98
Views
61
CrossRef citations to date
0
Altmetric
Articles

An enhanced quantum key distribution protocol for security authentication

, , , &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (33)

Megha Gupta & R. Rama Kishore. (2022) A highly robust and secure digital image watermarking using modified optimal foraging algorithm - based SVM classifier and hyperchaotic Fibonacci Q-matrix. Journal of Discrete Mathematical Sciences and Cryptography 25:7, pages 2079-2090.
Read now
S. Gnana Sanga Mithra & V. Vijayalaskmi. (2022) A mathematical model for breaching the blockades-mainstreaming transwomen and transmen in Chennai by using block fuzzy cognitive. Journal of Interdisciplinary Mathematics 25:3, pages 827-838.
Read now
Santosh Kumar, Neha Janu, Linesh Raja & Ankit Kumar. (2022) A fuzzy ISM analysis of factors in growth of initial coin offerings (ICOs). Journal of Interdisciplinary Mathematics 25:3, pages 815-825.
Read now
Osama R. Shahin, Rasha M. Abd El-Aziz & Ahmed I. Taloba. (2022) Detection and classification of Covid-19 in CT-lungs screening using machine learning techniques. Journal of Interdisciplinary Mathematics 25:3, pages 791-813.
Read now
Anjali Meena, Anima Vaish, Shweta Meena, Ramesh Chand Meena & Santosh Kumar. (2022) A mathematical model for analysing the significance of information technology resources in school education during pandemic. Journal of Interdisciplinary Mathematics 25:3, pages 741-752.
Read now
Ankit Kumar, Neeraj Sharma & Abhishek Kumar. (2022) End-to-end authentication based secure communication in vehicular ad hoc networks (VANET). Journal of Discrete Mathematical Sciences and Cryptography 25:1, pages 219-229.
Read now
Meena Siwach & Suman Mann. (2022) Anomaly detection for weblog data analysis using weighted PCA technique. Journal of Information and Optimization Sciences 43:1, pages 131-141.
Read now
Richa Rawal, Devesh Kumar Bandil & Srawan Nath. (2021) Data sparsity for twitter sentiment analysis in real-time from biased and noisy data. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2403-2413.
Read now
Ramesh Chand Meena, Keshav Meena, Ankit Kumar, Mukesh Gupta & Santosh Kumar. (2021) Status of address spoofing attack prevention techniques in software-defined networking (SDN). Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2341-2351.
Read now
Ankit Kumar, Neeraj Sharma & Abhishek Kumar. (2021) Improving security and privacy in VANET network using node authentication. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2471-2480.
Read now
C. Praveen Kumar & K. Rajendra Prasad. (2021) Multi-ROI segmentation for effective texture features of mammogram images. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2461-2469.
Read now
Priyanka, Bright Keswani & Rashid Hussain. (2021) Blockchain-based cryptography model to preserve privacy for smart contracts. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2279-2289.
Read now
Osama R. Shahin & Rady El Rwelli. (2021) Part of speech tagging for Arabic text based radial basis function. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2443-2459.
Read now
Anu Pius & D. R. Kirubaharan. (2021) Application of cryptography in data privacy using fuzzy graph theory. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2389-2401.
Read now
Alanazi Rayan & Hamoud Alshammari. (2021) Personal phone number privacy-preserving models for public use. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2377-2388.
Read now
Aakriti Sharma, Bright Keswani & Anjana Sangwan. (2021) Optimization of docker container security and its performance evaluation. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2365-2375.
Read now
Anjana Sangwan, Bright Keswani & Aakriti Sharma. (2021) Optimization of secure communication channel over the volunteer cloud and cloud computing. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2257-2266.
Read now
Neha Janu, Ankit Kumar, Linesh Raja, Vaibhav Bhatnagar, Abhishek Kumar, Santosh Kumar & Ramesh Chandra Poonia. (2021) Development of an efficient real-time H.264/AVC advanced video compression encryption scheme. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2245-2255.
Read now
Anju Yadav, Bhavna Saini, Vivek K. Verma & Vipin Pal. (2021) A joint medical image compression and encryption using AMBTC and hybrid chaotic system. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2233-2244.
Read now
Priyanka, Bright Keswani & Rashid Hussain. (2021) Assimilation of blockchain over cloud computing. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2267-2277.
Read now
Ruchi Kaushik, Vijander Singh & Rajani Kumari. (2021) Multi-class SVM based network intrusion detection with attribute selection using infinite feature selection technique. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2137-2153.
Read now
Gerardo Iovane. (2021) Computational quantum key distribution (CQKD) on decentralized ledger and blockchain. Journal of Discrete Mathematical Sciences and Cryptography 24:4, pages 1021-1042.
Read now
Prateek Agrawal, Vishu Madaan, Aditya Roy, Rajani Kumari & Harshal Deore. (2021) FOCOMO: Forecasting and monitoring the worldwide spread of COVID-19 using machine learning methods. Journal of Interdisciplinary Mathematics 24:2, pages 443-466.
Read now
Preeti Garg & R. Rama Kishore. (2020) Optimized color image watermarking through watermark strength optimization using particle swarm optimization technique. Journal of Information and Optimization Sciences 41:6, pages 1499-1512.
Read now
Payal M Thakrar, Vijander Singh & Ketan Kotecha. (2020) Improved route selection algorithm based on TORA over mobile adhoc network. Journal of Discrete Mathematical Sciences and Cryptography 23:2, pages 617-629.
Read now
Rakesh Sharma, Poonam Jindal & Brahmjit Singh. (2020) Study and analysis of key generation techniques in internet of things. Journal of Discrete Mathematical Sciences and Cryptography 23:2, pages 373-383.
Read now
Lastika Sethi, Anay Dave, Raj Bhagwani & Ameyaa Biwalkar. (2020) Video security against deepfakes and other forgeries. Journal of Discrete Mathematical Sciences and Cryptography 23:2, pages 349-363.
Read now
Sampath Kumar Venkatachary, Jagdish Prasad, Ravi Samikannu, Annamalai Alagappan & Leo John Baptist Andrews. (2020) Cybersecurity infrastructure challenges in IoT based virtual power plants. Journal of Statistics and Management Systems 23:2, pages 263-276.
Read now
Mala Yadav & Sachin Gupta. (2020) Hybrid meta-heuristic VM load balancing optimization approach. Journal of Information and Optimization Sciences 41:2, pages 577-586.
Read now
Preeti Garg & R. Rama Kishore. (2020) An improved and secured digital image watermarking technique using DCT, fuzzy entropy and image scrambling in hybrid domain. Journal of Discrete Mathematical Sciences and Cryptography 23:1, pages 177-186.
Read now
Vishal Choudhary & Sunil Taruna. (2020) The highly secure polynomial pool-based key pre-distribution scheme for wireless sensor network. Journal of Discrete Mathematical Sciences and Cryptography 23:1, pages 95-114.
Read now
Deepak Kshirsagar & Sandeep Kumar. (2020) An ensemble feature reduction method for web-attack detection. Journal of Discrete Mathematical Sciences and Cryptography 23:1, pages 283-291.
Read now
Kamalanathan Chandran, Sunita Panda & Bhaskara Sreenivas. (2020) An efficient secure authentication scheme for personalized healthcare system. Journal of Interdisciplinary Mathematics 23:1, pages 215-227.
Read now

Articles from other publishers (28)

Hu Yuan, Daniel S. Fowler, Carsten Maple & Gregory Epiphaniou. (2023) Analysis of outage performance in a 6G‐V2X communications system utilising free‐space optical quantum key distribution. IET Quantum Communication 4:4, pages 191-199.
Crossref
Tao Hai, Arindam Sarkar, Rahul Karmakar, Mohammad Zubair Khan, Ayman Noor, Talal H. Noor, Abhinav Kumar & A. Yvaz. (2023) Neural session key exchange in the Industrial Internet of Things using hyperchaotic-guided vector-valued artificial neural synchronization. Engineering Applications of Artificial Intelligence 125, pages 106683.
Crossref
Arindam Sarkar, Rahul Karmakar & Mandira Roy. (2023) GAN-guided artificial neural collaborative complex computation for efficient neural synchronization. Multimedia Tools and Applications.
Crossref
Mohammad Zubair Khan, Arindam Sarkar & Abdulfattah Noorwali. (2023) Memristive hyperchaotic system-based complex-valued artificial neural synchronization for secured communication in Industrial Internet of Things. Engineering Applications of Artificial Intelligence 123, pages 106357.
Crossref
Mohammad Zubair Khan. (2023) Hyperchaotic-Based Neural Synchronized Complex Key Exchange in Wireless Sensor Network. Arabian Journal for Science and Engineering 48:8, pages 10285-10297.
Crossref
Arindam Sarkar. (2022) A symmetric neural cryptographic key generation scheme for Iot security. Applied Intelligence 53:8, pages 9344-9367.
Crossref
Xiaoling Tao, Ziyi Liu, Feng Zhao, Rushi Lan, Runrong Liu, Lianyou Fu & Yifu Ouyang. (2023) An SSA-LC-DAE Method for Extracting Network Security Elements. IEEE Transactions on Network Science and Engineering 10:2, pages 1175-1185.
Crossref
N. Gopinath & S. Prayla Shyry. (2022) Enhancing the cloud security using side channel attack free QKD with entangled fuzzy logic. Journal of Intelligent & Fuzzy Systems 43:6, pages 8359-8369.
Crossref
Shaymaa E. Sorour, Hanan E. Abdelkader, Karam M. Sallam, Ripon K. Chakrabortty, Michael J. Ryan & Amr Abohany. (2022) An analytical code quality methodology using Latent Dirichlet Allocation and Convolutional Neural Networks. Journal of King Saud University - Computer and Information Sciences 34:8, pages 5979-5997.
Crossref
Swati Kumari. (2021) Enhancing the Quantum Communication Channel Using a Novel Quantum Binary Salt Blowfish Strategy. Wireless Personal Communications 123:2, pages 1085-1102.
Crossref
Mohammad Zubair Khan, Arindam Sarkar, Hamza Ghandorh, Maha Driss & Wadii Boulila. (2022) Information Fusion in Autonomous Vehicle Using Artificial Neural Group Key Synchronization. Sensors 22:4, pages 1652.
Crossref
Neha Janu, Ankit Kumar, Pankaj Dadheech, Gajanand Sharma, Ashutosh Kumar & Linesh Raja. (2021) Multiple Watermarking Scheme for Video & Image for Authentication & Copyright Protection. IOP Conference Series: Materials Science and Engineering 1131:1, pages 012020.
Crossref
Sanwta Ram Dogiwal, Pankaj Dadheech, Ankit Kumar, Linesh Raja, Abhishek Kumar & Mahender Kumar Beniwal. (2021) An Automated Optimize Utilization of Water and Crop Monitoring in Agriculture Using IoT. IOP Conference Series: Materials Science and Engineering 1131:1, pages 012019.
Crossref
G. Madhukar Rao, K. Srinivas, Sayyad Samee, K Venkatesh, Pankaj Dadheech, Linesh Raja & Garvit Yagnik. (2021) A Secure and Efficient Data Migration Over Cloud Computing. IOP Conference Series: Materials Science and Engineering 1099:1, pages 012082.
Crossref
S Bhavana & V Vijayalakshmi. (2021) Model of Using New Media Technology in Higher Education Learning. IOP Conference Series: Materials Science and Engineering 1099:1, pages 012081.
Crossref
Rajesh Kumar Tripathi, Linesh Raja, Ankit Kumar, Pankaj Dadheech, Abhishek Kumar & M N Nachappa. (2021) A Cluster Based Classification for Imbalanced Data Using SMOTE. IOP Conference Series: Materials Science and Engineering 1099:1, pages 012080.
Crossref
Bijesh Dhyani, Pushkar Nigam, Ankit Kumar, Abhishek Kumar, K Venkatesan & V D Ambeth Kumar. (2021) Arbitrage-Type Trade Using Correlation Analysis. IOP Conference Series: Materials Science and Engineering 1099:1, pages 012079.
Crossref
Lalan Kumar & Kamred Udham Singh. (2021) A Secure Image Watermarking Scheme Based on DWT, SVD and Arnold Transform. IOP Conference Series: Materials Science and Engineering 1099:1, pages 012076.
Crossref
Chhutten Singh Yadav, Abhishek Kumar, Ankit Kumar & Pankaj Dadheech. (2021) Design and Analysis of an Efficient Multi-Relational Decision Tree Learning Algorithm. IOP Conference Series: Materials Science and Engineering 1099:1, pages 012075.
Crossref
Pankaj Dadheech, Ankit Kumar, Vijander Singh, Linesh Raja & Ramesh C. Poonia. 2021. Smart Agricultural Services Using Deep Learning, Big Data, and IoT. Smart Agricultural Services Using Deep Learning, Big Data, and IoT 1 31 .
Ankit Kumar, Pankaj Dadheech, Vijander Singh & Linesh Raja. 2021. Data Deduplication Approaches. Data Deduplication Approaches 255 279 .
Umesh Maru, Gajendra Sujediya & Yashika Saini. 2021. Proceedings of International Conference on Communication and Computational Technologies. Proceedings of International Conference on Communication and Computational Technologies 97 111 .
Atreya Dyaram, V. Manojkumar, J. Sairabanu & I. Sumaiya Thaseen. 2021. Proceedings of International Conference on Communication and Computational Technologies. Proceedings of International Conference on Communication and Computational Technologies 85 95 .
Gaurav Kapoor. 2021. Proceedings of International Conference on Communication and Computational Technologies. Proceedings of International Conference on Communication and Computational Technologies 73 84 .
Sachin Kumar Singh, Manish Yadav, Abhishek Chaudhary & Umang Singhal. 2021. Proceedings of International Conference on Communication and Computational Technologies. Proceedings of International Conference on Communication and Computational Technologies 535 545 .
Shreya Agrawal, Mayank Patel & Amit Sinhal. 2021. Proceedings of International Conference on Communication and Computational Technologies. Proceedings of International Conference on Communication and Computational Technologies 279 286 .
Ankit Kumar, Pankaj Dadheech & Utpaladitya Chaudhary. (2020) Energy Conservation in WSN: A Review of Current Techniques. Energy Conservation in WSN: A Review of Current Techniques.
Sumit Kumar, Madan Lal Saini & Sandeep Kumar. 2020. Microservices in Big Data Analytics. Microservices in Big Data Analytics 29 38 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.