The two parties share a sequen...
Background: A new approach for the implementation of Quantum Cryptography is proposed in this paper....
Problem statement: In previous researches, we investigated the security of communication channels, w...
Quantum cryptography is a new method of communication offering the security of the inviolability by ...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...