International Conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, 2014 Dubai (UAE) 2014
DOI: 10.15242/iie.e1014057
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Key Distribution Approach for Cloud Authentication: Enhance Tight Finite Key

Abstract: The definite length of the key size has been a hot debate since 1940. How we are going to measure it? Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the extraordinary time needed to break the code. Quantum Key Distrib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 21 publications
0
0
0
Order By: Relevance