The decoy state method in quantum key distribution
Main Authors: | Ali, Sellami, Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
IIUM Press
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/24092/ http://irep.iium.edu.my/24092/ http://irep.iium.edu.my/24092/1/chp10.pdf |
Similar Items
-
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011) -
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009) -
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009) -
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)