The evolution of quantum key distribution networks: On the road to the qinternet
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol
capable of maintaining information-theoretic security. Given the recent advances in QKD …
capable of maintaining information-theoretic security. Given the recent advances in QKD …
Security requirements and challenges of 6G technologies and applications
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …
generation wireless network technology (6G). 6G is expected to be implemented around the …
6G: Opening new horizons for integration of comfort, security, and intelligence
The innovations provided by sixth generation wireless communication (6G) as compared to
fifth generation (5G) are considered in this article based on analysis of related works. With …
fifth generation (5G) are considered in this article based on analysis of related works. With …
A survey on green 6G network: Architecture and technologies
T Huang, W Yang, J Wu, J Ma, X Zhang… - IEEE access, 2019 - ieeexplore.ieee.org
While 5G is being commercialized worldwide, research institutions around the world have
started to look beyond 5G and 6G is expected to evolve into green networks, which deliver …
started to look beyond 5G and 6G is expected to evolve into green networks, which deliver …
Quantum internet protocol stack: A comprehensive survey
Classical Internet evolved exceptionally during the last five decades, from a network
comprising a few static nodes in the early days to a leviathan interconnecting billions of …
comprising a few static nodes in the early days to a leviathan interconnecting billions of …
Quantum machine learning for 6G communication networks: State-of-the-art and vision for the future
The upcoming fifth generation (5G) of wireless networks is expected to lay a foundation of
intelligent networks with the provision of some isolated artificial intelligence (AI) operations …
intelligent networks with the provision of some isolated artificial intelligence (AI) operations …
Quantum low-density parity-check codes
Quantum error correction is an indispensable ingredient for scalable quantum computing. In
this Perspective we discuss a particular class of quantum codes called “quantum low-density …
this Perspective we discuss a particular class of quantum codes called “quantum low-density …
Quantum key distribution: a networking perspective
The convergence of quantum cryptography with applications used in everyday life is a topic
drawing attention from the industrial and academic worlds. The development of quantum …
drawing attention from the industrial and academic worlds. The development of quantum …
Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
A survey on quantum computing technology
The power of quantum computing technologies is based on the fundamentals of quantum
mechanics, such as quantum superposition, quantum entanglement, or the no-cloning …
mechanics, such as quantum superposition, quantum entanglement, or the no-cloning …