23 results on '"B92"'
Search Results
2. Interactive simulation of quantum key distribution protocols and application in Wi-Fi networks.
- Author
-
Escanez-Exposito, Daniel, Caballero-Gil, Pino, and Martín-Fernández, Francisco
- Subjects
- *
WIRELESS Internet , *CRYPTOSYSTEMS - Abstract
Key distribution allows two parties to produce and share a random secret key, which can then be used to encrypt and decrypt messages with symmetric cryptosystems. Thus, this is often considered the most fundamental cryptographic primitive of secret communications, especially in wireless networks. While the traditional method is based on the assumption about the hardness of some mathematical problem, the quantum key distribution (QKD) involves quantum mechanical components and can be considered unconditionally secure. This paper presents an implementation of the two QKD protocols known as E91 and B92, which includes an intuitive class structure representing the different relationships between the two collaborating entities in the simulated communication. In addition, this implementation made it possible to deepen the study and comparison of both algorithms. The main details of the implementation are described here, together with some conclusions obtained from the research carried out on its functionalities, illustrated in colorful heat maps. This work also includes a preliminary analysis of the potential of the application of these QKD protocols for their hybrid application in Wi-Fi networks based on the IEEE 802.11 standard. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Simulación interactiva de protocolos cuánticos de distribución de claves [Póster]
- Author
-
Varela Vaca, Ángel Jesús, Ceballos Guerrero, Rafael, Reina Quintero, Antonia María, Escánez Expósito, Daniel, Caballero Gil, Pino, Martín Fernández, Francisco, Varela Vaca, Ángel Jesús, Ceballos Guerrero, Rafael, Reina Quintero, Antonia María, Escánez Expósito, Daniel, Caballero Gil, Pino, and Martín Fernández, Francisco
- Abstract
La distribución de claves permite a dos partes producir y compartir una clave secreta aleatoria, que luego puede ser utilizada para cifrar y descifrar mensajes con cripto-sistemas simétricos. Por tanto, suele considerarse la primitiva criptográfica más fundamental de las comunicaciones secretas. Mientras que el método tradicional se basa en una suposición sobre la dificultad de algún problema matemático, la Distribución Cuántica de Claves (QKD, Quantum Key Distribution) involucra componentes mecánicos cuánticos y puede considerarse incondicionalmente segura. Este artículo presenta una implementación de los dos protocolos de QKD conocidos como E91 y B92, incluyendo una estructura de clases intuitiva que representa las diferentes relaciones entre las dos entidades colaboradoras en la comunicación simulada. Además, dicha implementación permite profundizar en el estudio y comparación de ambos algoritmos. Se incluyen aquí los principales detalles de la implementación junto con algunas conclusiones obtenidas de la investigación realizada sobre sus funcionalidades, ilustradas en coloridos mapas de calor. Este trabajo también incluye un análisis preliminar del potencial de la aplicación de estos protocolos de QKD para su aplicación híbrida en redes Wi-Fi basadas en el estándar IEEE 802.11.
- Published
- 2024
4. Violation of the right to privacy on the internet portals in Serbia: Case studies of portals Espreso and B92
- Author
-
Grigorov Aleksandra
- Subjects
freedom of expression ,privacy ,internet portal ,code of journalists ,selfregulation ,espreso ,b92 ,Communication. Mass media ,P87-96 - Abstract
This study analyses the characteristics and possibilities of protection of privacy rights on the Internet portals in the Republic of Serbia. The article examines the relationship between these rights and the right to freedom of expression. In accordance with that, the article presented the self-regulatory documents of the Republic of Serbia concerning the media, that serve as the ethical standard of journalists' conduct: The Journalist's Code of Ethics from 2006 and the Guidelines for the Application of the Journalist's Code of Ethics in Online Environment from 2016, the honoring of which is under the jurisdiction of the Press Council. The research is based on the analysis of cases where the privacy rights, dignity and integrity of persons were violated and it includes comparative research of the media reporting on two portals (Espreso and B92) during two separate periods of monitoring the compliance with the the Journalist's Code and the Guidelines in Online Environment. The first monitoring was conducted in cooperation with the Press Council in the period from October 1st to November 30th 2017, while the repeated independent monitoring was conducted in the period from March 1st to March 31 2018, in order to determine whether there had been an improvement on both portals. The monitoring showed that there are violations of privacy rights on both portals, most often in the 'Chronicle' section. The privacy of the victims is violated more frequently than that of the suspects. Also, despite there being a clear reference in the Code about the need of protecting the identity of minors, there have been multiple violations of children's right to privacy, especially in the 'Chronicle' section.
- Published
- 2020
- Full Text
- View/download PDF
5. КОЛИЧЕСТВО В КРИПТОГРАФИИ КЛЮЧИ РАСПРЕДЕЛЕНИЕ ПРИНЦИПЫ РАБОТЫ ПРОТОКОЛОВ, ИСПОЛЬЗУЕМЫХ ПРИ РЕШЕНИИ ЗАДАЧ
- Author
-
Editor Academic Journals &Amp; Conferences
- Subjects
бит ,BB84 ,кубит ,B92 ,Квантовая механика ,Квантовая криптография - Abstract
В этой статье я сначала объясню некоторые принципы квантовой механики, затем перейду к обсуждению основ квантовых криптографических протоколов BB84, B92 и протоколов на основе ЭПР, и, наконец, я завершу статью несколькими комментариями о стратегиях отслеживания. и практическое применение квантовой криптографии.Я рассмотрю некоторые технологические вопросы, которые необходимо решить перед внедрением.
- Published
- 2022
- Full Text
- View/download PDF
6. A Formal Approach to Unconditional Security Proofs for Quantum Key Distribution
- Author
-
Kubota, Takahiro, Kakutani, Yoshihiko, Kato, Go, Kawano, Yasuhito, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Calude, Cristian S., editor, Kari, Jarkko, editor, Petre, Ion, editor, and Rozenberg, Grzegorz, editor
- Published
- 2011
- Full Text
- View/download PDF
7. Violation of the right to privacy on the internet portals in Serbia: Case studies of portals Espreso and B92
- Author
-
Aleksandra Grigorov
- Subjects
business.industry ,Internet privacy ,selfregulation ,General Medicine ,privacy ,espreso ,lcsh:P87-96 ,lcsh:Communication. Mass media ,internet portal ,Political science ,freedom of expression ,b92 ,The Right to Privacy ,The Internet ,code of journalists ,business - Abstract
This study analyses the characteristics and possibilities of protection of privacy rights on the Internet portals in the Republic of Serbia. The article examines the relationship between these rights and the right to freedom of expression. In accordance with that, the article presented the self-regulatory documents of the Republic of Serbia concerning the media, that serve as the ethical standard of journalists' conduct: The Journalist's Code of Ethics from 2006 and the Guidelines for the Application of the Journalist's Code of Ethics in Online Environment from 2016, the honoring of which is under the jurisdiction of the Press Council. The research is based on the analysis of cases where the privacy rights, dignity and integrity of persons were violated and it includes comparative research of the media reporting on two portals (Espreso and B92) during two separate periods of monitoring the compliance with the the Journalist's Code and the Guidelines in Online Environment. The first monitoring was conducted in cooperation with the Press Council in the period from October 1st to November 30th 2017, while the repeated independent monitoring was conducted in the period from March 1st to March 31 2018, in order to determine whether there had been an improvement on both portals. The monitoring showed that there are violations of privacy rights on both portals, most often in the 'Chronicle' section. The privacy of the victims is violated more frequently than that of the suspects. Also, despite there being a clear reference in the Code about the need of protecting the identity of minors, there have been multiple violations of children's right to privacy, especially in the 'Chronicle' section.
- Published
- 2020
8. The formal study of quantum cryptography protocols.
- Author
-
Yang, Fan and Hao, Yu-Jie
- Abstract
The unconditional security is the most important identity of quantum cryptography protocols. Although has been proved, but the process is so complicated to realize. The formal verification method provides an effective way to analyze the security of the protocols, and also achieve the computer automated analysis. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
9. Decoy-pulse protocol for frequency-coded quantum key distribution.
- Author
-
Bhattacharya, Sudeshna and Pradeep Kumar, K
- Abstract
We propose a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol. A direct extension of decoy-pulse method to frequency-coding scheme results in security loss as an eavesdropper can distinguish between signal and decoy pulses by measuring the carrier photon number without affecting other statistics. We overcome this problem by optimizing the ratio of carrier photon number of decoy-to-signal pulse to be as close to unity as possible. In our method the switching between signal and decoy pulses is achieved by changing the amplitude of RF signal as opposed to modulating the intensity of optical signal thus reducing system cost. Our simulation results show a key generation rate of 1.5×10−4/pulse for link lengths up to 70km. Finally, we discuss the optimum value of average photon number of signal pulse for a given key rate while also optimizing the carrier ratio. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
10. The Media and Human Rights 1.
- Author
-
Chip Taylor Communications publisher, Licht, Sonja, speaker, Komarecki, Marina, speaker, Breytenbach, Breyten, speaker, Weschler, Lawrence, speaker, Walker, Alice, speaker, Brice, Kim, speaker, Zagalsky, Leonid, speaker, Kalao, Kalala Mbenga, speaker, Orme, William A., speaker, Falk, Brian Peter, producer, Raisz, Kate, producer, Tewksbury, Nancy, narrator, (1942), Danny Schechter, narrator, and Hunter-Gault, Charlayne, narrator
- Published
- 2022
11. Flexible protocol for quantum private query based on B92 protocol.
- Author
-
Yang, Yu-Guang, Sun, Si-Jia, Xu, Peng, and Tian, Ju
- Subjects
- *
QUANTUM mechanics , *COMPUTER network protocols , *DATA security , *PROBABILITY theory , *ROBUST control , *COMPUTER virus prevention - Abstract
Jakobi et al. for the first time proposed a novel and practical quantum private query (QPQ) protocol based on SARG04 (Scarani et al. in Phys Rev Lett 92:057901, ) quantum key distribution protocol (Jakobi et al. in Phys Rev A 83:022301, ). Gao et al. generalized Jakobi et al's protocol and proposed a flexible QPQ protocol (Gao et al. in Opt Exp 20(16):17411-17420, ). When $$\theta <\pi /4$$ , Gao et al's protocol exhibits better database security than Jakobi et al's protocol, but has a higher probability with which Bob can correctly guess the address of Alice's query. In this paper, we propose a flexible B92-based QPQ protocol. Although SARG04 protocol is a modification of B92 protocol and can be seen as a generalization of B92 protocol, our protocol shows different advantages from Gao et al's protocol. It can simultaneously obtain better database security and a lower probability with which Bob can correctly guess the address of Alice's query when $$\theta <\pi /4$$ . By introducing entanglement, the proposed QPQ protocol is robust against channel-loss attack, which also implies lower classical communication complexity. Similar to Gao et al's protocol, it is flexible, practical, and robust against quantum memory attack. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
12. Quantum Key Distribution Using Spin Wave–Optical Interactions.
- Author
-
Kumar, Pradeep and Prabhakar, Anil
- Subjects
- *
QUANTUM electronics , *PUBLIC key cryptography , *SPIN waves , *MAGNETIC fields , *ELECTRIC fields , *OPTICAL waveguides , *HAMILTONIAN systems , *BASIS sets (Quantum mechanics) , *COHERENCE (Optics) - Abstract
We propose the use of spin wave–optical interactions to implement the BB84 and B92 quantum key distribution (QKD) protocols. Spin waves couple the transverse magnetic (TM) and transverse electric (TE) optical modes of a waveguide. We derive the interaction Hamiltonian to describe the coupling, and solve the resulting equations to determine the time evolution of quantized TM and TE modes. With a judicious choice of coupling coefficient, a set of four nonorthogonal states-formally equivalent to the set of polarization states of a single photon-can be generated. These states form a conjugate basis suitable as a QKD basis set. The proposed scheme can mitigate any medium-induced polarization fluctuations. The spin wave–optical interactions can be used to implement the BB84 protocol using frequency-coded coherent optical states. [ABSTRACT FROM PUBLISHER]
- Published
- 2010
- Full Text
- View/download PDF
13. High Speed Quantum Key Distribution Over Optical Fiber Network System.
- Author
-
Lijun Ma, Mink, Alan, and Xiao Tang
- Subjects
OPTICAL fibers ,QUANTUM theory ,FIBER optics - Abstract
The National Institute of Standards and Technology (NIST) has developed a number of complete fiber-based high-speed quantum key distribution (QKD) systems that includes an 850 nm QKD system for a local area network (LAN), a 1310 nm QKD system for a metropolitan area network (MAN), and a 3-node quantum network controlled by a network manager. This paper discusses the key techniques used to implement these systems, which include polarization recovery, noise reduction, frequency up-conversion detection based on a periodically polled lithium nitrate (PPLN) waveguide, custom high-speed data handling boards and quantum network management. Using our quantum network, a QKD secured video surveillance application has been demonstrated. Our intention is to show the feasibility and sophistication of QKD systems based on current technology. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
14. Analysis and evaluation of quantum key distribution protocols
- Author
-
Rouhani, Reza
- Subjects
- Protocols of QKD (Quantum Key Distribution), Quantum Key Distribution, quantum cryptography, distribution key, cybersecurity, QuVis, BB84, E91, B92, BBM92, 080402 Data Encryption, 020603 Quantum Information, Computation and Communication
- Abstract
Quantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize the laws of quantum to create a cryptographic share key to make the communication system secure. The unique feature of QKD assures eavesdropping detectable during quantum communications which is fascinating for a high-level secure environment.Most of the traditional cryptographic methods which we use currently are based on mathematical scheme or Computational complexity theory which are not completely safe. Using quantum cryptography has been achieved extensive steps in communication security establishment. As the information Unit has been changed from “bit” to Quantum bit (Qubit), a new element has been offered that can guarantee the shared information confidentiality between parties. The confidentiality of system is established via exchanging a secret key through a channel of quantum, the key which we use for encrypting the shared data. This structure has quantum integration which has been developed by physics law and techniques of cryptography. This thesis has proposed a modified version of QKD protocol, this new protocol will generate a cryptographic share key for a more efficient, lower cost and secure communication between two parties (sender and Receiver). This new protocol principal is similar to BBM92, but the source of photon moved to sender instead of third-party photon generator, following steps will be executed in this Experiment: • Observe different categories protocols of QKD in details • The Quantum Mechanics Visualisation Project (QuVis) is the simulation software that has been used for implementing the proposed protocol [BB84 with spin] among the other three (BBM92, B92 and BB84). • Probability ratio of error will be tested and compared for all protocols, for this experiment 100 to 5000 photons will be sent. By Analysing collected data in this experiment, it will be determined which one of this four protocols lead the detecting of eavesdropping. Simulation software accomplishes the value of error key probability which receiver can use and should not pass over the range limit of 0.25 & 0.5.
- Published
- 2020
15. Decoy-Pulse Protocol For Frequency-Coded Quantum Key Distribution
- Author
-
Sudeshna Bhattacharya, Pratyush Pandey, and Pradeep Kumar K
- Subjects
decoy-pulse ,B92 ,frequency-coding ,quantum key distribution - Abstract
We propose a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol. A direct extension of decoy-pulse method to frequency-coding scheme results in security loss as an eavesdropper can distinguish between signal and decoy pulses by measuring the carrier photon number without affecting other statistics. We overcome this problem by optimizing the ratio of carrier photon number of decoy-to-signal pulse to be as close to unity as possible. In our method the switching between signal and decoy pulses is achieved by changing the amplitude of RF signal as opposed to modulating the intensity of optical signal thus reducing system cost. We find an improvement by a factor of 100 approximately in the key generation rate using decoy-state protocol. We also study the effect of source fluctuation on key rate. Our simulation results show a key generation rate of 1.5×10-4/pulse for link lengths up to 70km. Finally, we discuss the optimum value of average photon number of signal pulse for a given key rate while also optimizing the carrier ratio., {"references":["W. Y. Hwang, \"Quantum key distribution with high loss: Toward global\nsecure communication,\" Phys. Rev. Lett., vol. 91, no. 057901, 2003.","J. M. Merolla et al., \"Phase-modulation transmission system for quantum\ncryptography,\" Opt. Lett., vol. 24, 1999.","P. Kumar and A. Prabhakar, \"Bit error rates in a frequency coded quantum\nkey distribution system,\" Optics Communications, vol. 282, no. 18, pp.\n3827-3833, 2009.","X. Ma et al., \"Practical decoy state for quantum key distribution,\"\nPhysical Review A, vol. 72, no. 012326, 2005.","Y. Zhao et al., \"Simulation and implementation of decoy state quantum\nkey distribution over 60 km telecom fiber,\" in Proceedings of IEEE\nInternational Symposium on Information Theory, 2006, pp. 2094-2098.","D. Gottesman et al., \"Security of quantum key distribution with imperfect\ndevices,\" Quantum Information and Computation, vol. 4, p. 325, 2004.","G. Brassard and L. Salvail, \"Advances in cryptology eurocrypt-93,\"\nLecture Notes in Computer Science, vol. 765, pp. 410-423, 1994.","J.-Z. Hu and X.-B. Wang, \"Reexamination of the decoy-state quantum key\ndistribution with an unstable source,\" Phys. Rev. A, vol. 82, p. 012331,\n2010."]}
- Published
- 2012
- Full Text
- View/download PDF
16. Quantum cryptography
- Author
-
Şenay, Volkan, Kılıçkaya, M. Selami, Genel Fizik Anabilim Dalı, Kılıçkaya, Selami, ESOGÜ, Fen Edebiyat Fakültesi, Genel Fizik Ana Bilim Dalı, and ESOGÜ, Fen Edebiyat Fakültesi, Fizik Anabilim Dalı
- Subjects
Fizik ve Fizik Mühendisliği ,Kuantum Anahtar Dağıtım Protokolleri ,Quantum Cryptography ,Gizlilik Artırımı ,Kuantum Kriptografi ,Quantum ,Entanglement ,Yan Kanallar ,Dolanıklık ,BB84 ,SARG ,B92 ,Cryptography ,Bell Esitsizlikleri ,Bell Eşitsizlikleri ,Physics and Physics Engineering ,Quantum Key Distribution Protocols - Abstract
Çalışmanın 1. Bölümde kriptoloji terimleri ve kriptolojinin tarihçesi verilmiş, çeşitli simetrik ve asimetrik şifreleme sistemleri tanıtılmış, bu sistemler içinde doğru uygulandığında kırılamayacağı 1949 yılında bir AT&T mühendisi olan Shannon tarafından teorik olarak da ispatlanmış olan Vernam Şifresi detaylı olarak incelenmiştir. Vernam şifreleme sisteminin sağladığı mutlak güvenlik tamamen rastgele seçilmiş tek kullanımlık anahtarın gizliliğine ve dağıtımının güvenliğine bağlıdır. Fakat prensip olarak, herhangi bir klasik özel kanal kullanıcılara izlenildiklerini fark ettirmeden pasif olarak takip edilebilir ve gizli kalması gereken anahtarın bir rakibin eline geçmesine fırsat verebilir. Bu noktada kuantum kriptografi anahtar dağıtım probleminin çözüldüğü, anahtarın güvenliğinin fizik kuralları ile korunduğu bir anahtar dağıtım tekniği olarak karşımıza çıkmaktadır. Klasik şifreleme sistemlerinin güvenlikleri bazı zor matematiksel problemlerin hesaplanabilme zorluğuna dayanırken, bu teknik kuantum mekaniğine dayanır. Kuantum mekaniğinin ilkelerine göre hatasız iletim hatlarında kaynaktan hedefe iletilmekte olan verinin bozulması arada istenmeyen biri tarafından verinin okunmaya çalışıldığı anlamına gelir. Bu avantajdan yararlanmak suretiyle kullanıcılar arasında eşit anahtar dizilerinin yüzde yüz güvenli biçimde paylaşılabilmesi için BB84, B92, SARG, Ekert protokolü gibi çeşitli anahtar dağıtım protokolleri öne sürülmüştür. Bu protokollerin prensiplerine 2. Bölümde yer verilmiştir.Çalışmanın diğer bölümlerinde genel olarak 1989 yılında başarıyla gerçekleştirilen ilk kuantum anahtar dağıtımı denemesinden günümüze kadar yapılan ve bu alandaki gelişmelere öncülük eden çalışmalara göz atılmış, KAD sistemlerinde yer alan ışık kaynakları, dedektörler ve kuantum kanallar ile kanal kusurlarından kaynaklanan hataların düzeltilmesi ve anahtarın gizliliğinin artırımı için destekleyici işlemler hakkında bilgi verilmiş, 9. Bölümde kuantum kriptografinin güvenliğine değinilmiş, 10. ve son Bölümde ise kuantum kriptografinin geleceği, beklentiler ve ülkemiz açısından önemi tartışılmıştır.Anahtar Kelimeler: Kuantum Kriptografi, Kuantum Anahtar Dağıtım Protokolleri, BB84, B92, SARG, Dolanıklık, Bell Eşitsizlikleri, Gizlilik Artırımı, Yan Kanallar. In the first part of this study cryptological terms and history of cryptology have been provided, various symmetrical and asymmetrical cryptographic systems have been defined and in these systems Vernam cipher theoretically proven by AT&T engineer Shannon that the system cannot be hacked if practiced properly has been examined in details. Absolute security provided by Vernam cryptographic system completely depends on randomly selected single use of the key?s confidentiality and the security of its distribution. But principally any of the classic private channels can passively be eavesdropped without its notice and may give the opportunity to change hands for the key which should be kept confidential. Here the quantum cryptography appears us as a key distribution technique where the problem is solved and the security of the key has been protected by physical rules. Although the securities of the classical cryptographic systems are based on the complication of the calculation of some mathematical problems, this technique depends on quantum mechanics. Principles of quantum mechanics assert that the corruption of the data transferred to the target from accurate transmission lines imply that the data has been tried to be read by an eavesdropper. In order to share equal key indexes hundred percent safely among the users by benefiting from this advantage, various key distribution protocols set forth such as BB84, B92, SARG, Ekert. The principals of those protocols are allowed in the 2nd part of the study.In the other parts of the study, in general, the studies following the achievement reached first in 1989 regarding key distribution experiment until today and the studies leading to the developments in this field have been looked through and information regarding light sources in QKD systems, detectors and quantum channels with the supporting procedures for correction of the errors originating from channel defects and privacy amplification have been provided, referred to quantum cryptography security in part 9 and the future of quantum cryptography, expectations and its importance regarding our country have been negotiated in tenth and the last part.Key Words: Quantum Cryptography, Quantum Key Distribution Protocols, BB84, B92, SARG, Entanglement, Bell Inequalities, Privacy Amplification, Side Channels. 108
- Published
- 2012
17. Yugoslav Media Muzzled, Fearful; Many Independent News Outlets Shut; Others Forced to Repeat Propaganda
- Author
-
Dobbs, Michael
- Subjects
B92 ,News, opinion and commentary ,North Atlantic Treaty Organization - Published
- 1999
18. 'INFORMATION GUERRILLAS' SCORE AGAINST MILOSEVIC; SERBIA'S OFFICIAL MEDIA LOSE THEIR MONOPOLY
- Author
-
Dobbs, Michael
- Subjects
B92 ,Radio broadcasting industry ,News, opinion and commentary - Published
- 1997
19. Added U.S. broadcasts send message in Serbia
- Author
-
Gutman, Roy
- Subjects
B92 ,Radio broadcasting industry ,General interest ,News, opinion and commentary - Published
- 1996
20. Radio B92 Online Again To Evade Serb Authorities 03/24/99
- Subjects
B92 - Abstract
TOKYO, JAPAN, 1999 MAR 24 (NB) -- By Martyn Williams, Newsbytes. As tensions rise in the Balkans and NATO forces prepare for strikes on Serbia, Belgrade's independent radio station Radio […]
- Published
- 1999
21. SERBIA'S SILENCED RADIO REBELS
- Author
-
Barnhart, Aaron
- Subjects
B92 ,Radio broadcasting industry ,Business ,Electronics and electrical industries ,Mass communications ,North Atlantic Treaty Organization -- Social policy - Abstract
It's said that in war the first casualty is the truth. That would certainly describe what happened to Radio B92 in Belgrade, Serbia's last remaining independent news source, after NATO [...]
- Published
- 1999
22. YUGOSLAVIA: TWO KEY YUGOSLAV RADIO STATIONS RESUME BROADCASTING
- Subjects
B92 ,Radio Prishtina ,Business ,Business, international ,High technology industry - Abstract
Radio Prishtina went back on the air on 28 July for the first time since NATO's springtime bombing campaign damaged its facilities. The broadcast began with an address by Kouchner. [...]
- Published
- 1999
23. High Speed Quantum Key Distribution Over Optical Fiber Network System.
- Author
-
Ma L, Mink A, and Tang X
- Abstract
The National Institute of Standards and Technology (NIST) has developed a number of complete fiber-based high-speed quantum key distribution (QKD) systems that includes an 850 nm QKD system for a local area network (LAN), a 1310 nm QKD system for a metropolitan area network (MAN), and a 3-node quantum network controlled by a network manager. This paper discusses the key techniques used to implement these systems, which include polarization recovery, noise reduction, frequency up-conversion detection based on a periodically polled lithium nitrate (PPLN) waveguide, custom high-speed data handling boards and quantum network management. Using our quantum network, a QKD secured video surveillance application has been demonstrated. Our intention is to show the feasibility and sophistication of QKD systems based on current technology.
- Published
- 2009
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.