Invisible Trojan-horse attack
Abstract We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack perform...
Guardado en:
Autores principales: | Shihan Sajeed, Carter Minshull, Nitin Jain, Vadim Makarov |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2017
|
Materias: | |
Acceso en línea: | https://doaj.org/article/24b1b175064541328a6c4967e78d5d01 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
HIV and mature dendritic cells: Trojan exosomes riding the Trojan horse?
por: Nuria Izquierdo-Useros, et al.
Publicado: (2010) -
Bio-weapons and Bio-terrorism Attacks on Commercial Shipping in Nigeria: The Potential Trojan Horse of the 21st Century
por: Abdulrazaq O. Abdulkadir
Publicado: (2016) -
Osteopontin facilitates West Nile virus neuroinvasion via neutrophil “Trojan horse” transport
por: Amber M. Paul, et al.
Publicado: (2017) -
Macrophages and Monocytes: “Trojan Horses” in COVID-19
por: Elena Percivalle, et al.
Publicado: (2021) -
Packaging and delivery of chemical weapons: a defensive trojan horse stratagem in chromodorid nudibranchs.
por: Marianna Carbone, et al.
Publicado: (2013)