Skip to content
VuFind
Advanced
  • Search
  • The decoy state method in quan...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
The decoy state method in quantum key distribution

The decoy state method in quantum key distribution

Bibliographic Details
Main Authors: Ali, Sellami, Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza
Format: Book Chapter
Language:English
Published: IIUM Press 2011
Subjects:
TK Electrical engineering. Electronics Nuclear engineering
Online Access:http://irep.iium.edu.my/24092/
http://irep.iium.edu.my/24092/
http://irep.iium.edu.my/24092/1/chp10.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://irep.iium.edu.my/24092/
http://irep.iium.edu.my/24092/
http://irep.iium.edu.my/24092/1/chp10.pdf

Similar Items

  • Quantum key distribution protocols
    by: Ali, Sellami, et al.
    Published: (2011)
  • Decoy state quantum key distribution
    by: Ali, Sellami, et al.
    Published: (2009)
  • Quantum key distribution using decoy state protocol
    by: Ali, Sellami, et al.
    Published: (2009)
  • A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
    by: Al-Khateeb, Khalid A. Saeed, et al.
    Published: (2010)
  • Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
    by: Majeed, Mohammed Munther A., et al.
    Published: (2010)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips