References
Adu-Kyere, A., Nigussie, E., and Isoaho, J. (2022). Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.
Sensors, 22 (16).
https://doi.org/:10.3390/s22166284.
Biswas, C., Haque, M. M., and Gupta, U. D. (2022). A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography.
IEEE Access, 10, 72743-72757.
https://doi.org/:10.1109/ACCESS.2022.3188798
Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., and Hassija, V. (2021). Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography.
Computer Communications, 176, 99-118.
https://doi.org/:10.1016/j.comcom.2021.05.019
Chen, Y.-A., Zhang, Q., Chen, T.-Y., Cai, W.-Q., Liao, S.-K., Zhang, J., Chen, K., et al. (2021). An integrated space-to-ground quantum communication network over 4,600 kilometres.
Nature, 589 (7841), 214-219.
https://doi.org/:10.1038/s41586-020-03093-8
Diamanti, E. (2021). Secure communications in quantum networks.
Proc. SPIE.
https://doi.org/:10.1117/12.2603515.
Goyal, R., Pawar, A., Ravikumar, R., and Bitragunta, S. (2022). A Novel Hybrid Communication Policy using Network Coding Based Post-Quantum Cryptography and Fuzzy Inference System.
IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 18-21 Dec.
https://doi.org/:10.1109/ANTS56424.2022.10227752.
Hashim, K., Selyukov, A., Vlasenko, M., Lukova-Chuiko, N., and Khlaponin, Y. (2022). ALGORITHM OF THE LTE / 5G NETWORK BILLING SYSTEM WITH THE PROVISION OF INTERNET OF THINGS SERVICES.
Transactions of Kremenchuk Mykhailo Ostrohradskyi National University, 36-46.
https://doi.org/:10.32782/1995-0519.2022.6.4
Kumar, R., Mazzoncini, F., Qin, H., and Alléaume, R. (2021). Experimental vulnerability analysis of QKD based on attack ratings.
Scientific Reports, 11 (1), 9564.
https://doi.org/:10.1038/s41598-021-87574-4
Li, S., Chen, Y., Chen, L., Liao, J., Kuang, C., Li, K., Liang, W., et al. (2023). Post-Quantum Security: Opportunities and Challenges.
Sensors, 23 (21).
https://doi.org/:10.3390/s23218744.
Liu, W.-Z., Zhang, Y.-Z., Zhen, Y.-Z., Li, M.-H., Liu, Y., Fan, J., Xu, F., et al. (2022). Toward a Photonic Demonstration of Device-Independent Quantum Key Distribution.
Physical Review Letters, 129 (5), 050502.
https://doi.org/:10.1103/PhysRevLett.129.050502
Ma, D., Liu, X., Huang, C., Chen, H., Lin, H., and Wei, K. (2021). Simple quantum key distribution using a stable transmitter-receiver scheme.
Optics Letters, 46 (9), 2152-2155.
https://doi.org/:10.1364/OL.418851
Mushtaq, A.-S., Ali Ihsan, A.-A., and Qasim, N. (2015). 2D-DWT vs. FFT OFDM Systems in fading AWGN channels.
Radioelectronics and Communications Systems, 58 (5), 228-233.
https://doi.org/:10.3103/S0735272715050052
Nandal, R., Nandal, A., Joshi, K., and Rathee, A. (2021). A Survey and Comparison of Some of the Most Prominent QKD Protocols.
SSRN Electronic Journal.
https://doi.org/:10.2139/ssrn.3769123
Qasim, N., and Fatah, O. (2022). The role of cyber security in military wars. V International Scientific and Practical Conference: Problems of cyber security of information and telecommunication systems (PCSITS). October 27 - 28. Kyiv, Ukraine.
Qasim, N., Khlaponin, Y., & Vlasenko, M. (2022). Formalization of the Process of Managing the Transmission of Traffic Flows on a Fragment of the LTE network.
Collection of Scientific Papers of the Military Institute of Taras Shevchenko National University of Kyiv, 75, 88–93.
https://doi.org/:10.17721/2519-481X/2022/75-09
Qasim, N., and Pyliavskyi, V. (2020). Color temperature line: forward and inverse transformation.
Semiconductor physics, quantum electronics and optoelectronics, 23, 75-80.
https://doi.org/:10.15407/spqeo23.01.075
Qasim, N. H., Vyshniakov, V., Khlaponin, Y., and Poltorak, V. (2021). Concept in information security technologies development in e-voting systems.
International Research Journal of Modernization in Engineering Technology and Science (IRJMETS), 3 (9), 40-54.
https://www.irjmets.com/uploadedfiles/paper/volume_3/issue_9_september_2021/15985/final/fin_irjmets1630649545.pdf
Reiß, S. D., and van Loock, P. (2023). Deep reinforcement learning for key distribution based on quantum repeaters.
Physical Review A, 108 (1), 012406.
https://doi.org/:10.1103/PhysRevA.108.012406
Señor, J., Portilla, J., and Mujica, G. (2022). Analysis of the NTRU Post-Quantum Cryptographic Scheme in Constrained IoT Edge Devices.
IEEE Internet of Things Journal, 9 (19), 18778-18790.
https://doi.org/:10.1109/JIOT.2022.3162254
Sharma, P., Agrawal, A., Bhatia, V., Prakash, S., and Mishra, A. K. (2021). Quantum Key Distribution Secured Optical Networks: A Survey.
IEEE Open Journal of the Communications Society, 2, 2049-2083.
https://doi.org/:10.1109/OJCOMS.2021.3106659
Solanki, D. B. S., Saini, A., and Saini, A. (2023). Review Paper on Quantum Computing and Quantum Cryptography. International Journal of Advanced Research in Science, Communication and Technology.
Sultan, J., Osmadi, I., and Manap, Z. (2022). Real-time Wi-Fi network performance evaluation.
International Journal of Informatics and Communication Technology (IJ-ICT), 11, 193.
https://doi.org/:10.11591/ijict.v11i3.pp193-205
Tupkary, D., and Lütkenhaus, N. (2023). Using Cascade in quantum key distribution.
Physical Review Applied, 20 (6), 064040.
https://doi.org/:10.1103/PhysRevApplied.20.064040
Xiunan, S., and Hao, L. (2023). Implementation of encoder and decoder for low-density parity-check codes in continuous-variable quantum key distribution on a field programmable gate array.
Optical Engineering, 62 (1), 014105.
https://doi.org/:10.1117/1.OE.62.1.014105
Yang, Y.-H., Li, P.-Y., Ma, S.-Z., Qian, X.-C., Zhang, K.-Y., Wang, L.-J., Zhang, W.-L., et al. (2021). All optical metropolitan quantum key distribution network with post-quantum cryptography authentication.
Optics Express, 29 (16), 25859-25867.
https://doi.org/:10.1364/OE.432944
Yousif, O., Dawood, M., Jassem, F. T., and Qasim, N. H. (2024). Curbing crypto deception: evaluating risks, mitigating practices and regulatory measures for preventing fraudulent transactions in the middle east.
Encuentros: Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico, (22), 311-334.
https://doi.org/:10.5281/zenodo.13732337
Zeydan, E., Turk, Y., Aksoy, B., and Ozturk, S. B. (2022). Recent Advances in Post-Quantum Cryptography for Networks: A Survey. 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ), 26-27 Feb. 2022.
https://doi.org/:10.1109/MobiSecServ50855.2022.9727214.