Quantum secure direct communication using entanglement and super dense coding (English)
- New search for: Hegazy, Ola M.
- New search for: Eldin, Ayman M. Bahas
- New search for: Dakroury, Yasser H.
- New search for: Hegazy, Ola M.
- New search for: Eldin, Ayman M. Bahas
- New search for: Dakroury, Yasser H.
In:
SECRYPT, International Conference on Security and Cryptography, 2009, ICETE, International Joint Conference on e-Business and Telecommunications, 2009
;
175-181
;
2009
-
ISBN:
- Conference paper / Print
-
Title:Quantum secure direct communication using entanglement and super dense coding
-
Contributors:
-
Published in:
-
Publisher:
- New search for: INSTICC
-
Place of publication:Setubal
-
Publication date:2009
-
Size:7 Seiten, 3 Bilder, 10 Quellen
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 5
-
One-touch financial transaction authenticationBailey, Daniel V. / Brainard, John / Rohde, Sebastian / Paar, Christof et al. | 2009
- 13
-
Service and timeframe dependent unlinkable one-time pseudonymsVerslype, Kristof / Decker, Bart de et al. | 2009
- 69
-
Preventing wormhole attack in wireless ad hoc networks using cost-based schemesAzer, Marianne Amir / El-Kassas, Sherif Mohammed / El-Soudani, Mady Salid et al. | 2009
- 75
-
An offline peer-to-peer broadcasting scheme with anonymityKiyomoto, Shinsaku / Fukushima, Kazuhide / Martin, Keith M. et al. | 2009
- 101
-
RFID authentication protocols based on elliptic curvesHutter, Michael et al. | 2009
- 167
-
Implementing true random number generators in FPGAs by chip fillingCret, Octavian / Tudoran, Radu / Suciu, Alin / Györfi, Tamas et al. | 2009
- 175
-
Quantum secure direct communication using entanglement and super dense codingHegazy, Ola M. / Eldin, Ayman M. Bahas / Dakroury, Yasser H. et al. | 2009
- 190
-
Certified pseudonyms colligated with master secret keyPasupathinathan, Vijayakrihnan / Pieprzyk, Josef / Wang, Huaxiong et al. | 2009
- 198
-
The Chameleon Cipher-192 (CC-192). A polymorphic cipherSaeb, Magdy et al. | 2009
- 259
-
A chaos based encryption method using dynamical systems with strange attractorsSheikholeslam, Arash et al. | 2009
- 274
-
Ad-hoc on demand authentication chain protocol. An authentication protocol for ad-hoc networksHamad, A.M. / Khedr, W.I. et al. | 2009
- 285
-
Nmix: An ideal candidate for key mixingBhaumik, Jaydeb / Chowdhury, Dipanwita Roy et al. | 2009