Login / Signup

Security Analysis of Gaussian and Discrete Modulations in FSO/CV-QKD Systems Employing LLO Under Phase and Amplitude Attacks.

Sara AhmedNancy AlshaerKhaled A. AlaghbariTawfik Ismail
Published in: IEEE Access (2022)
Keyphrases
  • security analysis
  • high security
  • data mining
  • distributed systems
  • public key
  • stream cipher
  • database systems
  • wavelet transform
  • peer to peer
  • security properties
  • image encryption