Suggested Topics within your search.
Suggested Topics within your search.
Authentication
Network security
Cybersecurity
4
Cyber security
3
Internet protocols
3
'current
2
Binarization processing
2
Communication wireless network
2
Communications networks
2
Computational ghost imaging
2
Computer crime
2
Cryptographic key
2
Cryptographic key distribution
2
Cryptography
2
Cybe security for smart city
2
Identity authentication
2
Image processing
2
Information and Communication Technologies
2
Interactive joint authentication
2
Internet of things
2
Key distribution
2
Key-distribution protocols
2
Man in the middle
2
Man-in-the-middle attack
2
Multi-party optical communication
2
Network intrusion detection system
2
Network intrusion detection systems
2
Network-based
2
Optical communication
2
Public networks
2
-
1
-
2by Aktas, D., Fletcher, A.I, Joshi, S.K, Liu, B., Lončarić, M., Neumann, S.P, Pirandola, S., Rarity, J.G, Samec, Å, Solomons, N.R, Stipčević, M., Ursin, R., Venkatachalam, N., Wengerowsky, S.View Fulltext in Publisher
Published 2022
Article -
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10