The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutio...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...
AbstractEnhancement of security and privacy in mobile data centers is challengeable with efficient s...
Authentication is one of the security services that ensures sufficient security of the system by ide...
Problem statement: In previous researches, we investigated the security of communication channels, w...
The today\u2019s technology allows us to design simple quantum cryptography circuits embeddable in m...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
Abstract. After 20 years of basic research, quantum cryptography has meanwhile led to first commerci...
The authentication bugs of SIM cards in Global System for Mobile (GSM) have led us to write the new ...
Abstract — Quantum cryptography offers a way of key agreement, which is unbreakable by any external ...
Specific to security issues concerning identity authentication of mobile applications, a quantum ide...
Background: A new approach for the implementation of Quantum Cryptography is proposed in this paper....
Quantum Cryptography (QC) is the emerging field of the current world and the potential player of the...
Abstract ⎯ It is well known that wireless networks have become one of the most important part used c...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
A successful implementation of any secure communication protocols requires the identity authenticati...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...
AbstractEnhancement of security and privacy in mobile data centers is challengeable with efficient s...
Authentication is one of the security services that ensures sufficient security of the system by ide...
Problem statement: In previous researches, we investigated the security of communication channels, w...
The today\u2019s technology allows us to design simple quantum cryptography circuits embeddable in m...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
Abstract. After 20 years of basic research, quantum cryptography has meanwhile led to first commerci...
The authentication bugs of SIM cards in Global System for Mobile (GSM) have led us to write the new ...
Abstract — Quantum cryptography offers a way of key agreement, which is unbreakable by any external ...
Specific to security issues concerning identity authentication of mobile applications, a quantum ide...
Background: A new approach for the implementation of Quantum Cryptography is proposed in this paper....
Quantum Cryptography (QC) is the emerging field of the current world and the potential player of the...
Abstract ⎯ It is well known that wireless networks have become one of the most important part used c...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
A successful implementation of any secure communication protocols requires the identity authenticati...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...
AbstractEnhancement of security and privacy in mobile data centers is challengeable with efficient s...
Authentication is one of the security services that ensures sufficient security of the system by ide...