Multiuser quantum communication networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

Guest Editorial Multiuser Detection for Advanced Communication Systems and Networks

detection of multiuser signals, coupled with associated challenges in achieving this potential at affordable receiver complexity, has motivated significant amount of research to be carried out in the area of multiuser detection (MUD) in the past two decades. Much of the early research in this important area has been centered around systems employing code division multiple access (CDMA) promisin...

متن کامل

Multiuser Full-Duplex Communication

The inevitable high bandwidth requirement in the future cellular network has made researchers to come up with revolutionary ideas in recent times. One such idea is the introduction of full-duplex (FD) communication. A FD systems make the simultaneous in-band transceiving feasible, i.e, simultaneous uplink and downlink operation using the same spectrum resources. In recent years, extensive work ...

متن کامل

Quantum Cryptography : Security analyses of multiuser quantum communication with embedded authentication

Three quantum cryptographic protocols of multiuser quantum networks with embedded authentication, allowing quantum key distribution or quantum direct communication, are discussed in this work (Hong et al., 2006, Lee et al., 2005, 2006). The security of the protocols against different types of attacks is analysed with a focus on various impersonation attacks and the man-in-the-middle attack. On ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review A

سال: 2007

ISSN: 1050-2947,1094-1622

DOI: 10.1103/physreva.75.022330