Academic literature on the topic 'QKDN'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'QKDN.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "QKDN"

1

Jiang, Dong, Yuanyuan Chen, Xuemei Gu, Ling Xie, and Lijun Chen. "Efficient and universal quantum key distribution based on chaos and middleware." International Journal of Modern Physics B 31, no. 02 (January 18, 2017): 1650264. http://dx.doi.org/10.1142/s0217979216502647.

Full text
Abstract:
Quantum key distribution (QKD) promises unconditionally secure communications, however, the low bit rate of QKD cannot meet the requirements of high-speed applications. Despite the many solutions that have been proposed in recent years, they are neither efficient to generate the secret keys nor compatible with other QKD systems. This paper, based on chaotic cryptography and middleware technology, proposes an efficient and universal QKD protocol that can be directly deployed on top of any existing QKD system without modifying the underlying QKD protocol and optical platform. It initially takes the bit string generated by the QKD system as input, periodically updates the chaotic system, and efficiently outputs the bit sequences. Theoretical analysis and simulation results demonstrate that our protocol can efficiently increase the bit rate of the QKD system as well as securely generate bit sequences with perfect statistical properties. Compared with the existing methods, our protocol is more efficient and universal, it can be rapidly deployed on the QKD system to increase the bit rate when the QKD system becomes the bottleneck of its communication system.
APA, Harvard, Vancouver, ISO, and other styles
2

Gyongyosi, Laszlo, Laszlo Bacsardi, and Sandor Imre. "A Survey on Quantum Key Distribution." Infocommunications journal, no. 2 (2019): 14–21. http://dx.doi.org/10.36244/icj.2019.2.2.

Full text
Abstract:
Quantum key distribution (QKD) protocols represent an important practical application of quantum information theory. QKD schemes enable legal parties to establish unconditionally secret communication by exploiting the fundamental attributes of quantum mechanics. Here we present an overview of QKD rotocols. We review the principles of QKD systems, the implementation basis, and the application of QKD protocols in the standard Internet and the quantum Internet.
APA, Harvard, Vancouver, ISO, and other styles
3

POPPE, A., M. PEEV, and O. MAURHART. "OUTLINE OF THE SECOQC QUANTUM-KEY-DISTRIBUTION NETWORK IN VIENNA." International Journal of Quantum Information 06, no. 02 (April 2008): 209–18. http://dx.doi.org/10.1142/s0219749908003529.

Full text
Abstract:
A quantum key distribution (QKD) network is currently being implemented in Vienna by integrating seven QKD-link devices that connect five subsidiaries of Siemens Austria. We give an architectural overview of the network and present the enabling QKD technologies, as well as the novel QKD network protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Tsai, Chia-Wei, Chun-Wei Yang, Jason Lin, Yao-Chung Chang, and Ruay-Shiung Chang. "Quantum Key Distribution Networks: Challenges and Future Research Issues in Security." Applied Sciences 11, no. 9 (April 22, 2021): 3767. http://dx.doi.org/10.3390/app11093767.

Full text
Abstract:
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical problems. Numerous countries and research institutes have invested enormous resources to execute correlation studies on QKD networks. Thus, in this study, we surveyed existing QKD network studies and practical field experiments to summarize the research results (e.g., type and architecture of QKD networks, key generating rate, maximum communication distance, and routing protocol). Furthermore, we highlight the three challenges and future research issues in the security of QKD networks and then provide some feasible resolution strategies for these challenges.
APA, Harvard, Vancouver, ISO, and other styles
5

Pile, David F. P. "Twin-field QKD." Nature Photonics 12, no. 7 (June 28, 2018): 377. http://dx.doi.org/10.1038/s41566-018-0209-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Imran, Bettina Heim, Andreas Neuzner, and Christoph Marquardt. "Satellite-Based QKD." Optics and Photonics News 29, no. 2 (February 1, 2018): 26. http://dx.doi.org/10.1364/opn.29.2.000026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Djordjevic, Ivan B. "Hybrid QKD Protocol Outperforming Both DV- and CV-QKD Protocols." IEEE Photonics Journal 12, no. 1 (February 2020): 1–8. http://dx.doi.org/10.1109/jphot.2019.2946910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Huaxing, Shaohua Wang, Yang Huang, Yaqi Song, and Changlei Wang. "A Self-Stabilizing Phase Decoder for Quantum Key Distribution." Applied Sciences 10, no. 5 (March 1, 2020): 1661. http://dx.doi.org/10.3390/app10051661.

Full text
Abstract:
Self-stabilization quantum key distribution (QKD) systems are often based on the Faraday magneto-optic effect such as “plug and play” QKD systems and Faraday–Michelson QKD systems. In this article, we propose a new anti-quantum-channel disturbance decoder for QKD without magneto-optic devices, which can be a benefit for the photonic integration and applications in magnetic environments. The decoder is based on a quarter-wave plate reflector–Michelson (Q–M) interferometer, with which the QKD system can be free of polarization disturbance caused by quantum channel and optical devices in the system. The theoretical analysis indicates that the Q–M interferometer is immune to polarization-induced signal fading, where the operator of the Q–M interferometer corresponding to Pauli Matrix σ2 makes it satisfy the anti-disturbance condition naturally. A Q–M interferometer based time-bin phase encoding QKD setup is demonstrated, and the experimental results show that the QKD setup works stably with a low quantum bit error rate about 1.3% for 10 h over 60.6 km standard telecommunication optical fiber.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Hua, Yongli Zhao, and Avishek Nag. "Quantum-Key-Distribution (QKD) Networks Enabled by Software-Defined Networks (SDN)." Applied Sciences 9, no. 10 (May 21, 2019): 2081. http://dx.doi.org/10.3390/app9102081.

Full text
Abstract:
As an important support for quantum communication, quantum key distribution (QKD) networks have achieved a relatively mature level of development, and they face higher requirements for multi-user end-to-end networking capabilities. Thus, QKD networks need an effective management plane to control and coordinate with the QKD resources. As a promising technology, software defined networking (SDN) can separate the control and management of QKD networks from the actual forwarding of the quantum keys. This paper systematically introduces QKD networks enabled by SDN, by elaborating on its overall architecture, related interfaces, and protocols. Then, three-use cases are provided as important paradigms with their corresponding schemes and simulation performances.
APA, Harvard, Vancouver, ISO, and other styles
10

Trizna, Anastasija, and Andris Ozols. "An Overview of Quantum Key Distribution Protocols." Information Technology and Management Science 21 (December 14, 2018): 37–44. http://dx.doi.org/10.7250/itms-2018-0005.

Full text
Abstract:
Quantum key distribution (QKD) is the objects of close attention and rapid progress due to the fact that once first quantum computers are available – classical cryptography systems will become partially or completely insecure. The potential threat to today’s information security cannot be neglected, and efficient quantum computing algorithms already exist. Quantum cryptography brings a completely new level of security and is based on quantum physics principles, comparing with the classical systems that rely on hard mathematical problems. The aim of the article is to overview QKD and the most conspicuous and prominent QKD protocols, their workflow and security basement. The article covers 17 QKD protocols and each introduces novel ideas for further QKD system improvement.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "QKDN"

1

Širjov, Jakub. "Testovací polygon pro kvantovou distribuci klíčů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442371.

Full text
Abstract:
The aim of this masters thesis is to explain quantum key distribution (QKD) and principle of signal transmission in the quantum channel. Further this thesis complains commercial distributors of QKD technologies and their individual appliances. Practical part of the thesis is separated to 3 parts. First part handles transmission of quantum keys in QKDNetsim simulator. Second part takes care of design and creation of a test polygon that allows for testing of many optical network configurations with quantum signal and normal data traffic being transmitted in a single fiber. Multiple simulations of use of various filter types to supress the signal noise in the program VPIphotonics and tested by QKDNetsim are shown in the last part of this thesis.
APA, Harvard, Vancouver, ISO, and other styles
2

Gariano, John, and Ivan B. Djordjevic. "PPLN-waveguide-based polarization entangled QKD simulator." SPIE-INT SOC OPTICAL ENGINEERING, 2017. http://hdl.handle.net/10150/626494.

Full text
Abstract:
We have developed a comprehensive simulator to study the polarization entangled quantum key distribution (QKD) system, which takes various imperfections into account. We assume that a type-II SPDC source using a PPLN-based nonlinear optical waveguide is used to generate entangled photon pairs and implements the BB84 protocol, using two mutually unbiased basis with two orthogonal polarizations in each basis. The entangled photon pairs are then simulated to be transmitted to both parties; Alice and Bob, through the optical channel, imperfect optical elements and onto the imperfect detector. It is assumed that Eve has no control over the detectors, and can only gain information from the public channel and the intercept resend attack. The secure key rate (SKR) is calculated using an upper bound and by using actual code rates of LDPC codes implementable in FPGA hardware. After the verification of the simulation results, such as the pair generation rate and the number of error due to multiple pairs, for the ideal scenario, available in the literature, we then introduce various imperfections. Then, the results are compared to previously reported experimental results where a BBO nonlinear crystal is used, and the improvements in SKRs are determined for when a PPLN-waveguide is used instead.
APA, Harvard, Vancouver, ISO, and other styles
3

Lydersen, Lars Vincent van De Wiel. "Security of QKD-systems with detector efficiency mismatch." Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9808.

Full text
Abstract:

The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is called quantum key distribution (QKD). In theory the key exchange can be made completely secure. Real QKD implementations however, has numerous imperfections. Luckily one has also been able to prove the security of QKD with a large variety of imperfections. The field of QKD has matured over the recent years, and it has now reached commercial applications with photons as the quantum bits, and optical fibers as the quantum channel. Today there are at least three commercial vendors of QKD-systems. We live in the times of quantum hacking. Researchers has begun the task of breaking the security of QKD-systems. Many new imperfections has been discovered, some of which might be used to break the security of QKD. This thesis is a study of the detector efficiency mismatch loophole. Most QKD-systems require two detectors, and it is virtually impossible to make two identical detectors with the exact same efficiency. What is worse, it turns out that the eavesdropper can often control the relative efficiencies of the two detectors trough some domain, for instance by controlling the timing, the frequency or the spacial mode of the photons. This can in turn be used by the eavesdropper to gain information about the secret key. Previously the best known attack would compromise security if the detector efficiency mismatch of about 1:15. Here the current attacks on systems with detector efficiency mismatch are improved to compromise security for a mismatch of about 1:4. This is less than the mismatch found in a commercial QKD-system, so the attack could in principle be used to eavesdrop on this QKD-system. One might try to close the loophole by modifying the implementation. One suggestion is the four state Bob. The problem is that this patch will in turn open other loopholes, and one of these loopholes reopen the detector efficiency mismatch loophole. One can remove Eves information about the key by doing a sufficient amount of extra privacy amplification. Here a general security bound is presented, quantifying the required amount of extra privacy amplification to remove Eve's information about the key. The proof is more general than the previous security proof, and is valid for any basis dependent, possibly lossy, linear optical imperfections in the channel and receiver/detectors. Since this is more realistic assumptions for a QKD-implementation, the proof represents a major step of closing the loophole in real devices.

APA, Harvard, Vancouver, ISO, and other styles
4

Nishat, Md Rezaul Karim. "DESIGN OF NANOSTRUCTURED ENTANGLED PHOTON PAIR GENERATOR FOR QKD APPLICATIONS." OpenSIUC, 2018. https://opensiuc.lib.siu.edu/dissertations/1580.

Full text
Abstract:
Finite structure splitting (FSS) is a bottleneck for quantum dot (QD) based solid state entangled photon pair generator (EPPG) for Quantum Key Distribution (QKD) application. In QD, entangle photon pairs are generated through a cascaded emission process—biexciton to exciton to ground state. The FSS of the excitonic state destroys the entanglement of the photon pairs, hence needs to be eliminated. FSS can be tuned by engineering the crystal growth direction, varying dot shape or size, changing the material composition and/or applying external strain. Numerical investigation of FSS and designing of realistically-sized QD based EPPG demands multiscale-multiphysics many-body simulation efforts. To this end, in this work, we report the coupling of full configuration integration (FCI) method with the atomistic empirical tight-binding (TB) models (10-band sp3s* and 20-band sp3d5s*) to calculate the excitonic energetics and FSS in recently reported multimillion-atom III-V dot-in-nanowire structures. The core of the computational framework comprises two parts: i) NEMO3D, which, using the TB models, can compute single-electron energetics of multimillion-atom structures, and ii) An FCI kernel, which computes the many-particle energetics and wavefunctions using the single-electron outputs as derived from NEMO3D. NEMO3D is a broad platform that handles geometry construction, calculation of strain distributions and built-in potential fields, solving the Schrodinger’s equation and computing optical matrix elements. Three output files from NEMO3D are of particular importance for the FCI toolkit: i) Single-electron energy values, ii) Eigen functions, and iii) Relaxed atom positions of the device. FCI calculates the Coulomb and Exchange matrix elements associated with multi-particles and forms the many-body Hamiltonian. The excitonic states (electron-hole pair) are calculated by solving the many-body Hamiltonian and the value of FSS, if exists, is determined. Recently, nitride-based nanostructured devices have been found to be a promising candidate for single and entangled multi-photon emitter applications. The principal goal of this dissertation is to facilitate the numerical design of InGaN/GaN based dot-in-nanowire EPPG units. To this end, a number of kernels in NEMO3D and FCI packages were augmented. The geometry constructor in NEMO3D was extended for two non-polar planes of wurtzite crystal: m-plane and a-plane. It is found that these two non-polar planes, with much smaller built-in piezoelectric fields, exhibit improved optical transition probabilities than the polar c-plane counterpart. As test cases, light-emitters in dot-in-wire and multiple quantum well (MQW) configurations were simulated and compared in all three (c-plane, m-plane, and a-plane) growth directions. TCAD toolkits are used to simulate the terminal optical characteristics such as internal quantum efficiency (IQE) and spontaneous emission rate. Hexagonal-base truncated-pyramid shaped QD was also added to the NEMO3D geometry constructor as pyramid shaped dots offer directionality and better extraction efficiency of emitted photons, which is important for single or entangled photon generators. The FCI simulator was modified for calculating the excitonic states that involve an electron-hole pair. As for EPPG design, four device structures are considered: i) Disk-in-nanowire on the polar c-plane, ii) pyramid shaped dot-in-nanowire on polar c-plane, iii) Disk-in-nanowire on non-polar m-plane, and iv) Disk-in-nanowire on non-polar a-plane. Simulations are done for different disk thicknesses, material compositions, quantum dot shapes and crystal directions. Results and in-depth analysis are presented on the effects of these design parameters on many-body energetics e.g. binding energy, excitonic bandgaps and FSS. The derivation of excitonic transition probability from single-electron momentum matrix is discussed in detail. Finally, an EPPG design is proposed employing the entangled polarization profiles from two excitonic emissions.
APA, Harvard, Vancouver, ISO, and other styles
5

Gariano, John, and Ivan B. Djordjevic. "Multimode entanglement assisted QKD through a free-space maritime channel." SPIE-INT SOC OPTICAL ENGINEERING, 2017. http://hdl.handle.net/10150/626495.

Full text
Abstract:
When using quantum key distribution (QKD), one of the trade-offs for security is that the generation rate of a secret key is typically very low. Recent works have shown that using a weak coherent source allows for higher secret key generation rates compared to an entangled photon source, when a channel with low loss is considered. In most cases, the system that is being studied is over a fiber-optic communication channel. Here a theoretical QKD system using the BB92 protocol and entangled photons over a free-space maritime channel with multiple spatial modes is presented. The entangled photons are generated from a spontaneous parametric down conversion (SPDC) source of type II. To employ multiple spatial modes, the transmit apparatus will contain multiple SPDC sources, all driven by the pump lasers assumed to have the same intensity. The receive apparatuses will contain avalanche photo diodes (APD), modeled based on the NuCrypt CPDS-1000 detector, and located at the focal point of the receive aperture lens. The transmitter is assumed to be located at Alice and Bob will be located 30 km away, implying no channel crosstalk will be introduced in the measurements at Alices side due to turbulence. To help mitigate the effects of atmospheric turbulence, adaptive optics will be considered at the transmitter and the receiver. An eavesdropper, Eve, is located 15 km from Alice and has no control over the devices at Alice or Bob. Eve is performing the intercept resend attack and listening to the communication over the public channel. Additionally, it is assumed that Eve can correct any aberrations caused by the atmospheric turbulence to determine which source the photon was transmitted from. One, four and nine spatial modes are considered with and without applying adaptive optics and compared to one another.
APA, Harvard, Vancouver, ISO, and other styles
6

Gasparoux, Philippe. "Valeur pronostique de la mesure ambulatoire de l'intervalle QKD chez l'hypertendu." Bordeaux 2, 1996. http://www.theses.fr/1996BOR2M028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mas, Denis. "Intérêt et reproductibilité d'un protocole standardisé dans la mesure de l'intervalle QKd." Bordeaux 2, 1997. http://www.theses.fr/1997BOR23069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Level, Claude. "Etude de la compliance artérielle chez l'hémodialysé chronique par la mesure de l'intervalle QKd." Bordeaux 2, 1998. http://www.theses.fr/1998BOR23026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Xiaole, Ivan B. Djordjevic, and Mark A. Neifeld. "Multiple spatial modes based QKD over marine free-space optical channels in the presence of atmospheric turbulence." OPTICAL SOC AMER, 2016. http://hdl.handle.net/10150/622480.

Full text
Abstract:
We investigate a multiple spatial modes based quantum key distribution (QKD) scheme that employs multiple independent parallel beams through a marine free-space optical channel over open ocean. This approach provides the potential to increase secret key rate (SKR) linearly with the number of channels. To improve the SKR performance, we describe a back-propagation mode (BPM) method to mitigate the atmospheric turbulence effects. Our simulation results indicate that the secret key rate can be improved significantly by employing the proposed BPM-based multi-channel QKD scheme. (C) 2016 Optical Society of America
APA, Harvard, Vancouver, ISO, and other styles
10

Djordjevic, Ivan B. "Integrated Optics Modules Based Proposal for Quantum Information Processing, Teleportation, QKD, and Quantum Error Correction Employing Photon Angular Momentum." IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/615122.

Full text
Abstract:
To address key challenges for both quantum communication and quantum computing applications in a simultaneous manner, we propose to employ the photon angular momentum approach by invoking the well-known fact that photons carry both the spin angular momentum (SAM) and the orbital angular momentum (OAM). SAM is associated with polarization, while OAM is associated with azimuthal phase dependence of the complex electric field. Given that OAM eigenstates are mutually orthogonal, in principle, an arbitrary number of bits per single photon can be transmitted. The ability to generate/analyze states with different photon angular momentum, by using either holographic or interferometric methods, allows the realization of quantum states in multidimensional Hilbert space. Because OAM states provide an infinite basis state, while SAM states are 2-D only, the OAM can also be used to increase the security for quantum key distribution (QKD) applications and improve computational power for quantum computing applications. The goal of this paper is to describe photon angular momentum based deterministic universal quantum qudit gates, namely, {generalized-X, generalized-Z, generalized-CNOT} qudit gates, and different quantum modules of importance for various applications, including (fault-tolerant) quantum computing, teleportation, QKD, and quantum error correction. For instance, the basic quantum modules for quantum teleportation applications include the generalized-Bell-state generation module and the QFT-module. The basic quantum module for quantum error correction and fault-tolerant computing is the nonbinary syndrome calculator module. The basic module for entanglement assisted QKD is either the generalized-Bell-state generation module or the Weyl-operator-module. The possibility of implementing all these modules in integrated optics is discussed as well. Finally, we provide security analysis of entanglement assisted multidimensional QKD protocols, employing the proposed qudit modules, by taking into account the imperfect generation of OAM modes.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "QKDN"

1

Suda, M. "QKD Systems." In Applied Quantum Cryptography, 97–121. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04831-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dávila, J., D. Lancho, J. Martinez, and V. Martin. "On QKD Industrialization." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 297–302. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11731-2_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ciesla, Robert. "Implementations of QKD." In Encryption for Organizations and Individuals, 247–56. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6056-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wolf, Ramona. "Device-Independent QKD." In Quantum Key Distribution, 159–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Djordjevic, Ivan B. "Discrete Variable (DV) QKD." In Physical-Layer Security and Quantum Key Distribution, 267–322. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Djordjevic, Ivan B. "Continuous Variable (CV)-QKD." In Physical-Layer Security and Quantum Key Distribution, 323–89. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schauer, S. "Attack Strategies on QKD Protocols." In Applied Quantum Cryptography, 71–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04831-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maurhart, O. "QKD networks based on Q3P." In Applied Quantum Cryptography, 151–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04831-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Djordjevic, Ivan B. "Quantum-Key Distribution (QKD) Fundamentals." In Physical-Layer Security and Quantum Key Distribution, 211–65. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Islam, Nurul T. "High-Dimensional Time-Phase QKD." In High-Rate, High-Dimensional Quantum Key Distribution Systems, 29–56. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98929-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "QKDN"

1

Liu, Xiang, Xiaosong Yu, Yongli Zhao, Xiaotian Zhou, Shimulin Xie, Jincheng Li, and Jie Zhang. "Multi-path based Quasi-real-time Quantum Key Distribution in Software Defined Quantum Key Distribution Networks (SD-QKDN)." In 2019 18th International Conference on Optical Communications and Networks (ICOCN). IEEE, 2019. http://dx.doi.org/10.1109/icocn.2019.8934684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Song, Fang, Liusheng Huang, Wei Yang, and Kan Yang. "Building QKD Networks Based On a Novel QKD Scheme." In 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC). IEEE, 2008. http://dx.doi.org/10.1109/icnsc.2008.4525288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"FBG-Based Multidimensional QKD." In 2018 20th International Conference on Transparent Optical Networks (ICTON). IEEE, 2018. http://dx.doi.org/10.1109/icton.2018.8473590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Morrow, Alex, Don Hayford, and Matthieu Legre. "Battelle QKD test bed." In 2012 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2012. http://dx.doi.org/10.1109/ths.2012.6459843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brandt, Howard E. "Entangling probes of QKD." In Defense and Security Symposium, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2006. http://dx.doi.org/10.1117/12.661536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Berzanskis, A. "QKD in existing networks." In IEE Seminar on Quantum Cryptography: Secure Communications. IEE, 2005. http://dx.doi.org/10.1049/ic:20050584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lenhart, Gaby. "QKD standardization at ETSI." In QUANTUM AFRICA 2010: THEORETICAL AND EXPERIMENTAL FOUNDATIONS OF RECENT QUANTUM TECHNOLOGY. AIP, 2012. http://dx.doi.org/10.1063/1.4746061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tamaki, Kiyoshi. "Enhancing implementation security of QKD." In Quantum Technologies and Quantum Information Science, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2017. http://dx.doi.org/10.1117/12.2280737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Abu-Ayyash, Abdulla M., and Naim Ajlouni. "QKD: Recovering Unused Quantum Bits." In Communication Technologies: from Theory to Applications (ICTTA). IEEE, 2008. http://dx.doi.org/10.1109/ictta.2008.4530283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Klop, Wimar, Rudolf Saathof, Niek Doelman, Michael Gruber, Thijs Moens, Clara I. Osorio Tamayo, and Cristina Duque. "QKD optical ground terminal developments." In International Conference on Space Optics — ICSO 2021, edited by Zoran Sodnik, Bruno Cugny, and Nikos Karafolas. SPIE, 2021. http://dx.doi.org/10.1117/12.2599217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography