Quantum Key Distribution Protocols: A Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protocol, SARG04 protocol, E91 protocol and many more. In this paper all the concerned protocols that share a secret key is explained and comparative study of all protocols shown.
Authors and Affiliations
Hitesh Singh , D. L. Gupta , A. K Singh
Testing By Application Software On-Brute Force Attack On Open Functionality Secured
.
WordNet Sense Disambiguation Based Patent Search
Abstract: Patent Search has attracted considerable attention recently for finding existing relevant patents andvalidating new patent application. Earlier try-and-see approach was used to find any relevant underlyin...
Internet Worm Classification and Detection using Data MiningTechniques
Abstract: Internet worm means separate malware computer programs that repeated itself and in order to spreadone computer to another computer. Malware includes computer viruses, worms, root kits, key loggers, Trojan...
lntrusion Detection System Using GA
Abstract: Intrusion detection has become an essential component of computer security in recent years so many technologies have been developed to protect our system or network from intruders such as antivirus, firew...
A classification of methods for frequent pattern mining
Abstract: Data mining refers to extracting knowledge from large amounts of data. Frequent pattern mining is aheavily researched area in the field of data mining with wide range of applications. Frequent itemsets is...