MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference 2014
DOI: 10.1109/melcon.2014.6820559
|View full text |Cite
|
Sign up to set email alerts
|

Quantum cryptography and chaos for the transmission of security keys in 802.11 networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…However, the chaotic signal is pseudo-random and may appear as noise for unauthorized users. The idea of taking advantage of digital chaotic systems and of constructing chaotic cryptosystems has been extensively investigated and attracted many researchers (Awad, 2010) - (Rostom et al, 2014) but very few researchers considered using the chaos for searchable encryption. In (Awad et al, 2015), we proposed new minhash methods based on Piece Wise Linear Chaotic Map (PWLCM).…”
Section: Chaotic Minhash Methodsmentioning
confidence: 99%
“…However, the chaotic signal is pseudo-random and may appear as noise for unauthorized users. The idea of taking advantage of digital chaotic systems and of constructing chaotic cryptosystems has been extensively investigated and attracted many researchers (Awad, 2010) - (Rostom et al, 2014) but very few researchers considered using the chaos for searchable encryption. In (Awad et al, 2015), we proposed new minhash methods based on Piece Wise Linear Chaotic Map (PWLCM).…”
Section: Chaotic Minhash Methodsmentioning
confidence: 99%
“…Irrespective of these mentioned shortcomings, however, aggressive attempts are being made to integrate QKD with classical optical networks. Inauguration of the 2000km Beijing-Shanghai Quantum Line in 2017 [21], the implementation of BB84 for transmitting secret keys in 802.11 wireless architecture and satellite communications are the major milestones that have paved the way for the beginning of a practical era of quantum cryptography.…”
Section: Emerging Trends For Implementation Of Bb84 Protocolmentioning
confidence: 99%
“…The investigation was provided at node level so that the multiple communications is provided. R. Rostom, B. Bakhache [9] has worked on congestion adaptive Zigbee network generation. The novel improved Zigbee protocol is defined against the delay, congestion and communication loss.…”
Section: Related Workmentioning
confidence: 99%