We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 3,068 results
  1. Research on intelligent search-and-secure technology in accelerator hazardous areas based on machine vision

    Prompt radiation emitted during accelerator operation poses a significant health risk, necessitating a thorough search and securing of hazardous...

    Ying-Lin Ma, Yao Wang, ... Hui-Jie Zhang in Nuclear Science and Techniques
    Article 01 April 2024
  2. Controlled Quantum Secure Direct Communication with Authentication Based on Quantum Search Algorithm

    A controlled quantum secure direct communication protocol with authentication based on quantum search algorithm is put forward, consisting of three...

    You-Feng Yang, Long-Zhen Duan, ... Xu-Ming **e in International Journal of Theoretical Physics
    Article 02 July 2022
  3. Quantum Secure Multi-Party Summation Based on Grover’s Search Algorithm

    In this paper, a quantum secure multi-party summation protocol is proposed based on some properties of Grover’s search algorithm. In the protocol,...

    **n Zhang, Song Lin, Gong-De Guo in International Journal of Theoretical Physics
    Article 01 September 2021
  4. QBIoV: a secure data sharing scheme for the Internet of vehicles based on quantum-enabled blockchain

    Internet of vehicles (IoV) technology connects various types of vehicles through the Internet of Things to achieve mutual communication and data...

    Ang Liu, **u-bo Chen, ... Huamin Feng in Quantum Information Processing
    Article 03 June 2024
  5. Symmetric private information retrieval supported by quantum-secure key-exchange network

    Quantum key distribution provides a provably secure way for private key distribution, which enables the practical implementation of information...

    Article Open access 14 October 2022
  6. Secure opportunistic based void-hold routing for underwater acoustic sensor networks

    The primary objective of this research is to examine the difficulties encountered in underwater acoustic Sensor Networks (UASN) due to empty spaces...

    Ashok Battula, S. Emalda Roslin in Optical and Quantum Electronics
    Article 14 December 2023
  7. Fiber-based quantum secure direct communication without active polarization compensation

    Quantum secure direct communication (QSDC) that allows people to directly transmit confidential information through insecure channels is an important...

    **n Liu, Di Luo, ... Ke** Wei in Science China Physics, Mechanics & Astronomy
    Article 09 November 2022
  8. Development of secure and authentic access controlling techniques using the pushback request response (PRR) approach for blockchain healthcare applications

    Access control systems have become integral to every organization’s defensive arsenal to protect sensitive information and ensure that businesses...

    Maheshwari Venkatesan, Prasanna Mani in Optical and Quantum Electronics
    Article 25 March 2024
  9. Depth–measurement trade-off for quantum search on block ciphers

    Grover’s algorithm has been widely used for quantum key search to attack block ciphers with a quadratic speedup as compared to classical brute-force...

    Wei Jie Ng, Chik How Tan in Quantum Information Processing
    Article 16 April 2024
  10. Practical decoy-state quantum secure direct communication

    Quantum secure direct communication (QSDC) has been demonstrated in both fiber-based and free-space channels using attenuated lasers. Decoy-state...

    **n Liu, Zijian Li, ... Ke** Wei in Science China Physics, Mechanics & Astronomy
    Article 28 October 2021
  11. Quantum attacks against BBB secure PRFs or MACs built from public random permutations

    Since the seminal work of Chen et al. to construct pseudorandom functions (PRFs) from the public random permutations, a series of designs of...

    Jiehui Nan, Honggang Hu, ... Yiyuan Luo in Quantum Information Processing
    Article 17 December 2022
  12. Quantum Key Agreement Protocol Based on Quantum Search Algorithm

    Quantum key agreement (QKA) and quantum search algorithm (QSA) are two important branches in quantum topic. The former asks all participants to...

    ** Huang, Shi-Bin Zhang, ... Min Hou in International Journal of Theoretical Physics
    Article 19 January 2021
  13. Multi-party semi-quantum secure direct communication using Greenberger–Horne–Zeilinger states

    Two three-party semi-quantum communication protocols (SQSDC protocol and SQD protocol) based on Greenberger–Horne–Zeilinger (GHZ) states are designed...

    You-Feng Yang, Long-Zhen Duan, ... Wen-Ying Duan in Quantum Information Processing
    Article 17 September 2022
  14. A Secure Bank Transaction Using Blockchain Computing and Forest Oddity

    The Indian banking system has progressed from nationalization to liberalization. The banks are the backbone of any country wherever financial support...
    Manish Thakral, Sandeep Pratap Singh in Security and Privacy in Cyberspace
    Chapter 2022
  15. Tree-based quantum anonymous ranking protocol

    We propose an improved quantum anonymous multiparty multidata ranking (QAMMR) protocol based on the binary search tree. In a QAMMR protocol, multiple...

    Justin Joseph, Syed Taqi Ali in Quantum Information Processing
    Article 05 July 2024
  16. A novel image encryption scheme combing optical chaos scrambling, DNA diffusion strategy and MOPSO algorithm

    A secure encryption scheme, combining multi-objective particle swarm optimization (MOPSO), optical chaos, and DNA algorithm is proposed and...

    Tao **ao, Qiliang Li, Haoruo Bai in Optical and Quantum Electronics
    Article 16 March 2024
  17. Quantum Secure Multi-party Private Set Intersection Cardinality

    As we know that data sharing, a critical element in social networks, has the benefits of exploring important information, while also has the...

    Bai Liu, Mingwu Zhang, Runhua Shi in International Journal of Theoretical Physics
    Article Open access 07 May 2020
  18. Quantum blockchain architecture using cyclic QSCD and QKD

    Quantum blockchain (QBC) is a novel decentralised concept anticipated to offer an alternative to the classical blockchain to provide transaction...

    Mandeep Kumar, Bhaskar Mondal in Quantum Information Processing
    Article 10 March 2024
  19. Quantum circuit implementation and resource analysis of LBlock and LiCi

    Due to Grover’s algorithm, any exhaustive search attack of block ciphers can achieve a quadratic speed-up. To implement Grover’s exhaustive search...

    **aoYu **g, YanJun Li, ... Qi Wang in Quantum Information Processing
    Article 16 September 2023
  20. Quantum implementation of SHA1 and MD5 and comparison with classical algorithms

    The foundation of this research is the quantum implementation of two hashing algorithms, namely Secure Hash Algorithm (SHA1) and Message Digest...

    Prodipto Das, Sumit Biswas, Sandip Kanoo in Quantum Information Processing
    Article 09 May 2024
Did you find what you were looking for? Share feedback.