Hybrid M-Ary in Braided Single Stage Approach for Multiphoton Quantum Secure Direct Communication Protocol
暂无分享,去创建一个
Zurina Mohd Hanapi | Zuriati Ahmad Zukarnain | Idawaty Ahmad | Nur Ziadah Harun | Z. Zukarnain | Z. Hanapi | Idawaty Ahmad | N. Harun
[1] Pramode K. Verma,et al. Multi-photon Quantum Secure Communication , 2018, Signals and Communication Technology.
[2] Chuan Wang,et al. Recent development in quantum communication , 2012 .
[3] P. Dhavachelvan,et al. A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications , 2021, J. King Saud Univ. Comput. Inf. Sci..
[4] Simon Foster,et al. Optics , 1981, Arch. Formal Proofs.
[5] Marcelo Eduardo Pellenz,et al. Lightweight Data Compression in Wireless Sensor Networks Using Huffman Coding , 2014, Int. J. Distributed Sens. Networks.
[6] Ashraf Y. A. Maghari,et al. Lossless Image Compression Techniques Comparative Study , 2016 .
[7] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[8] Nidhi Dhawale. Implementation of Huffman algorithm and study for optimization , 2014, 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).
[9] Pramode K. Verma,et al. Multi-stage quantum secure communication using polarization hopping , 2015, Secur. Commun. Networks.
[10] Subhash C. Kak. A Three-Stage Quantum Cryptography Protocol , 2005, ArXiv.
[11] Nigam Sangwan. Combining Huffman text compression with new double encryption algorithm , 2013, 2013 International Conference on Emerging Trends in Communication, Control, Signal Processing and Computing Applications (C2SPCA).
[12] Pramode K. Verma,et al. Implementation of Secure Quantum Protocol using Multiple Photons for Communication , 2012, ArXiv.
[13] Bin Gu,et al. Robust Quantum Secure Communication with Spatial Quantum States of Single Photons , 2013 .
[14] Masahito Hayashi,et al. Finite-block-length analysis in classical and quantum information theory , 2016, Proceedings of the Japan Academy. Series B, Physical and biological sciences.
[15] Michael R. Grimaila,et al. Using Modeling and Simulation to Study Photon Number Splitting Attacks , 2016, IEEE Access.
[16] Mark M. Wilde,et al. Quantum Rate Distortion, Reverse Shannon Theorems, and Source-Channel Separation , 2011, IEEE Transactions on Information Theory.
[17] Bhagyashri Darunkar,et al. MULTI-PHOTON TOLERANT QUANTUM KEY DISTRIBUTION PROTOCOLS FOR SECURED GLOBAL COMMUNICATION , 2017 .
[18] Pramode K. Verma,et al. Polarization based secure AES key transmission over optical fiber , 2016, 2016 IEEE International Conference on Communications (ICC).
[19] Pramode K. Verma,et al. The braided single-stage protocol for quantum secure communication , 2014, Sensing Technologies + Applications.
[20] Wei Zhang,et al. Quantum Secure Direct Communication with Quantum Memory. , 2016, Physical review letters.
[21] Yamamoto Hiroshi,et al. An implementation of steganography using construction of Huffman tree , 2012, 2012 International Symposium on Information Theory and its Applications.
[22] G. Georgiev,et al. Computerized Stokes analysis of optically active polymer films , 2010, 1009.1332.