Author of the publication

Eavesdropping Detection in BB84 Quantum Key Distribution Protocols.

, , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2689-2701 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Cluster Network for Wellness Sports Industry., , and . ICITCS, page 1-4. IEEE Computer Society, (2016)A fault tolerant channel allocation scheme in distributed cloud networks., , , , , and . Clust. Comput., 18 (4): 1423-1433 (2015)Design of Path Selection Scheme in Multi-layer on Multi-domain Network., , , and . JNIT, 1 (3): 4-11 (2010)Eavesdropping Detection in BB84 Quantum Key Distribution Protocols., , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2689-2701 (2022)A Virtualized Network Model for Wellness Information Technology Research., , , and . ICITCS, page 1-3. IEEE Computer Society, (2013)Detecting an Abnormal Traffic on Healthcare Network., , , and . ICITCS, page 1-4. IEEE Computer Society, (2015)Designing of Healthcare Information Network Using IPv6 Cloud Networks., , , , and . ICITCS, page 1-3. IEEE Computer Society, (2015)A Study on the Network Stability Measurement Based on Network Components with Weight Value., , , and . ICISA, page 1-4. IEEE, (2013)Service platform and monitoring architecture for network function virtualization (NFV)., , , , and . Clust. Comput., 19 (4): 1835-1841 (2016)Key-count differential-based proactive key relay algorithm for scalable quantum-secured networking., , , and . J. Opt. Commun. Netw., 15 (5): 282-293 (May 2023)