{"id":"https://openalex.org/W2786827588","doi":"https://doi.org/10.1109/nsyss2.2017.8267797","title":"A secure and efficient data transmission technique using quantum key distribution","display_name":"A secure and efficient data transmission technique using quantum key distribution","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2786827588","doi":"https://doi.org/10.1109/nsyss2.2017.8267797","mag":"2786827588"},"language":"en","primary_location":{"id":"doi:10.1109/nsyss2.2017.8267797","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nsyss2.2017.8267797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036188174","display_name":"Md. Armanuzzaman","orcid":null},"institutions":[{"id":"https://openalex.org/I1307585291","display_name":"Khulna University of Engineering and Technology","ror":"https://ror.org/04y58d606","country_code":"BD","type":"education","lineage":["https://openalex.org/I1307585291"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Md. Armanuzzaman","raw_affiliation_strings":["Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh","institution_ids":["https://openalex.org/I1307585291"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014285597","display_name":"Kazi Md. Rokibul Alam","orcid":"https://orcid.org/0000-0003-4895-7234"},"institutions":[{"id":"https://openalex.org/I1307585291","display_name":"Khulna University of Engineering and Technology","ror":"https://ror.org/04y58d606","country_code":"BD","type":"education","lineage":["https://openalex.org/I1307585291"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Kazi Md. Rokibul Alam","raw_affiliation_strings":["Khulna University of Engineering and Technology, Khulna, BD"],"affiliations":[{"raw_affiliation_string":"Khulna University of Engineering and Technology, Khulna, BD","institution_ids":["https://openalex.org/I1307585291"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029588314","display_name":"Md Mehadi Hassan","orcid":"https://orcid.org/0000-0003-3800-0738"},"institutions":[{"id":"https://openalex.org/I1307585291","display_name":"Khulna University of Engineering and Technology","ror":"https://ror.org/04y58d606","country_code":"BD","type":"education","lineage":["https://openalex.org/I1307585291"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Md. Mehadi Hassan","raw_affiliation_strings":["Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh","institution_ids":["https://openalex.org/I1307585291"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078425375","display_name":"Yasuhiko Morimoto","orcid":"https://orcid.org/0000-0001-7130-2864"},"institutions":[{"id":"https://openalex.org/I113306721","display_name":"Hiroshima University","ror":"https://ror.org/03t78wx29","country_code":"JP","type":"education","lineage":["https://openalex.org/I113306721"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasuhiko Morimoto","raw_affiliation_strings":["Graduate School of Engineering, Hiroshima University, Higashi-Hiroshima, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Engineering, Hiroshima University, Higashi-Hiroshima, Japan","institution_ids":["https://openalex.org/I113306721"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036188174"],"corresponding_institution_ids":["https://openalex.org/I1307585291"],"apc_list":null,"apc_paid":null,"fwci":0.2079,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.6733559,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7788923382759094},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7574523687362671},{"id":"https://openalex.org/keywords/huffman-coding","display_name":"Huffman coding","score":0.6771529912948608},{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.6295909285545349},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.58030766248703},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.5655593276023865},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5450589060783386},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5419921875},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.5059117674827576},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4857223629951477},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.47402647137641907},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46308284997940063},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.45961257815361023},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4341072738170624},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.40254098176956177},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.325700044631958},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.2983715534210205},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1784764528274536},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08625316619873047}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7788923382759094},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7574523687362671},{"id":"https://openalex.org/C46900642","wikidata":"https://www.wikidata.org/wiki/Q2647","display_name":"Huffman coding","level":3,"score":0.6771529912948608},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.6295909285545349},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.58030766248703},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.5655593276023865},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5450589060783386},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5419921875},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.5059117674827576},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4857223629951477},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.47402647137641907},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46308284997940063},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.45961257815361023},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4341072738170624},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.40254098176956177},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.325700044631958},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2983715534210205},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1784764528274536},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08625316619873047},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nsyss2.2017.8267797","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nsyss2.2017.8267797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W194305308","https://openalex.org/W1541400212","https://openalex.org/W1988979905","https://openalex.org/W2027535669","https://openalex.org/W2049471987","https://openalex.org/W2049617419","https://openalex.org/W2051051926","https://openalex.org/W2053567730","https://openalex.org/W2075452308","https://openalex.org/W2110837802","https://openalex.org/W2158896798","https://openalex.org/W2185881956","https://openalex.org/W2290274187","https://openalex.org/W2541745257","https://openalex.org/W2987687226","https://openalex.org/W6654347880","https://openalex.org/W6687083206"],"related_works":["https://openalex.org/W1557642114","https://openalex.org/W1762028264","https://openalex.org/W2372183081","https://openalex.org/W3103342782","https://openalex.org/W4388132059","https://openalex.org/W2891673431","https://openalex.org/W2980414499","https://openalex.org/W2969820670","https://openalex.org/W4366975047","https://openalex.org/W2315885856"],"abstract_inverted_index":{"This":[0],"paper":[1,91],"proposes":[2],"a":[3,93],"new":[4],"data":[5,29,35,114,122,127,149],"transmission":[6,123],"technique":[7,20,132,176],"that":[8,96,119,142],"uses":[9,104],"Quantum":[10],"Key":[11],"Distribution":[12],"(QKD)":[13],"method,":[14],"One":[15],"Time":[16],"Pad":[17],"(OTP)":[18],"encryption":[19],"and":[21,32,87,98,160,171],"Huffman":[22,105],"encoding":[23],"compression":[24,44,108],"algorithm":[25,109],"to":[26,110],"transmit":[27],"the":[28,53,64,75,82,85,88,100,112,116,121,134,139,144,147,151,155,166,174],"more":[30],"securely":[31],"efficiently.":[33],"While":[34],"is":[36,50],"transmitted,":[37],"requirements":[38,168],"like":[39],"secrecy,":[40],"less":[41],"overhead":[42,156],"through":[43],"etc":[45],"are":[46,163,177],"crucial":[47],"issues.":[48],"QKD":[49,140],"one":[51],"of":[52,67,77,146,157],"most":[54],"promising":[55],"methods":[56],"which":[57],"provide":[58],"unconditional":[59],"security.":[60],"It":[61],"relies":[62],"upon":[63],"immutable":[65],"laws":[66],"quantum":[68,159],"physics":[69],"rather":[70],"than":[71],"computational":[72],"complexity":[73],"as":[74],"basis":[76],"its":[78],"secrecy.":[79],"To":[80],"establish":[81],"trust":[83],"between":[84],"sender":[86],"receiver,":[89],"this":[90],"considers":[92],"trusted":[94],"center":[95],"distributes":[97],"verifies":[99],"key.":[101],"Also":[102],"it":[103,129],"encoding-a":[106],"lossless":[107],"compress":[111],"transmitted":[113,148],"over":[115,150],"classical":[117,152,161],"channel":[118],"reduces":[120],"overhead.":[124],"Moreover":[125],"for":[126,169,173],"encryption,":[128],"applies":[130],"OTP":[131],"with":[133],"key":[135],"randomly":[136],"generated":[137],"by":[138],"method":[141],"ensures":[143],"secrecy":[145],"channel.":[153],"Thus":[154],"both":[158],"channels":[162],"reduced.":[164],"Finally":[165],"time":[167],"encoding-decoding":[170],"encryption-decryption":[172],"proposed":[175],"evaluated.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
