[HTML][HTML] Quantum cloud computing: Trends and challenges

M Golec, ES Hatay, M Golec, M Uyar, M Golec… - Journal of Economy and …, 2024 - Elsevier
Quantum computing is a new paradigm that will revolutionize various areas of computing,
especially cloud computing. Quantum computing, still in its infancy, is a costly technology …

Bases selection with pseudo-random functions in BB84 scheme

E Dervisevic, M Voznak, M Mehic - Heliyon, 2024 - cell.com
Because the spectrum of services available in modern telecommunication networks is
constantly expanding, security has become increasingly important. Simultaneously, in an …

[HTML][HTML] A reference architecture for quantum computing as a service

A Ahmad, AB Altamimi, J Aqib - Journal of King Saud University-Computer …, 2024 - Elsevier
Quantum computers (QCs) aim to disrupt the status-quo of computing-replacing traditional
systems and platforms that are driven by digital circuits and modular software-with hardware …

Large-scale quantum key distribution network simulator

E Dervisevic, M Voznak, M Mehic - Journal of Optical …, 2024 - ieeexplore.ieee.org
The wide range of supported services in modern telecommunication networks has increased
the demand for highly secure means of communication. Common security frameworks …

Anonymous Lattice-Based Authentication Protocol for Vehicular Communications

A Shahidinejad, J Abawajy, S Huda - Vehicular Communications, 2024 - Elsevier
Quantum-proof authentication is essential for vehicular communications as the threat of
quantum computing attacks on traditional encryption methods grows. Several lattice-based …

Performance Analysis of ETSI GS QKD 014 Protocol in 5G/6G Networks

A Tankovic, P Burdiak, E Dervisevic, M Voznak… - Future of Information …, 2024 - Springer
The advancement of mobile networks driven by the introduction of 5G/6G technologies has
brought more complex security challenges for end-users. Certain services within these …

Emulation of Quantum Key Distribution Networks

M Mehic, E Dervisevic, P Burdiak, V Lipovac… - Ieee …, 2024 - ieeexplore.ieee.org
Network emulators play an important role in testing network systems, applications, and
protocols. Emulators bridge the gap between simulation setups that lack realism in results …

Pilot-Based Key Distribution and Encryption for Secure Coherent Passive Optical Networks

H Wang, J Zhou, Q Lu, J Zeng, Y Liao… - Journal of Lightwave …, 2023 - ieeexplore.ieee.org
The security issues of passive optical networks (PONs) have always been a concern due to
broadcast transmission. Physical-layer security enhancement for the coherent PON should …

Special Issue on Information Security and Cryptography: The Role of Advanced Digital Technology

AA Khan, LY Por - Applied Sciences, 2024 - mdpi.com
Information security has become a potential prospect that ensures information cannot be
breached throughout the process of delivery while being exchanged over the Internet. In …

Exploring the Feasibility of Quantum-Based Secure Communications for Nuclear Applications

K Gkouliaras, V Theos, S Chatzidakis - Nuclear Technology, 2024 - Taylor & Francis
Recent advancements in reactor designs could offer new revolutionary capabilities,
including remote monitoring, increased flexibility, and reduced operation and maintenance …