Author of the publication

Achieving Unconditional Security in Existing Networks Using Quantum Cryptography.

, , and . SECRYPT, page 207-210. INSTICC Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disassembling Digital Identity-Related Privacy into a Set of Services: SoaML-Based Services Design., and . IESS, volume 103 of Lecture Notes in Business Information Processing, page 44-57. Springer, (2012)Service-Oriented Digital Identity-Related Privacy Interoperability: Implementation Framework of Privacy-as-a-Set-of-Services (PaaSS)., and . IWEI, volume 122 of Lecture Notes in Business Information Processing, page 193-200. Springer, (2012)802.11i Encryption Key Distribution Using Quantum Cryptography., , and . JNW, 1 (5): 9-20 (2006)OpenAdap.net: a Community-Based Sharing System., , and . IICS, volume P-165 of LNI, page 321-328. GI, (2010)A Security Management Assurance Model to Holistically Assess the Information Security Posture., and . ARES, page 756-761. IEEE Computer Society, (2009)A Multi-stage Methodology for Ensuring Appropriate Security Culture and Governance., , and . ARES, page 353-360. IEEE Computer Society, (2010)Achieving Unconditional Security in Existing Networks Using Quantum Cryptography., , and . SECRYPT, page 207-210. INSTICC Press, (2006)Optimizing Security Efficiency through Effective Risk Management., , and . AINA Workshops, page 613-619. IEEE Computer Society, (2011)Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment., and . ICETE (Selected Papers), volume 3 of Communications in Computer and Information Science, page 139-149. (2005)SECOQC Business White Paper, , , and . CoRR, (2009)