Academic literature on the topic 'Key Distribution'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Key Distribution.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Key Distribution"

1

Djellab, Rima, and Mohamed Benmohammed. "Enhancing 802.11i key distribution using quantum key distribution." International Journal of Applied Research on Information Technology and Computing 2, no. 3 (2011): 14. http://dx.doi.org/10.5958/j.0975-8070.2.3.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xue, Yang, Wei Chen, Shuang Wang, Zhenqiang Yin, Lei Shi, and Zhengfu Han. "Airborne quantum key distribution: a review [Invited]." Chinese Optics Letters 19, no. 12 (2021): 122702. http://dx.doi.org/10.3788/col202119.122702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Horiuchi, Noriaki. "Convenient key distribution." Nature Photonics 7, no. 2 (January 31, 2013): 84. http://dx.doi.org/10.1038/nphoton.2013.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mehic, Miralem, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil Peev, Alejandro Aguado, Vicente Martin, et al. "Quantum Key Distribution." ACM Computing Surveys 53, no. 5 (October 15, 2020): 1–41. http://dx.doi.org/10.1145/3402192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Feng Tang, Feng Tang, and Bing Zhu Bing Zhu. "Scintillation discriminator improves free-space quantum key distribution." Chinese Optics Letters 11, no. 9 (2013): 090101–90104. http://dx.doi.org/10.3788/col201311.090101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lv, Xixiang, Yi Mu, and Hui Li. "Key distribution for heterogeneous public-key cryptosystems." Journal of Communications and Networks 15, no. 5 (October 2013): 464–68. http://dx.doi.org/10.1109/jcn.2013.000085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Q., H. Takesue, T. Honjo, K. Wen, T. Hirohata, M. Suyama, Y. Takiguchi, et al. "Megabits secure key rate quantum key distribution." New Journal of Physics 11, no. 4 (April 30, 2009): 045010. http://dx.doi.org/10.1088/1367-2630/11/4/045010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hwang, Tzonelih, Chia-Wei Tsai, and Song-Kong Chong. "Probabilistic quantum key distribution." Quantum Information and Computation 11, no. 7&8 (July 2011): 615–37. http://dx.doi.org/10.26421/qic11.7-8-6.

Full text
Abstract:
This work presents a new concept in quantum key distribution called the probabilistic quantum key distribution (PQKD) protocol, which is based on the measurement uncertainty in quantum phenomena. It allows two mutually untrusted communicants to negotiate an unpredictable key that has a randomness guaranteed by the laws of quantum mechanics. In contrast to conventional QKD (e.g., BB84) in which one communicant has to trust the other for key distribution or quantum key agreement (QKA) in which the communicants have to artificially contribute subkeys to a negotiating key, PQKD is a natural and simple method for distributing a secure random key. The communicants in the illustrated PQKD take Einstein-Podolsky-Rosen (EPR) pairs as quantum resources and then use entanglement swapping and Bell-measurements to negotiate an unpredictable key.
APA, Harvard, Vancouver, ISO, and other styles
9

Cowper, Noah, Harry Shaw, and David Thayer. "Chaotic Quantum Key Distribution." Cryptography 4, no. 3 (August 31, 2020): 24. http://dx.doi.org/10.3390/cryptography4030024.

Full text
Abstract:
The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched. We explored a novel application of quantum key distribution (QKD) and synchronized chaos which was utilized to mask a transmitted message. This communication scheme is not hampered by the ability to send single photons and consequently is not vulnerable to number splitting attacks like other QKD schemes that rely on single photon emission. This was shown by an eavesdropper gaining a maximum amount of information on the key during the first setup and listening to the key reconciliation to gain more information. We proved that there is a maximum amount of information an eavesdropper can gain during the communication, and this is insufficient to decode the message.
APA, Harvard, Vancouver, ISO, and other styles
10

Inoue, K. "Quantum key distribution technologies." IEEE Journal of Selected Topics in Quantum Electronics 12, no. 4 (July 2006): 888–96. http://dx.doi.org/10.1109/jstqe.2006.876606.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Key Distribution"

1

Sonalker, Anuja Anilkumar. "Asymmetric Key Distribution." NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-20020403-040240.

Full text
Abstract:

ABSTRACT BY Anuja A Sonalker on Asymmetric Key Distribution. (Under the direction of Dr. Gregory T. Byrd) Currently, in Threshold Public Key Systems key shares are generated uniformly and distributed in the same manner to every participant. We propose a new scheme, Asymmetric Key Distribution (AKD), in which one share server is provided with a larger, unequal chunk of the original secret key. Asymmetric Key Distribution is a unique scheme for generating and distributing unequal shares via a Trusted Dealer to all the registered peers in the system such that without the combination of the single compulsory share from the Special Server no transaction can be completed. This application is aimed for circumstances where a single party needs to co-exist within a group of semi-trusted peers, or in a coalition where every entity should have a choice to participate and one of the entities needs to be privileged with more powers. This thesis presents the algorithm and security model for Asymmetric Key Distribution, along with all the assumptions and dependencies within the boundaries of which this algorithm is guaranteed to be secure. Its robustness lies in its simplicity and in its distributed nature. We address all security concerns related to the model including compromised share servers and cryptanalytic attacks. A variation, called the Dual Threshold Scheme, is created to reduce the vulnerability in the algorithm, namely, the compromise of the Special Server and its secret share. In this scheme, a combination of another threshold number of Distributed Special Servers must combine to collectively generate a share equivalent to the Special Server?s share. This flexibility allows us to adjust our threshold scheme for the environment. We describe a Java-based implementation of the AKD algorithm, using Remote Method Invocation (RMI) for communication among share servers. A typical scenario of a Trusted Dealer, a Special Server and a number of Share Servers was created, where timed asymmetric key generation and distribution was carried out after which the servers initiated and carried out certificate signing transactions in the appropriated manner. As an interesting exercise, the share servers were corrupted so that they would try to exclude the Special Server in the transactions and try to form its share themselves, to observe the consequence. All their efforts were futile. Another interesting aspect was the key generation timing. Key generation is known to be a very time-extensive process but the key share reuse concept used in this implementation reduced the time for key generation by 66-90% of the classical key generation time.

APA, Harvard, Vancouver, ISO, and other styles
2

Tvedt, Ole Christian. "Quantum key distribution prototype." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15845.

Full text
Abstract:
This thesis covers the basics of cryptography, both classical and the newer quantum-basedapproches. Further, it details an implementation of a BB84-based quantum key distributionsystem currently under construction, focusing on the controlling hardware and FPGA-basedsoftware. The overarching goal is to create a system impervious to currently known attackson such systems. The system is currently running at 100 Mbit/s, though the goal is to double this asthe design nears its completion. The system currently chooses encoding base, bit value andwhether a state is a socalled decoy state. However, the modulator for bit encoding is notyet operational. Output for decoy state generation, however, is fully functional. Finally, the thesis describes what steps are necessary to reach a complete BB84-basedquantum key distribution system implementing decoy states.
APA, Harvard, Vancouver, ISO, and other styles
3

Novak, Julia. "Generalised key distribution patterns." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/f582aac8-df73-28ea-fe2e-80f1c37f5e59/8/.

Full text
Abstract:
Given a network of users, with certain secure communication requirements, we examine the mathematics that underpins the distribution of the necessary secret information, to enable the secure communications within that network. More precisely, we let f!lJ be a network of users and ~, § be some prede- termined families of subsets of those users. The secret information (keys or subkeys) must be distributed in such a way that for any G E ~, the members of G can communicate securely among themselves without fear of the members of some F E § (that have no users in common with G), colluding together to either eavesdrop on what is being said (and understand the content of the message) or tamper with the message, undetected. , In the case when ~ and § comprise of all the subsets of f!lJ that have some fixed cardinality t and w respectively, we have a well-known and much studied problem. However, in this thesis we remove these rigid cardinality constraints and make ~ and § as unrestricted as possible. This allows for situations where the members of ~ and § are completely irregular, giving a much less well-known and less studied problem. Without any regularity emanating from cardinality constraints, the best approach to the study of these general structures is unclear. It is unreason- able to expect that highly regular objects (such as designs or finite geometries) play any significant role in the analysis of such potentially irregular structures. Thus, we require some new techniques and a more general approach. In this thesis we use methods from set theory and ideas from convex analysis in order to construct these general structures and provide some mathematical insight into their behaviour. Furthermore, we analyse these general structures by ex- ploiting the proof techniques of other authors in new ways, tightening existing inequalities and generalising results from the literature.
APA, Harvard, Vancouver, ISO, and other styles
4

Weier, Henning. "European Quantum Key Distribution Network." Diss., lmu, 2011. http://nbn-resolving.de/urn:nbn:de:bvb:19-133206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Simonsen, Eivind Sjøtun. "Security of quantum key distribution source." Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10836.

Full text
Abstract:

Cryptography has begun its journey into the field of quantum information theory. Classical cryptography has shown weaknesses, which may be exploited in the future, either by development in mathematics, or by quantum computers. Quantum key distribution (QKD) is a promising path for cryptography to enable secure communication in the future. Although the theory of QKD promises absolute security, the reality is that current quantum crypto systems have flaws in them, as perfect devices have proven impossible to build. However, this can be taken into account in security proofs to ensure security, even with flaws. Security loopholes in QKD systems are being discovered as development progresses. Nevertheless, the system being built at NTNU is intended to address them all, creating a totally secure system. During this thesis, work was continued assembling the interferometer which is the basis for encoding qubits. It was fully connected on an optical table, and interference was obtained. Concerning theoretical work, calculations for a photon source specific parameter was carried out. It consisted of expanding previous framework and applying the results in both an established security proof, and a recent generalization of this proof. Two source effects were in focus, the lasers random phase and its fluctuating pulse intensity. Where analytical derivation was no longer possible, Matlab was used for numerical calculations. Under the conditions of the framework and proofs this thesis lies on, randomized phase turned out to have a negligible improvement over the case of non-random phase. Fluctuating amplitude showed a larger effect, reducing system performance. The input parameters were extreme, thus in a realistic situation it should not affect system performance significantly. However, these fluctuations must be taken into account when proving system security.

APA, Harvard, Vancouver, ISO, and other styles
6

Kurnio, Hartono. "Contributions to group key distribution schemes." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.103409/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nauerth, Sebastian. "Air to ground quantum key distribution." Diss., Ludwig-Maximilians-Universität München, 2013. http://nbn-resolving.de/urn:nbn:de:bvb:19-162223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gordon, Karen Jane. "GigaHertz clocked quantum key distribution system." Thesis, Heriot-Watt University, 2003. http://hdl.handle.net/10399/309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tang, Xinke. "Optically switched quantum key distribution network." Thesis, University of Cambridge, 2019. https://www.repository.cam.ac.uk/handle/1810/289444.

Full text
Abstract:
Encrypted data transmission is becoming increasingly more important as information security is vital to modern communication networks. Quantum Key Distribution (QKD) is a promising method based on the quantum properties of light to generate and distribute unconditionally secure keys for use in classical data encryption. Significant progress has been achieved in the performance of QKD point-to-point transmission over a fibre link between two users. The transmission distance has exceeded several hundred kilometres of optical fibre in recent years, and the secure bit rate achievable has reached megabits per second, making QKD applicable for metro networks. To realize quantum encrypted data transmission over metro networks, quantum keys need to be regularly distributed and shared between multiple end users. Optical switching has been shown to be a promising technique for cost-effective QKD networking, enabling the dynamic reconfiguration of transmission paths with low insertion loss. In this thesis, the performance of optically switched multi-user QKD systems are studied using a mathematical model in terms of transmission distance and secure key rates. The crosstalk and loss limitations are first investigated theoretically and then experimentally. The experiment and simulation both show that negligible system penalties are observed with crosstalk of -20 dB or below. A practical quantum-safe metro network solution is then reported, integrating optically-switched QKD systems with high speed reconfigurability to protect classical network traffic. Quantum signals are routed by rapid optical switches between any two endpoints or network nodes via reconfigurable connections. Proof-of-concept experiments with commercial QKD systems are conducted. Secure keys are continuously shared between virtualised Alice-Bob pairs over effective transmission distances of 30 km, 31.7 km, 33.1 km and 44.6 km. The quantum bit error rates (QBER) for the four paths are proportional to the channel losses with values between 2.6% and 4.1%. Optimising the reconciliation and clock distribution architecture is predicted to result in an estimated maximum system reconfiguration time of 20 s, far shorter than previously demonstrated. In addition, Continuous Variable (CV) QKD has attracted much research interest in recent years, due to its compatibility with standard telecommunication techniques and relatively low cost in practical implementation. A wide band balanced homodyne detection system built from modified off-the-shelf components is experimentally demonstrated. Practical limits and benefits for high speed CVQKD key transmission are demonstrated based on an analysis of noise performance. The feasibility of an optically switched CV-QKD is also experimentally demonstrated using two virtualised Alice-Bob pairs for the first time. This work represents significant advances towards the deployment of CVQKD in a practical quantum-safe metro network. A method of using the classical equalization technique for Inter-symbol-interference mitigation in CVQKD detection is also presented and investigated. This will encourage further research to explore the applications of classical communication tools in quantum communications.
APA, Harvard, Vancouver, ISO, and other styles
10

Gorman, Philip Michael. "Practical free-space quantum key distribution." Thesis, Heriot-Watt University, 2010. http://hdl.handle.net/10399/2390.

Full text
Abstract:
Within the last two decades, the world has seen an exponential increase in the quantity of data traffic exchanged electronically. Currently, the widespread use of classical encryption technology provides tolerable levels of security for data in day to day life. However, with one somewhat impractical exception these technologies are based on mathematical complexity and have never been proven to be secure. Significant advances in mathematics or new computer architectures could render these technologies obsolete in a very short timescale. By contrast, Quantum Key Distribution (or Quantum Cryptography as it is sometimes called) offers a theoretically secure method of cryptographic key generation and exchange which is guaranteed by physical laws. Moreover, the technique is capable of eavesdropper detection during the key exchange process. Much research and development work has been undertaken but most of this work has concentrated on the use of optical fibres as the transmission medium for the quantum channel. This thesis discusses the requirements, theoretical basis and practical development of a compact, free-space transmission quantum key distribution system from inception to system tests. Experiments conducted over several distances are outlined which verify the feasibility of quantum key distribution operating continuously over ranges from metres to intercity distances and finally to global reach via the use of satellites.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Key Distribution"

1

Wolf, Ramona. Quantum Key Distribution. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mehic, Miralem, Stefan Rass, Peppino Fazio, and Miroslav Voznak. Quantum Key Distribution Networks. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06608-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Djordjevic, Ivan B. Physical-Layer Security and Quantum Key Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Islam, Nurul T. High-Rate, High-Dimensional Quantum Key Distribution Systems. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98929-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

O'Connor, Raymond. Regional distribution of Irish tourism: Key marketing issues. Dublin: University College Dublin, Graduate School of Business, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krumm, Kathie L. Transfers and the transition from socialism: Key tradeoffs. Washington DC: World Bank Europe and Central Asia Regional Office, Office of the Regional Vice President, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Harrow, Gerry. Ethanol production, distribution, and use: Discussions on key issues. Golden, Colo.]: National Renewable Energy Laboratory, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oehler, Friderike. Key factors determining the distribution of fungal hyphae in forest soils. Freiburg im Breisgau: Institut für Bodenkunde und Waldernährungslehre der Albert-Ludwigs-Universität Freiburg im Breisgau, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kornacker, Paul M. Checklist and key to the snakes of Venezuela =: Lista sistemática y clave para las serpientes de Venezuela. Rheinbach, Germany: Pako-Verlag, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

International, BirdLife, ed. Important bird areas in Asia: Key sites for conservation. Cambridge: BirdLife International, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Key Distribution"

1

Stinson, Douglas R., and Maura B. Paterson. "Key Distribution." In Cryptography, 415–60. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wolf, Ramona. "Introduction." In Quantum Key Distribution, 1–12. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wolf, Ramona. "Security Analysis." In Quantum Key Distribution, 117–57. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wolf, Ramona. "Recent Developments in Practical QKD." In Quantum Key Distribution, 183–217. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wolf, Ramona. "Device-Independent QKD." In Quantum Key Distribution, 159–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wolf, Ramona. "Mathematical Tools." In Quantum Key Distribution, 13–52. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wolf, Ramona. "Quantum Key Distribution Protocols." In Quantum Key Distribution, 91–116. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wolf, Ramona. "Information and Entropies." In Quantum Key Distribution, 53–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Renner, Renato. "Quantum Key Distribution." In Encyclopedia of Algorithms, 1703–7. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-2864-4_316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Perrig, Adrian, and J. D. Tygar. "ELK Key Distribution." In Secure Broadcast Communication, 111–48. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0229-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Key Distribution"

1

Gronberg, P., and P. Jonsson. "Key reconciliation in quantum key distribution." In IEE Seminar on Quantum Cryptography: Secure Communications. IEE, 2005. http://dx.doi.org/10.1049/ic:20050587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Qiang, Hiroki Takesue, Toshimori Honjo, Kai Wen, Toru Hirohata, Motohiro Suyama, Yoshihiro Takiguchi, et al. "Megabits Secure Key Rate Quantum Key Distribution." In International Quantum Electronics Conference. Washington, D.C.: OSA, 2009. http://dx.doi.org/10.1364/iqec.2009.itui1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ehdaie, Mohammad, Nikos Alexiou, Mahmoud Ahmadian, Mohammad Reza Aref, and Panos Papadimitratos. "Key splitting for random key distribution schemes." In 2012 20th IEEE International Conference on Network Protocols (ICNP). IEEE, 2012. http://dx.doi.org/10.1109/icnp.2012.6459951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

ur Rehman, Junaid, Youngmin Jeong, and Hyundong Shin. "Quantum key distribution with a control key." In 2017 International Symposium on Wireless Communication Systems (ISWCS). IEEE, 2017. http://dx.doi.org/10.1109/iswcs.2017.8108093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shapiro, Jeffrey H., Quntao Zhuang, Zheshen Zhang, Justin Dove, and Franco N. C. Wong. "Floodlight Quantum Key Distribution." In Applications of Lasers for Sensing and Free Space Communications. Washington, D.C.: OSA, 2016. http://dx.doi.org/10.1364/lsc.2016.ltu5b.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mélen, Gwenaelle, Peter Freiwang, Jannik Luhn, Tobias Vogl, Markus Rau, Clemens Sonnleitner, Wenjamin Rosenfeld, and Harald Weinfurter. "Handheld Quantum Key Distribution." In Quantum Information and Measurement. Washington, D.C.: OSA, 2017. http://dx.doi.org/10.1364/qim.2017.qt6a.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zbinden, Hugo, Sylvain Fasel, Nicolas Gisin, Olivier Guinnard, Gregoire Ribordy, Andre Stefanov, and Damien Stucki. "Practical quantum key distribution." In Photonics Asia 2002, edited by Songhao Liu, Guangcan Guo, Hoi-Kwong Lo, and Nobuyuki Imoto. SPIE, 2002. http://dx.doi.org/10.1117/12.483038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhuang, Quntao, Zheshen Zhang, Justin Dove, Franco N. C. Wong, and Jeffrey H. Shapiro. "Floodlight Quantum Key Distribution." In CLEO: QELS_Fundamental Science. Washington, D.C.: OSA, 2016. http://dx.doi.org/10.1364/cleo_qels.2016.fth3c.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mélen, Gwenaelle, Peter Freiwang, Jannik Luhn, Tobias Vogl, Markus Rau, Wenjamin Rosenfeld, and Harald Weinfurter. "Handheld Quantum Key Distribution." In CLEO: QELS_Fundamental Science. Washington, D.C.: OSA, 2018. http://dx.doi.org/10.1364/cleo_qels.2018.ftu3g.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Klicnik, Ondrej, Petr Munster, Tomas Horvath, Jan Hajny, and Lukas Malina. "Quantum Key Distribution Polygon." In 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2021. http://dx.doi.org/10.1109/icumt54235.2021.9631732.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Key Distribution"

1

Ballardie, A. Scalable Multicast Key Distribution. RFC Editor, May 1996. http://dx.doi.org/10.17487/rfc1949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bush, Stephen. TIME-SENSITIVE QUANTUM KEY DISTRIBUTION. Office of Scientific and Technical Information (OSTI), December 2021. http://dx.doi.org/10.2172/1870109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Turner, S. CMS Symmetric Key Management and Distribution. RFC Editor, June 2008. http://dx.doi.org/10.17487/rfc5275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reiter, Michael, Kenneth Birman, and Robert van Renesse. Fault-Tolerant Key Distribution (Preliminary Version). Fort Belvoir, VA: Defense Technical Information Center, January 1993. http://dx.doi.org/10.21236/ada261489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reiter, Michael, Kenneth Birman, and Robert Van Renesse. Fault-Tolerant Key Distribution (Preliminary Version). Fort Belvoir, VA: Defense Technical Information Center, January 1993. http://dx.doi.org/10.21236/ada262422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Syverson, Paul, and Catherine Meadows. Formal Requirements for Key Distribution Protocols. Fort Belvoir, VA: Defense Technical Information Center, January 1994. http://dx.doi.org/10.21236/ada463018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sobolewski, Roman. Quantum Key Distribution Using Polarized Single Photons. Fort Belvoir, VA: Defense Technical Information Center, April 2009. http://dx.doi.org/10.21236/ada502752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Syverson, Paul. On Key Distribution Protocols for Repeated Authentication. Fort Belvoir, VA: Defense Technical Information Center, January 1993. http://dx.doi.org/10.21236/ada465538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

NORDHOLT, J., R. HUGHES, and ET AL. PRESENT AND FUTURE FREE-SPACE QUANTUM KEY DISTRIBUTION. Office of Scientific and Technical Information (OSTI), December 2001. http://dx.doi.org/10.2172/790237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schwartz, Carey, and Shannon Viverette. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY). Fort Belvoir, VA: Defense Technical Information Center, July 2014. http://dx.doi.org/10.21236/ada607003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography