Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „QKDN“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "QKDN" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "QKDN"
Jiang, Dong, Yuanyuan Chen, Xuemei Gu, Ling Xie und Lijun Chen. „Efficient and universal quantum key distribution based on chaos and middleware“. International Journal of Modern Physics B 31, Nr. 02 (18.01.2017): 1650264. http://dx.doi.org/10.1142/s0217979216502647.
Der volle Inhalt der QuelleGyongyosi, Laszlo, Laszlo Bacsardi und Sandor Imre. „A Survey on Quantum Key Distribution“. Infocommunications journal, Nr. 2 (2019): 14–21. http://dx.doi.org/10.36244/icj.2019.2.2.
Der volle Inhalt der QuellePOPPE, A., M. PEEV und O. MAURHART. „OUTLINE OF THE SECOQC QUANTUM-KEY-DISTRIBUTION NETWORK IN VIENNA“. International Journal of Quantum Information 06, Nr. 02 (April 2008): 209–18. http://dx.doi.org/10.1142/s0219749908003529.
Der volle Inhalt der QuelleTsai, Chia-Wei, Chun-Wei Yang, Jason Lin, Yao-Chung Chang und Ruay-Shiung Chang. „Quantum Key Distribution Networks: Challenges and Future Research Issues in Security“. Applied Sciences 11, Nr. 9 (22.04.2021): 3767. http://dx.doi.org/10.3390/app11093767.
Der volle Inhalt der QuellePile, David F. P. „Twin-field QKD“. Nature Photonics 12, Nr. 7 (28.06.2018): 377. http://dx.doi.org/10.1038/s41566-018-0209-1.
Der volle Inhalt der QuelleKhan, Imran, Bettina Heim, Andreas Neuzner und Christoph Marquardt. „Satellite-Based QKD“. Optics and Photonics News 29, Nr. 2 (01.02.2018): 26. http://dx.doi.org/10.1364/opn.29.2.000026.
Der volle Inhalt der QuelleDjordjevic, Ivan B. „Hybrid QKD Protocol Outperforming Both DV- and CV-QKD Protocols“. IEEE Photonics Journal 12, Nr. 1 (Februar 2020): 1–8. http://dx.doi.org/10.1109/jphot.2019.2946910.
Der volle Inhalt der QuelleXu, Huaxing, Shaohua Wang, Yang Huang, Yaqi Song und Changlei Wang. „A Self-Stabilizing Phase Decoder for Quantum Key Distribution“. Applied Sciences 10, Nr. 5 (01.03.2020): 1661. http://dx.doi.org/10.3390/app10051661.
Der volle Inhalt der QuelleWang, Hua, Yongli Zhao und Avishek Nag. „Quantum-Key-Distribution (QKD) Networks Enabled by Software-Defined Networks (SDN)“. Applied Sciences 9, Nr. 10 (21.05.2019): 2081. http://dx.doi.org/10.3390/app9102081.
Der volle Inhalt der QuelleTrizna, Anastasija, und Andris Ozols. „An Overview of Quantum Key Distribution Protocols“. Information Technology and Management Science 21 (14.12.2018): 37–44. http://dx.doi.org/10.7250/itms-2018-0005.
Der volle Inhalt der QuelleDissertationen zum Thema "QKDN"
Širjov, Jakub. „Testovací polygon pro kvantovou distribuci klíčů“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442371.
Der volle Inhalt der QuelleGariano, John, und Ivan B. Djordjevic. „PPLN-waveguide-based polarization entangled QKD simulator“. SPIE-INT SOC OPTICAL ENGINEERING, 2017. http://hdl.handle.net/10150/626494.
Der volle Inhalt der QuelleLydersen, Lars Vincent van De Wiel. „Security of QKD-systems with detector efficiency mismatch“. Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9808.
Der volle Inhalt der QuelleThe rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is called quantum key distribution (QKD). In theory the key exchange can be made completely secure. Real QKD implementations however, has numerous imperfections. Luckily one has also been able to prove the security of QKD with a large variety of imperfections. The field of QKD has matured over the recent years, and it has now reached commercial applications with photons as the quantum bits, and optical fibers as the quantum channel. Today there are at least three commercial vendors of QKD-systems. We live in the times of quantum hacking. Researchers has begun the task of breaking the security of QKD-systems. Many new imperfections has been discovered, some of which might be used to break the security of QKD. This thesis is a study of the detector efficiency mismatch loophole. Most QKD-systems require two detectors, and it is virtually impossible to make two identical detectors with the exact same efficiency. What is worse, it turns out that the eavesdropper can often control the relative efficiencies of the two detectors trough some domain, for instance by controlling the timing, the frequency or the spacial mode of the photons. This can in turn be used by the eavesdropper to gain information about the secret key. Previously the best known attack would compromise security if the detector efficiency mismatch of about 1:15. Here the current attacks on systems with detector efficiency mismatch are improved to compromise security for a mismatch of about 1:4. This is less than the mismatch found in a commercial QKD-system, so the attack could in principle be used to eavesdrop on this QKD-system. One might try to close the loophole by modifying the implementation. One suggestion is the four state Bob. The problem is that this patch will in turn open other loopholes, and one of these loopholes reopen the detector efficiency mismatch loophole. One can remove Eves information about the key by doing a sufficient amount of extra privacy amplification. Here a general security bound is presented, quantifying the required amount of extra privacy amplification to remove Eve's information about the key. The proof is more general than the previous security proof, and is valid for any basis dependent, possibly lossy, linear optical imperfections in the channel and receiver/detectors. Since this is more realistic assumptions for a QKD-implementation, the proof represents a major step of closing the loophole in real devices.
Nishat, Md Rezaul Karim. „DESIGN OF NANOSTRUCTURED ENTANGLED PHOTON PAIR GENERATOR FOR QKD APPLICATIONS“. OpenSIUC, 2018. https://opensiuc.lib.siu.edu/dissertations/1580.
Der volle Inhalt der QuelleGariano, John, und Ivan B. Djordjevic. „Multimode entanglement assisted QKD through a free-space maritime channel“. SPIE-INT SOC OPTICAL ENGINEERING, 2017. http://hdl.handle.net/10150/626495.
Der volle Inhalt der QuelleGasparoux, Philippe. „Valeur pronostique de la mesure ambulatoire de l'intervalle QKD chez l'hypertendu“. Bordeaux 2, 1996. http://www.theses.fr/1996BOR2M028.
Der volle Inhalt der QuelleMas, Denis. „Intérêt et reproductibilité d'un protocole standardisé dans la mesure de l'intervalle QKd“. Bordeaux 2, 1997. http://www.theses.fr/1997BOR23069.
Der volle Inhalt der QuelleLevel, Claude. „Etude de la compliance artérielle chez l'hémodialysé chronique par la mesure de l'intervalle QKd“. Bordeaux 2, 1998. http://www.theses.fr/1998BOR23026.
Der volle Inhalt der QuelleSun, Xiaole, Ivan B. Djordjevic und Mark A. Neifeld. „Multiple spatial modes based QKD over marine free-space optical channels in the presence of atmospheric turbulence“. OPTICAL SOC AMER, 2016. http://hdl.handle.net/10150/622480.
Der volle Inhalt der QuelleDjordjevic, Ivan B. „Integrated Optics Modules Based Proposal for Quantum Information Processing, Teleportation, QKD, and Quantum Error Correction Employing Photon Angular Momentum“. IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/615122.
Der volle Inhalt der QuelleBuchteile zum Thema "QKDN"
Suda, M. „QKD Systems“. In Applied Quantum Cryptography, 97–121. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04831-9_6.
Der volle Inhalt der QuelleDávila, J., D. Lancho, J. Martinez und V. Martin. „On QKD Industrialization“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 297–302. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11731-2_36.
Der volle Inhalt der QuelleCiesla, Robert. „Implementations of QKD“. In Encryption for Organizations and Individuals, 247–56. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6056-2_13.
Der volle Inhalt der QuelleWolf, Ramona. „Device-Independent QKD“. In Quantum Key Distribution, 159–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_6.
Der volle Inhalt der QuelleDjordjevic, Ivan B. „Discrete Variable (DV) QKD“. In Physical-Layer Security and Quantum Key Distribution, 267–322. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_7.
Der volle Inhalt der QuelleDjordjevic, Ivan B. „Continuous Variable (CV)-QKD“. In Physical-Layer Security and Quantum Key Distribution, 323–89. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_8.
Der volle Inhalt der QuelleSchauer, S. „Attack Strategies on QKD Protocols“. In Applied Quantum Cryptography, 71–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04831-9_5.
Der volle Inhalt der QuelleMaurhart, O. „QKD networks based on Q3P“. In Applied Quantum Cryptography, 151–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04831-9_8.
Der volle Inhalt der QuelleDjordjevic, Ivan B. „Quantum-Key Distribution (QKD) Fundamentals“. In Physical-Layer Security and Quantum Key Distribution, 211–65. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_6.
Der volle Inhalt der QuelleIslam, Nurul T. „High-Dimensional Time-Phase QKD“. In High-Rate, High-Dimensional Quantum Key Distribution Systems, 29–56. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98929-7_3.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "QKDN"
Liu, Xiang, Xiaosong Yu, Yongli Zhao, Xiaotian Zhou, Shimulin Xie, Jincheng Li und Jie Zhang. „Multi-path based Quasi-real-time Quantum Key Distribution in Software Defined Quantum Key Distribution Networks (SD-QKDN)“. In 2019 18th International Conference on Optical Communications and Networks (ICOCN). IEEE, 2019. http://dx.doi.org/10.1109/icocn.2019.8934684.
Der volle Inhalt der QuelleSong, Fang, Liusheng Huang, Wei Yang und Kan Yang. „Building QKD Networks Based On a Novel QKD Scheme“. In 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC). IEEE, 2008. http://dx.doi.org/10.1109/icnsc.2008.4525288.
Der volle Inhalt der Quelle„FBG-Based Multidimensional QKD“. In 2018 20th International Conference on Transparent Optical Networks (ICTON). IEEE, 2018. http://dx.doi.org/10.1109/icton.2018.8473590.
Der volle Inhalt der QuelleMorrow, Alex, Don Hayford und Matthieu Legre. „Battelle QKD test bed“. In 2012 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2012. http://dx.doi.org/10.1109/ths.2012.6459843.
Der volle Inhalt der QuelleBrandt, Howard E. „Entangling probes of QKD“. In Defense and Security Symposium, herausgegeben von Eric J. Donkor, Andrew R. Pirich und Howard E. Brandt. SPIE, 2006. http://dx.doi.org/10.1117/12.661536.
Der volle Inhalt der QuelleBerzanskis, A. „QKD in existing networks“. In IEE Seminar on Quantum Cryptography: Secure Communications. IEE, 2005. http://dx.doi.org/10.1049/ic:20050584.
Der volle Inhalt der QuelleLenhart, Gaby. „QKD standardization at ETSI“. In QUANTUM AFRICA 2010: THEORETICAL AND EXPERIMENTAL FOUNDATIONS OF RECENT QUANTUM TECHNOLOGY. AIP, 2012. http://dx.doi.org/10.1063/1.4746061.
Der volle Inhalt der QuelleTamaki, Kiyoshi. „Enhancing implementation security of QKD“. In Quantum Technologies and Quantum Information Science, herausgegeben von Mark T. Gruneisen, Miloslav Dusek und John G. Rarity. SPIE, 2017. http://dx.doi.org/10.1117/12.2280737.
Der volle Inhalt der QuelleAbu-Ayyash, Abdulla M., und Naim Ajlouni. „QKD: Recovering Unused Quantum Bits“. In Communication Technologies: from Theory to Applications (ICTTA). IEEE, 2008. http://dx.doi.org/10.1109/ictta.2008.4530283.
Der volle Inhalt der QuelleKlop, Wimar, Rudolf Saathof, Niek Doelman, Michael Gruber, Thijs Moens, Clara I. Osorio Tamayo und Cristina Duque. „QKD optical ground terminal developments“. In International Conference on Space Optics — ICSO 2021, herausgegeben von Zoran Sodnik, Bruno Cugny und Nikos Karafolas. SPIE, 2021. http://dx.doi.org/10.1117/12.2599217.
Der volle Inhalt der Quelle