98
Views
61
CrossRef citations to date
0
Altmetric
Articles

An enhanced quantum key distribution protocol for security authentication

, , , &

References

  • Cohen, F (1990). A short history of cryptography. Retrieved May 4, 2009, from http://www New World Encyclopedia (2007).
  • D. Kahn. The Codebreakers: The Story of Secret Writing, Macmillan, New York (1967).
  • [3] Homer, Iliad 6.213, transl. Ian Johnston (in English), Malaspina University-College, Nanaimo, BC, Canada (2000).
  • Charles Anthon, The first six books of Homer’s Iliad with English notes, critical & explanatory, a metrical index, & Homeric glossary, Harper & Brothers, New York, p. 396 (1875).
  • C H Bennett, Theory of entanglement and entanglement-assisted communication, Bulletin of the American Physical Society56, APS, 201.
  • Pankaj Dadheech, Dinesh Goyal, Sumit Srivastava & C. M. Choudhary, (2018), “An Efficient Approach for Big Data Processing Using Spatial Boolean Queries”, Journal of Statistics and Management Systems (JSMS), 21:4, 583-591. doi: 10.1080/09720510.2018.1471258
  • C.H. Bennet, F. Bessette, G. Brassard, L. Salvail and J. Smolin, “Experimental quantum cryptography”, Journal of cryptology, Vol. 5, pp. 3-28, 1992.
  • M. Gardner, Mathematical Games, A New Kind of Cipher That Would Take Millions of Years to Break, Sci. Am. 237, pp. 120-124 (1977). doi: 10.1038/scientificamerican0877-120
  • Kalra, Manish, and Ramesh C. Poonia. “Design a new protocol for quantum key distribution.” Journal of Information and Optimization Sciences 38.6 (2017): 1047-1054. doi: 10.1080/02522667.2017.1374723
  • Poonia, Ramesh C., and Manish Kalra. “Bridging approaches to reduce the gap between classical and quantum computing.” Journal of Information and Optimization Sciences 37.2 (2016): 279-283. doi: 10.1080/02522667.2015.1131024
  • Poonia, Ramesh C., and Linesh Raja. “On-Demand Routing Protocols for Vehicular Cloud Computing.” Vehicular Cloud Computing for Traffic Management and Systems. IGI Global, 2018. 151-177. doi: 10.4018/978-1-5225-3981-0.ch007
  • Saini, Arjun, and Vijander Singh. “Implementation and Performance Analysis of Improved DSR Routing Protocol to Detect an Inimical Node in MANETs Using NS-2.” International Journal for Research and Development in Engineering (IJRDE) 2 (2013): 33-44.
  • Raja, Linesh, and Sonali Vyas. “The Study of Technological Development in the Field of Smart Farming.” Smart Farming Technologies for Sustainable Agricultural Development. IGI Global, 2019. 1-24.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.