![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Efficient Authentication and Security of Multicast Streams over Lossy Channels Using Quantum Cryptography
Subscribe/Renew Journal
Quantum key distribution-the creation of secret keys from quantum mechanical correlations-is an example of how physical methods can be used to solve problems in classical information theory.
Keywords
Authentication, Data Encryption Standard (DES), HTTP, Quantum Key Distribution (QKD), Open Systems Interconnection (OSI), Secret Key, Trusted Center (TC).
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 295
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 2