The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An efficient scheme is proposed for faithful teleportation of an arbitrary unknown multi-qudit state via multi-qudit quantum states, in which the teleportation is completely deterministic providing that one can successfully construct a group of generalized Bell pairs. Our scheme can effectively avoid possible destruction of the unknown state to be teleported, which however may occur in existing probabilistic...
Wireless technology is rapidly evolving, and is playing an important role in the lives of people throughout the world. Due to the nature of wireless communications, it is possible for an adversary to snoop on confidential communications or modify them to gain access to the wireless networks more easily than with wired networks. Out of many wireless networks, WiFi, known as IEEE 802.11, has attracted...
We present a systematic scheme for deterministic teleportation in a quantum switch network based on probabilistic communication channels. In this scheme, the burden of terminal agents originally caused by the introduction of auxiliary qubits and the operations of high dimensional unitary gates could be released. In such a way, our scheme will bring great convenience to realize deterministic teleportation...
It is the fact that wireless local area networks are increasingly deployed by businesses, government and SOHO users as they offer many advantages to its customers with mobility, flexibility, convenience etc. It opened a wide range of new commercial areas for hardware vendors, at low cost. This justifies why wireless networks have become one of the most widely used communication systems in the world...
Today's security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the nature that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication...
In Observing and interacting with the real physical world sensor networks now take new opportunities for play the roles in almost everywhere. They are composed of a large number of sensor nodes and each sensor node has capabilities of sensing, processing, and communication, which underpinned by limited energy. Reducing energy consumption was, is and will be a major concern in sensor networks. For...
It is the fact that providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. However, traditional QKD can work well is because of the full optical system will meet the requirement of photon communication, which becomes serious problem in wireless communication...
It is the fact that wireless networks have become one of the most widely used communication systems in the world due to the wireless network's natures. However, at the same time providing secure communication for wireless networks has become one of the prime concerns. There are many ways to improve security issues, one of them, titled quantum cryptography, namely quantum key distribution (QKD), offers...
It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely Quantum Key Distribution (QKD), offers the promise of unconditional security. In this paper, we have extended our previous research work to a new protocol with...
This paper established a new security mechanism for online communications using mobile agents. E-health has been widely used as a communication system and information changes to deliver health services to the users through the Internet. However, the Internet imposes threats that will risk the information in transit. Therefore it is important to ensure that the communication is safe and the userpsilas...
It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous research work to a new method of integrating...
It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous...
Wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In our paper, we shall extend our previous research work to a new method of integrating quantum cryptography...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.