This document summarizes a research study that investigated the effect of multiple eavesdroppers performing both cloning and intercept-resend attacks on the BB84 quantum key distribution protocol. The researchers considered models with N eavesdroppers performing cloning attacks followed by S eavesdroppers performing intercept-resend attacks, and vice versa. They calculated the mutual information between honest parties and the quantum error rate for each case. The results showed that the security of the exchanged key depends on the number of eavesdroppers and their attack parameters on the quantum channel.
Apresentação sobre Criptografia baseada em reticulados (lattices), realizada no contexto da disciplina de Post-Quantum Cryptography do PPGCC da UFSC.
Versão odp: http://coenc.td.utfpr.edu.br/~giron/presentations/aula_lattice.odp
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONSIJNSA Journal
One-way functions are widely used for encrypting the secret in public key cryptography, although they are regarded as plausibly one-way but have not been proven so. Here we discuss the public key cryptosystem based on the system of higher order Diophantine equations. In this system those Diophantine equations are used as public keys for sender and recipient, and both sender and recipient can obtain the shared secret through a trapdoor, while attackers must solve those Diophantine equations without trapdoor. Thus the scheme of this cryptosystem might be considered to represent a possible one-way function. We also discuss the problem on implementation, which is caused from additional complexity necessary for constructing Diophantine equations in order to prevent from attacking by tamperers.
Steganographic Scheme Based on Message-Cover matchingIJECEIAES
Steganography is one of the techniques that enter into the field of information security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the FaberSchauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.
Criptografía cuántica - fundamentos, productos y empresasSoftware Guru
La criptografía cuántica es una de las joyas de la corona del cómputo cuántico. Además de conocerse a detalle el fundamento teórico de los protocolos de esta disciplina, se ha hecho investigación experimental por más de dos décadas y, como resultado, existen ya equipos de criptografía cuántica que se pueden comprar e instalar bajo la lógica de cualquier producto comercial.
En esta plática, titulada “Criptografía cuántica - fundamentos, productos y empresas”, el Dr Venegas Andraca dará una introducción concisa a los protocolos de criptografía cuántica BB84 y EK91, describirá las ventajas que estos protocolos tienen respecto de protocolos populares de criptografía convencional, expondrá las restricciones tecnológicas de BB84 y EK91, presentará los equipos de criptografía cuántica disponibles en el mercado y dará un análisis sucinto de las estimaciones de crecimiento comercial de esta disciplina.
Image encryption using elliptical curve cryptosytem with hill cipherkarthik kedarisetti
IMAGE ENCRYPTION-BTECH FINAL YEAR PROJECT ZEROTH REVIEW.
Image encryption is rapidly increased recently by the increasing use of the internet and communication
media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption
techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the
symmetric techniques, it has a simple structure and fast computations, but weak security because sender
and receiver need to use and share the same private key within a non-secure channels. A new image
encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed
in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its
security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption
and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret
key matrix with dimensions 4 4 will be used as an example in this study. Entropy, Peak Signal to Noise
Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image
encryption efficiency and compare the encrypted image with the original image to evaluate the performance
of the proposed encryption technique.
Information security is one of the most important issues in the
recent times. Elliptic Curve Cryptography (ECC) is one of the most
efficient public key cryptosystems that is secured against adversaries
because it is hard for them to find the secret key and solve
the elliptic curve discrete logarithm problem. Its strengthened
security also comes from the small key size that is used in it with
the same level of safety compared to the other cryptosystems like RSA(Rivest–Shamir–Adleman))
Apresentação sobre Criptografia baseada em reticulados (lattices), realizada no contexto da disciplina de Post-Quantum Cryptography do PPGCC da UFSC.
Versão odp: http://coenc.td.utfpr.edu.br/~giron/presentations/aula_lattice.odp
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONSIJNSA Journal
One-way functions are widely used for encrypting the secret in public key cryptography, although they are regarded as plausibly one-way but have not been proven so. Here we discuss the public key cryptosystem based on the system of higher order Diophantine equations. In this system those Diophantine equations are used as public keys for sender and recipient, and both sender and recipient can obtain the shared secret through a trapdoor, while attackers must solve those Diophantine equations without trapdoor. Thus the scheme of this cryptosystem might be considered to represent a possible one-way function. We also discuss the problem on implementation, which is caused from additional complexity necessary for constructing Diophantine equations in order to prevent from attacking by tamperers.
Steganographic Scheme Based on Message-Cover matchingIJECEIAES
Steganography is one of the techniques that enter into the field of information security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the FaberSchauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.
Criptografía cuántica - fundamentos, productos y empresasSoftware Guru
La criptografía cuántica es una de las joyas de la corona del cómputo cuántico. Además de conocerse a detalle el fundamento teórico de los protocolos de esta disciplina, se ha hecho investigación experimental por más de dos décadas y, como resultado, existen ya equipos de criptografía cuántica que se pueden comprar e instalar bajo la lógica de cualquier producto comercial.
En esta plática, titulada “Criptografía cuántica - fundamentos, productos y empresas”, el Dr Venegas Andraca dará una introducción concisa a los protocolos de criptografía cuántica BB84 y EK91, describirá las ventajas que estos protocolos tienen respecto de protocolos populares de criptografía convencional, expondrá las restricciones tecnológicas de BB84 y EK91, presentará los equipos de criptografía cuántica disponibles en el mercado y dará un análisis sucinto de las estimaciones de crecimiento comercial de esta disciplina.
Image encryption using elliptical curve cryptosytem with hill cipherkarthik kedarisetti
IMAGE ENCRYPTION-BTECH FINAL YEAR PROJECT ZEROTH REVIEW.
Image encryption is rapidly increased recently by the increasing use of the internet and communication
media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption
techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the
symmetric techniques, it has a simple structure and fast computations, but weak security because sender
and receiver need to use and share the same private key within a non-secure channels. A new image
encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed
in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its
security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption
and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret
key matrix with dimensions 4 4 will be used as an example in this study. Entropy, Peak Signal to Noise
Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image
encryption efficiency and compare the encrypted image with the original image to evaluate the performance
of the proposed encryption technique.
Information security is one of the most important issues in the
recent times. Elliptic Curve Cryptography (ECC) is one of the most
efficient public key cryptosystems that is secured against adversaries
because it is hard for them to find the secret key and solve
the elliptic curve discrete logarithm problem. Its strengthened
security also comes from the small key size that is used in it with
the same level of safety compared to the other cryptosystems like RSA(Rivest–Shamir–Adleman))
A robust blind and secure watermarking scheme using positive semi definite ma...ijcsit
In the last decade the need for new and robust watermarking schemes has been increased because of the
large illegal possession by not respecting the intellectual property rights in the multimedia in the internet.
In this paper we introduce a novel blind robust watermarking scheme which exploits the positive circulant
matrices in frequency domain which is the SVD, Different applications such as copyright protection,
control and illicit distributions have been given. Simulation results indicate that the proposed method is
robust against attacks as common digital processing: compression, blurring, dithering, printing and
scanning, etc. and subterfuge attacks (collusion and forgery) also geometric distortions and
transformations. Furthermore, good results of NC (normalized correlation) and PSNR (Peak signal-tonoise
ratio) have been achieved while comparing with recent state of the art watermarking algorithms.
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMIJNSA Journal
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon cryptosystem the public key of Little Dragon Two is mixed type that is quadratic in plaintext and cipher text variables. So the public key size of Little Dragon Two is equal to Little Dragon Cryptosystem. Our public key algorithm is bijective and can be used for both encryption and signatures.
A new approach to analyze visual secret sharing schemes for biometric authent...ijfcstjournal
Secret sharing schemes are the methods for sharing
secret data over a class of users. Shares are rando
mly
distributed to all users of the secret data. The se
cret data can be obtained only when all the shares
are
joined together. Visual cryptography (VC) or Visual
Secret sharing Scheme (VSSS) is one such method
which implements secret sharing for images. Biometr
ic characteristics provide a unique natural signatu
re
of a person and it is widely accepted. Each biometr
ic technique has its advantages and disadvantages V
SSS
and biometrics have been identified as the two most
important aspects of digital security. Based on th
is
study, a new method to analyze VSSS for biometric a
uthentication is given in this paper.
https://telecombcn-dl.github.io/idl-2020/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
https://telecombcn-dl.github.io/dlai-2019/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
Cloud computing is an ever-growing field in today‘s era.With the accumulation of data and the
advancement of technology,a large amount of data is generated everyday.Storage, availability and security of
the data form major concerns in the field of cloud computing.This paper focuses on homomorphic encryption,
which is largely used for security of data in the cloud.Homomorphic encryption is defined as the technique of
encryption in which specific operations can be carried out on the encrypted data.The data is stored on a remote
server.The task here is operating on the encrypted data.There are two types of homomorphic encryption, Fully
homomorphic encryption and patially homomorphic encryption.Fully homomorphic encryption allow arbitrary
computation on the ciphertext in a ring, while the partially homomorphic encryption is the one in which
addition or multiplication operations can be carried out on the normal ciphertext.Homomorphic encryption
plays a vital role in cloud computing as the encrypted data of companies is stored in a public cloud, thus taking
advantage of the cloud provider‘s services.Various algorithms and methods of homomorphic encryption that
have been proposed are discussed in this paper
Elliptic Curve Cryptography (ECC) provides a secure
means of key exchange between communicating nodes using the
Diffie-Hellman (DH) Key Exchange algorithm. This work
presents an ECC encryption implementation using of the DH
key exchange algorithm. Both encryption and decryption of text
messages using this algorithm, have been attempted. In ECC,
encoding is carried out by mapping a message character to an
affine point on an elliptic curve. It can be observed from the
comparison of the proposed algorithm and Koblitz’s encoding
method, that the proposed algorithm is as secure as Koblitz’s
encoding method and the proposed algorithm has less
computational complexity as the encoding phase is eliminated
altogether. Hence, energy efficiency of the crypto system is
improved and the same can be used in resource constrained
applications, such as Wireless sensor networks (WSNs). It is
almost infeasible to attempt a brute force attack. The security
strength of the algorithm is proportional to the key length.
However, any increase in the key length results in more
communication overhead due to encryption.
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolIJAEMSJORNAL
Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primitives. Precisely, this technique is based on two laws of quantum mechanics, namely uncertainty principle and no-cloning theorem. The best known QKD is the BB84 protocol published by Bennett and Brassard in 1984. Since then, various QKD protocols have been developed for example a B92 protocol. This latter is similar to that of BB84but this time using only two non-orthogonal states of the four states of BB84. In this work, we develop the java simulation B92 protocol and we give some details of the implementation. Next, we show by an example how Alice (Initiator) can configure the protocol parameters before execution. Finally, we give the statistical results allowing to compare this protocol with that of BB84.
Secure quantum key distribution (QKD) promises a revolutionizing in optical applications such as encryption, and imaging. However, their implementation in real-world scenarios continues to be challenged. The goal of this work is to verify the presence of photon number splitting (PNS) attack in quantum cryptography system based on BB84 protocol and to obtain a maximum secure key length as possible. This was realized through randomly interleaving decoy states with mean photon numbers of 5.38, 1.588, and 0.48 between the signal states with mean photon numbers of 2.69, 0.794, and 0.24. Experiment results show that a maximum secure key length obtained from our system, which ignores eavesdropping cases, is 125 with 20% decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
A robust blind and secure watermarking scheme using positive semi definite ma...ijcsit
In the last decade the need for new and robust watermarking schemes has been increased because of the
large illegal possession by not respecting the intellectual property rights in the multimedia in the internet.
In this paper we introduce a novel blind robust watermarking scheme which exploits the positive circulant
matrices in frequency domain which is the SVD, Different applications such as copyright protection,
control and illicit distributions have been given. Simulation results indicate that the proposed method is
robust against attacks as common digital processing: compression, blurring, dithering, printing and
scanning, etc. and subterfuge attacks (collusion and forgery) also geometric distortions and
transformations. Furthermore, good results of NC (normalized correlation) and PSNR (Peak signal-tonoise
ratio) have been achieved while comparing with recent state of the art watermarking algorithms.
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMIJNSA Journal
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon cryptosystem the public key of Little Dragon Two is mixed type that is quadratic in plaintext and cipher text variables. So the public key size of Little Dragon Two is equal to Little Dragon Cryptosystem. Our public key algorithm is bijective and can be used for both encryption and signatures.
A new approach to analyze visual secret sharing schemes for biometric authent...ijfcstjournal
Secret sharing schemes are the methods for sharing
secret data over a class of users. Shares are rando
mly
distributed to all users of the secret data. The se
cret data can be obtained only when all the shares
are
joined together. Visual cryptography (VC) or Visual
Secret sharing Scheme (VSSS) is one such method
which implements secret sharing for images. Biometr
ic characteristics provide a unique natural signatu
re
of a person and it is widely accepted. Each biometr
ic technique has its advantages and disadvantages V
SSS
and biometrics have been identified as the two most
important aspects of digital security. Based on th
is
study, a new method to analyze VSSS for biometric a
uthentication is given in this paper.
https://telecombcn-dl.github.io/idl-2020/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
https://telecombcn-dl.github.io/dlai-2019/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
Cloud computing is an ever-growing field in today‘s era.With the accumulation of data and the
advancement of technology,a large amount of data is generated everyday.Storage, availability and security of
the data form major concerns in the field of cloud computing.This paper focuses on homomorphic encryption,
which is largely used for security of data in the cloud.Homomorphic encryption is defined as the technique of
encryption in which specific operations can be carried out on the encrypted data.The data is stored on a remote
server.The task here is operating on the encrypted data.There are two types of homomorphic encryption, Fully
homomorphic encryption and patially homomorphic encryption.Fully homomorphic encryption allow arbitrary
computation on the ciphertext in a ring, while the partially homomorphic encryption is the one in which
addition or multiplication operations can be carried out on the normal ciphertext.Homomorphic encryption
plays a vital role in cloud computing as the encrypted data of companies is stored in a public cloud, thus taking
advantage of the cloud provider‘s services.Various algorithms and methods of homomorphic encryption that
have been proposed are discussed in this paper
Elliptic Curve Cryptography (ECC) provides a secure
means of key exchange between communicating nodes using the
Diffie-Hellman (DH) Key Exchange algorithm. This work
presents an ECC encryption implementation using of the DH
key exchange algorithm. Both encryption and decryption of text
messages using this algorithm, have been attempted. In ECC,
encoding is carried out by mapping a message character to an
affine point on an elliptic curve. It can be observed from the
comparison of the proposed algorithm and Koblitz’s encoding
method, that the proposed algorithm is as secure as Koblitz’s
encoding method and the proposed algorithm has less
computational complexity as the encoding phase is eliminated
altogether. Hence, energy efficiency of the crypto system is
improved and the same can be used in resource constrained
applications, such as Wireless sensor networks (WSNs). It is
almost infeasible to attempt a brute force attack. The security
strength of the algorithm is proportional to the key length.
However, any increase in the key length results in more
communication overhead due to encryption.
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolIJAEMSJORNAL
Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primitives. Precisely, this technique is based on two laws of quantum mechanics, namely uncertainty principle and no-cloning theorem. The best known QKD is the BB84 protocol published by Bennett and Brassard in 1984. Since then, various QKD protocols have been developed for example a B92 protocol. This latter is similar to that of BB84but this time using only two non-orthogonal states of the four states of BB84. In this work, we develop the java simulation B92 protocol and we give some details of the implementation. Next, we show by an example how Alice (Initiator) can configure the protocol parameters before execution. Finally, we give the statistical results allowing to compare this protocol with that of BB84.
Secure quantum key distribution (QKD) promises a revolutionizing in optical applications such as encryption, and imaging. However, their implementation in real-world scenarios continues to be challenged. The goal of this work is to verify the presence of photon number splitting (PNS) attack in quantum cryptography system based on BB84 protocol and to obtain a maximum secure key length as possible. This was realized through randomly interleaving decoy states with mean photon numbers of 5.38, 1.588, and 0.48 between the signal states with mean photon numbers of 2.69, 0.794, and 0.24. Experiment results show that a maximum secure key length obtained from our system, which ignores eavesdropping cases, is 125 with 20% decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLE...IJNSA Journal
The intrusion based on Bužek-Hillery universal quantum copying machine (UQCM) is investigated. A major problem to the eavesdropper Eve is how to choose the intrusion parameters required by the copying machine in order to take out the maximum of information on the transmitted qubits while making her intrusion as discrete as possible. The present paper attempts to investigate the equatorial and isotropic cloning by means of coordinate ratios. The degree of intrusion is evaluated by means of the ratios of the receiver (Bob) coordinates and the eavesdropper (Eve) coordinates to the sender (Alice) coordinates in the Bloch sphere. The fidelity has been usually used as a criterion to analyze the intrusion. More especially, this fidelity can achieve the value 0.85 for equatorial qubits by using Bužek-Hillery 1→2 machine. Our goal is to study the behavior of these ratios as a function of the intrusion parameters. As has been found, the coordinate ratios of both the receiver and the eavesdropper achieve an optimal value higher than 2/3, in contrast to the isotropic cloning. This can favor the eavesdropping when using equatorial qubits. For isotropic cloning, the maximal intrusion is reached when the coordinate ratios are equal. The optimal values of the intrusion parameters are then evaluated.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Cryptography from Quantum Mechanical Viewpointijcisjournal
Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed the security through encryption of their data, with the help of a common key. Both the parties should agree on this key prior to communication. The cryptographic systems which perform these tasks are designed to keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the mathematical complexity of the algorithm. But quantum computation is expected to revolutionize computing paradigm in near future. This presents a challenge amongst the researchers to develop new cryptographictechniques that can survive the quantum computing era. This paper reviews the radical use of quantum mechanics for cryptography.
Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed
the security through encryption of their data, with the help of a common key. Both the parties should agree
on this key prior to communication. The cryptographic systems which perform these tasks are designed to
keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus
key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the
mathematical complexity of the algorithm. But quantum computation is expected to revolutionize computing
paradigm in near future. This presents a challenge amongst the researchers to develop new cryptographic
techniques that can survive the quantum computing era. This paper reviews the radical use of quantum
mechanics for cryptography
Edge detection algorithm based on quantum superposition principle and photons...IJECEIAES
The detection of object edges in images is a crucial step employed in a vast amount of computer vision applications, for which a series of different algorithms has been developed in the last decades. This paper proposes a new edge detection method based on quantum information, which is achieved in two main steps: (i) an image enhancement stage that employs the quantum superposition law and (ii) an edge detection stage based on the probability of photon arrival to the camera sensor. The proposed method has been tested on synthetic and real images devoted to agriculture applications, where Fram & Deutsh criterion has been adopted to evaluate its performance. The results show that the proposed method gives better results in terms of detection quality and computation time compared to classical edge detection algorithms such as Sobel, Kayyali, Canny and a more recent algorithm based on Shannon entropy.
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
In information transmission such as speech information, higher security and confidentiality are specially required. Therefore, data encryption is a pre-requisite for a secure communication system to protect such information from unauthorized access. A new algorithm for speech encryption is introduced in this paper. It depends on the quantum chaotic map and k-means clustering, which are employed in keys generation. Also, two stages of scrambling were used: the first relied on bits using the proposed algorithm (binary representation scrambling BiRS) and the second relied on k-means using the proposed algorithm (block representation scrambling BlRS). The objective test used statistical analysis measures (signal-to-noise-ratio, segmental signal-to-noise-ratio, frequency-weighted signal-to-noise ratio, correlation coefficient, log-likelihood ratio) applied to evaluate the proposed system. Via MATLAB simulations, it is shown that the proposed technique is secure, reliable and efficient to be implemented in secure speech communication, as well as also being characterized by high clarity of the recovered speech signal.
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance and
reliability of the implemented technologies. But despite this big progress, several challenges remain. For example the task of how to test the devices of QKD did not yet receive enough attention. These apparatuses become heterogeneous, complex and so demand a big verification effort. In this paper we propose to study quantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISM
tool, we analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropper's information gain on the key derived from the implementation of this protocol. We show that this property is affected by the parameters of the eavesdropper’s power and the quantum channel.
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
Copyright protection is a vital issue in modern day’s data transmission over
internet. For copyright protection, watermarking technique is extensively used. In this
paper, we have proposed a robust watermarking scheme using 2D Logistic map and elliptic
curve cryptosystem (ECC) in the DWT domain. The combined encryption has been taken to
enhance the security of the watermark before the embedding phase. The PSNR value shows
the difference between original cover and embedded cover is minimal. Similarly, NC values
show the robustness and resistance capability of the proposed technique from the common
attacks such as scaling, Gaussian noise etc. Thus, this combined version of 2D Logistic map
and Elliptic curve cryptosystem can be used in case of higher security requirement of the
watermark signal.
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 IJCNCJournal
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube attack. We exhibit our attack against Simeck32/64 using the Hamming weight leakage assumption to extract linearly independent equations in key bits. We have been able to find 32 linearly independent equations in 32 key variables by only considering the second bit from the LSB of the Hamming weight leakage of the internal state on the fourth round of the cipher. This enables
our attack to improve previous attacks on Simeck32/64 within side-channel attack model with better time and data complexity of 235 and 211.29 respectively.
A flexible method to create wave file features IJECEIAES
Digital audio signal is one of the most important data type at present, it is used in various vital applications, such as human knowledge, security and banking applications, most applications require signal identification and recognition, and to increase the efficiency of these applications we must seek a method to represent the audio file by a small set of values called a features vector. In this paper research we will introduce an enhanced method of features extraction based on k-mean clustering. The method will be tested and implemented to show how the proposed method can reduce the efforts of voice identification, and can minimize the recognition time a set of voice extracted features must be used instead of using the voice wave file.
It has long been realized that the mathematical core of Bell's theorem is essentially a classical probabilistic proof that a certain distributed computing task is impossible: namely, the Monte Carlo simulation of certain iconic quantum correlations. I will present a new and simple proof of the theorem using Fourier methods (time series analysis) which should appeal to probabilists and statisticians. I call it Gull's theorem since it was sketched in a conference talk many years ago by astrophysicist Steve Gull, but never published. Indeed, there was a gap in the proof.
The connection with the topic of this session is the following: though a useful quantum computer is perhaps still a dream, many believe that a useful quantum internet is very close indeed. The first application will be: creating shared secret random cryptographic keys which, due to the laws of physics, cannot possibly be known to any other agent. So-called loophole-free Bell experiments have already been used for this purpose.
Like other proofs of Bell's theorem, the proof concerns a thought experiment, and the thought experiment could also in principle be carried out in the lab. This connects to the concept of functional Bell inequalities, whose application in the quantum research lab has not yet been explored. This is again a task for classical statisticians to explore.
R.D. Gill (2022) Gull's theorem revisited, Entropy 2022, 24(5), 679 (11pp.)
https://www.mdpi.com/1099-4300/24/5/679
https://arxiv.org/abs/2012.00719
The Security of Practical Quantum Key DistributionXequeMateShannon
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on the eavesdropper's power.
The first two sections provide a concise up-to-date review of QKD, biased toward the practical side. The rest of the paper presents the essential theoretical tools that have been developed to assess the security of the main experimental platforms (discrete variables, continuous variables and distributed-phase-reference protocols).
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONIJNSA Journal
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so far. Secure access to multimedia services is based on SIP and HTTP digest on top of IMS architecture. The standard deploys AKA-MD5 for the terminal authentication. The third Generation Partnership Project (3GPP) provided Generic Bootstrapping Architecture (GBA) to authenticate the subscriber before accessing multimedia services over HTTP. In this paper, we propose a new IMS Service Authentication scheme using Identity Based cryptography (IBC). This new scheme will lead to better performances when there are simultaneous authentication requests using Identity-based Batch Verification. We analyzed the security of our new protocol and we presented a performance evaluation of its cryptographic operations.
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESIJNSA Journal
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a photon in superposition state for single-bit data transmission instead of a classical electrical/optical signal. The security of this protocol relies on the fact, that the arbitrary quantum state cannot be cloned, known as the no-cloning theorem. This protocol can be implemented with current technologies.
Similar to BB84 with Both Several Cloning and Intercept-resend Attacks (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
2. Int J Elec& Comp Eng ISSN: 2088-8708
BB84 with Both Several Cloning and Intercept-Resend Attacks (Mustapha Dehmani)
2989
password sharing scheme using trusted servers is published [19]. In a previous work, we have presented the
quantum key distribution with several intercept and resend attacks [20] and with several cloning attacks [21],
and we have investigated the cases of quantum key distribution with several attacks via a depolarizing
channel [22] [23] and partially non-orthogonal basis states [24]. Our aim in this paper is to study the effect of
two groups of eavesdropping strategy; intercept-resend and cloning attacks on the behaviour of the mutual
information between honest parties and the quantum error rate within the BB84 protocol. The paper is
organized as follows. The protocol is detailed in section 2. Section 3 is devoted to the results and discussion,
while section 4 is reserved for the conclusion.
2. RESEARCH METHOD
The quantum key distribution (QKD) can use several photon properties for the purpose of encoding
information such as polarization, phase, quantum correlations or wavelength. The only requirement on
quantum states is that they belong to mutually non-orthogonal Hilbert space basis. We use the polarization
coding and we consider two bases: the first called rectilinear is represented by the Horizontal and Vertical
polarization H , V and the second is called diagonal and is generated by 45° of polarization A and 135°
D
( )VHA +=
2
2 and ( )VHD −=
2
2
These four states satisfy the following relations:
0== DAVH
1==== DDAAVVHH
2
12222
==== DVAVDHAH
All measurements made in the diagonal (rectilinear) base for photons prepared in the rectilinear
(diagonal) base will give random results with equal probabilities. On the other hand, measurements made in a
base identical to that of preparation of the states will produce deterministic results. At first, both parties who
wish to communicate, traditionally called Alice and Bob agree that, for example, ( H , A ) represent the "0"
value of the bit, and ( V , D ) have "1". Alice, the sender generates a sequence of random bits that she
wants to transmit randomly; independently for each bit she chooses its coding base, rectilinear or diagonal.
Subsequently, Bob receives these photons and uses a filter to read them. Nevertheless, some photons
will be useless; it is the photons that have been polarized in a different base. These photons must not be taken
into account in the key. To do this, a channel, which can be public, is used between Alice and Bob to
determine which photons are useless. In our work we shoes to study when N+S eavesdroppers
iE (i = 1,…..,N+S), were placed between Alice and Bob. These eaves droppers form two groups, each
groupwill adopt a strategy of attacks; cloning or intercept-resend attacks, according to the model represented
in Figure 1 and Figure 2.
AliceQuantum Channel Bob
E1 E2 EkEk+1 EN EN+1 EN+kEN+k+1 EN+S-1 EN+S
The N eaves dropper swith cloning attacks The S eaves dropper swith intercept-resend attacks
Figure 1. Model of N cloning attacks followed by S intercept-resend attacks
According to Figure 1, Alice send a photon polarized which represents randomly 1 or 0, with equal
probability 1/2, to Bob. Between two groups of eavesdroppers is placer on the quantum channel, the first one
use cloning attack. Each eavesdropper ),...,1( NiEi = clone with an operator U defined as:
3. ISSN: 2088-8708
Int J Elec& Comp Eng, Vol. 8, No. 5, October 2018 : 2988 - 2993
2990
0000( ) ii EAEAU = and ii EAEAU 11)01( =
iE will use U in the base y which will be defined as follows:
[ ]2/,010)sin(01)cos()01(
00)00(
πθθθ ∈+=
=
iyEyAiyEyAiyEyA
yEyAyEyA
iii
ii
U
U
iθ is the cloning angle, and it defined the force of attacks.
Alice Quantum ChannelBob
E1 E2 EkEk+1 EN EN+1 EN+kEN+k+1 EN+S-1 EN+S
The N eaves dropper swith intercept-resend attacks The S eaves dropper swith cloning attacks
Figure 2. Model of N intercept-resend attacks followed by S cloning attacks
The second group use intercept-resend attacks. Each eaves dropper ),...,1( SNNiEi ++=
intercepts, with probability iω , the photon emitted by the eaves dropper 1−iE , measures its polarization state
and resends it, in its measured polarization state, to the eavesdropper 1+iE . However, in the second figure
(Figure 2) the roles of the groups of eaves droppers are reversed, ie Alice send a polarised photon and each
eavesdropper ),...,1( NiEi = from the first group intercepts the photon with probability iω and each
eavesdropper ),...,1( SNNiEi ++= from the second group use the cloning operator U defined above.
3. RESULTS AND ANALYSIS
In this section we calculate the quantum error errQ and the mutual information between Alice and
Bob and between Alice and the mth eavesdroppers defined as follow:
))0/1(()0/1())0/0(()0/0(1),( 22 ABABABAB PLogPPLogPBAI ++=
))0/1(()0/1())0/0(()0/0(1),( 22 mmmm AEAEAEAEm PLogPPLogPEAI ++=
With )0/0(1)0/1( ABAB PP −= and )0/0(1)0/1( mm AEAE PP −=
)/( AxyP is the conditional probability that Bob or mE receive a photon polarized horizontally
(vertically) y = 0,1 with respect that Alice send a photon polarized horizontally (vertically) XA = 0,1. All this
conditional probabilities depend on the models attacks described in the previous section; In fact, we will
study the quantum key distribution and the two cases will be distinguished if the group of cloning attacks is
placed first or last. The lost information between Alice and Bob corresponds to the maximum information
copied by the entire eavesdroppers:
[ ]),(),(
,1
i
mi
EAIMaxEAI
=
=
The error probability errP is given by:
∑ ≠
≠
=
=
+
−=
BA
j
i
j
i
xx
BAABBAABerr xxPxxPP
,
0
0
0
0
1
),(),(
ω
θ
ω
θ
4. Int J Elec& Comp Eng ISSN: 2088-8708
BB84 with Both Several Cloning and Intercept-Resend Attacks (Mustapha Dehmani)
2991
The quantum error errQ is the value of the error probability errP for which ),(),( EAIBAI = . However, for
errerr QP < , ),(),( BAIEAI < , while for errerr QP > , ),(),( BAIEAI >
3.1. Quantum Key Distribution in the Presence of N Cloning Attacks Followed by S Intercept-Resend
Attacks
Based on Figure 1, the quantum error errQ and the mutual information ),( BAI between Alice and
Bob arecalculated according to conditional probability:
2/)cos(1)1(
2
12
)1/1()0/0(
1,1,..., 1 10
1
1
+
−
+
== ∏∑ ∏ ∏∑ == = +==
+−
− N
iSii
k
j
S
kl
ii
S
k
kS
kS
ABAB i
k
lj
PP θωω
If all eavesdroppers collaborate between them and use the same cloning angle θ and identical attack
probabilitiesω , )0/0(ABP will be:
( ))(cos1)
2
1(1
4
1
)1/1()0/0( θ
ω NS
ABAB PP +
−+==
Since both types of attacks act on the quantum states viheculated on the channel, the conditional
probabilities between Alice and Bob are different compared to those published in the case of several attacks
of intercept and resend only [20] or cloning only [21]. However, the mutual information ),( mEAI between
Alice and each eavesdropper mE is calculated according to conditional probability )0/0(mAEP . In fact, this
probability changes according to the position of the eavesdropper:
If Nm ≤ :
2/)sin()cos(1)1/1()0/0(
1
1
+== ∏
−
=
m
m
i
iAEAE mm
PP θθ And
( ))sin()cos(1
2
1
)1/1()0/0( 1
θθ −
+== m
AEAE mm
PP if all eaves droppers mE (with Nm < ) have the
same cloning angleθ .
These results fit perfectly with those found in the case of several cloning attacks [21] Else if Nm > : In this
case the two types of attacks will occur, and this will clearly appear in the formulas of conditional
probabilities between Alice and every eveas dropper.
2/)cos(
22
11)1/1()0/0(
1
1
1
−+== ∏∏ =
−
=
n
i
m
m
i
i
AEAE imm
PP θ
ωω
Also, 2/)(cos
22
11)1/1()0/0(
1
−+==
−
θ
ωω N
m
AEAE mm
PP if all eaves droppers choose identical attack
parametersθ and ω .
3.2. Quantum Key Distribution in the Presence of N Intercept-Resend Attacks Followed by S Cloning
Attacks
In this case and according to the model of Figure 2, )0/0(ABP is written in the form:
2/)cos(1)1(
2
12
)1/1()0/0(
1,1,..., 1 10
1
1
+
−
+
== ∏∑ ∏ ∏∑ == = +==
+−
− S
iNii
k
j
N
kl
ii
N
k
kN
kN
ABAB i
k
lj
PP θωω
5. ISSN: 2088-8708
Int J Elec& Comp Eng, Vol. 8, No. 5, October 2018 : 2988 - 2993
2992
And if Ni ≤∀ ωω =i and θθ =j SjN ≤<∀ , ( ))(cos1)
2
1(1
4
1
)0/0( θ
ω SN
ABP +
−+=
The position of each eaves dropper mE with its strategy of attack is a decisive element for the
calculation of the conditional probabilities )0/0(mAEP and subsequently the mutual information ),( mEAI .
If Nm ≤ : All eaves droppers use intercept-resend attacks and the conditional probabilities will be identical
to those published in a previous work [20]
∑ ∏ ∏∑ −= = +=
−
=
+−
−
−
+
+
−
==
1,1,..., 1 1
1
0
1
1
)1(
2
12
2
1
)1/1()0/0(
mii
k
j
m
kl
ii
m
k
km
km
m
AEAE
k
ljmm
PP ωω
ω
Also
−+== −1
)
2
1(
2
1
2
1
)1/1()0/0( m
AEAE mm
PP
ωω
if ωω =i Ni ≤∀
However if Nm > : The state arriving at the eaves dropper mE underwent before N intercept-resend
attacks and all mE ( with Nm > ) choose to use the cloning attacks.
2/)sin()cos()1(
2
12
1)1/1()0/0(
1
1,1,..., 1 10
1
1
−
+
+== ∏∑ ∏ ∏∑
−
== = +==
+−
−
mi
k
ljmm
m
iNii
k
j
N
kl
ii
N
k
kN
kN
AEAE PP θθωω
Indeed in this last case if all ),...,1( NiEi = have an identical attack probability ωω =i and all
),...,1( SNNjE j ++= have an identical cloning angle θθ =j , the conditional probability )0/0(mAEP will
be: ( ))sin()cos(1)
2
1(1
2
1
)1/1()0/0( 1
θθ
ω −
+
−+== mN
AEAE mm
PP
4. CONCLUSION
We have studied the quantum key distribution of BB84 protocol in the presence of several
eavesdroppers with two different attack strategies cloning and intercept-resend attacks based on the
calculations of the quantum error errQ and the mutual information ),( BAI between Alice and Bob and
),( mEAI between Alice and each eavesdropper mE and We have detailed all the cases according to the
eavesdropping position with the attacks type used. It is clear that the attacksparameters iω and jθ , the
number of theeavesdroppers, and their positioning on the quantum channelact strongly on the information
security of the quantum key distribution
REFERENCES
[1] C. Shannon. "A Mathematical Theory of Communication", Bell System Technical Journal, 1948,vol. 27, pp. 623-
656,
[2] C. Shannon, "Communication in the Presence of Noise", Proc. IRE, 1949, vol. 37, pp. 10-21.
[3] A. Ourjoumtsev, H. Jeong, R. Tualle-Brouri, and P. Grangier, “Generation of optical Schrödinger cats from photon
number states”, Nature, 2007, vol. 448, pp. 784-786.
[4] A. Ourjoumtsev, R. Tualle-Brouri, J. Laurat, and P. Grangier, “Generating Optical Schrödinger kittens for quantum
information processing”, Science, vol. 312, pp. 83-86, 2006.
[5] S. Gleyzes, S. Kuhr, C. Guerlin, J. Bernu, S. Deléglise, U.B. Hoff, M. Brune, J.M.Raimond, and S. Haroche,”
Quantum jumps of light recording the birth and death of a photon in a cavit”, Nature, vol. 446, pp. 297-300, 2007.
[6] S. Wu, “A Quantum Chaos Clonal Multiobjective Evolutionary Method Reasearch”, Indonesian Journal of
Electrical Engineering and Computer Science, Vol. 3, No. 1, pp. 226-234, 2016.
[7] A.R. Calderbank and P.W. Shor, “Good quantum error-correcting codes exist”, Physical Review A, vol. 54, pp.
1098-1105, 1996.
6. Int J Elec& Comp Eng ISSN: 2088-8708
BB84 with Both Several Cloning and Intercept-Resend Attacks (Mustapha Dehmani)
2993
[8] C. Bennett et G. Brassard. “Quantum Cryptography : Public Key Distribution and Coin Tossing”, IEEE Conf. on
Computers, Systems and Signal Processing, Bangalore, India p. 175 1984.
[9] C.H. Bennett. “Quantum cryptography using any two nonorthogonal states”, Phys. Rev. Lett, vol. 68, pp. 3121-
3124, 1992.
[10] D. Bruss, “Optimal Eavesdropping in Quantum Cryptography with Six States”, Phys. Rev. Lett, Vol. 81, No. 14,
pp. 3018–3021, 1998.
[11] G. Mogos “Quantum Key-Policy Attribute-Based Encryption”, Indonesian Journal of Electrical Engineering and
Computer Science, Vol. 7, No. 2, pp. 542 -550, 2017
[12] N. Gisin, G. Ribordy,W. Tittel, and H. Zbinden, “Quantum cryptography”, Review of Modern Physics, vol. 74, no.
1, pp. 145-195, 2002.
[13] P. Grangier, J. Rarity, and A. Karlsson, “Quantum interference and cryptographic keys: novel physics and
advancing technologies (QUICK)”, The European Physical Journal D, vol. 18, no. 2, pp. 139-139, 2002.
[14] U.M. Maurer, “Secret key agreement by public discussion from common information”, IEEE Transactions on
Information Theory, vol. 39, pp. 733–742, 1993
[15] G. Brassard and L. Salvail, “Secret-key reconciliation by public discussion”, In Advances in cryptology–
Eurocrypt’93, number 765 in Lecture Notes in Computer Science, pages 410–423, 1993.
[16] C. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, “Generalized privacy amplification”, IEEE Transactions
on Information Theory, vol. 41, no. 6, pp. 1915– 1935, 1995.
[17] C. Bennett and S. Wiesner, “Communication via one- and two-particle operators on Einstein-Podolsky-Rosen
states”, Physical Review Letters, vol. 69 pp. 2881– 2884, 1992.
[18] C. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W.K. Wootters, “Teleporting an unknown quantum
state via dual classical and Einstein-Podolsky-Rosen channels”, Physical Review Letters, vol. 70, pp. 1895–1899,
1993.
[19] G. Mogos, “Quantum password sharing scheme using trusted servers”, International Journal of Information &
Network Security (IJINS) Vol. 2, No. 3, pp. 203-206, 2013.
[20] H. Ez-Zahraouy and A. Benyoussef, “Quantum key distribution with several intercepts and resend attacks”, Int. J.
Mod. Phys. B, vol. 23, pp. 4755-4765, 2009.
[21] M. Dehmani, H. Ez-Zahraouy and A. Benyoussef, “Quantum Cryptography with Several Cloning Attacks”, Journal
of Computer Science, vol. 6, pp. 684-688, 2010.
[22] M. Dehmani, H. Ez-Zahraouy , M. Errahmani and A. Benyoussef, “Quantum Key Distribution with Several
Cloning Attacks via a Depolarizing Channel”, Phys. Scr, vol. 86, 2012.
[23] M. Dehmani, H. Ez-Zahraouy and A. Benyoussef “Quantum key distribution with several cloning attacks via a
depolarizing channel”, Journal of Russian Laser Research, vol. 36 No. 3, pp. 228-236, 2015.
[24] M. Dehmani, H. Ez-Zahraouy and A. Benyoussef, “Quantum key distribution with several intercepts and resend
attacks with partially non-orthogonal basis states”. Optik - International Journal for Light and Electron Optics,
vol. 125, pp. 624-627, 2014.