Login / Signup
Security Analysis of Gaussian and Discrete Modulations in FSO/CV-QKD Systems Employing LLO Under Phase and Amplitude Attacks.
Sara Ahmed
Nancy Alshaer
Khaled A. Alaghbari
Tawfik Ismail
Published in:
IEEE Access (2022)
Keyphrases
</>
security analysis
high security
data mining
distributed systems
public key
stream cipher
database systems
wavelet transform
peer to peer
security properties
image encryption