Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution

Publication Type:

Report

Authors:

Nageen Saleem; Areeba Rahman; Muhammad Rizwan; Shahid Naseem; Fahad Ahmad

Source:

EAI Endorsed Transactions on Scalable Information Systems (2020)
  • 2457 reads
  • Google Scholar
  • RTF
  • EndNote XML

References

Niemiec, Marcin, Andrzej Dziech, Miłosz Stypiński, and Jan Derkacz. "Quantum-Based Solutions for the Next-Generation Internet." Information & Security: An International Journal 43, no. 1 (2019): 62-72.

Check also our Google Scolar profile

  • Downloads
  • How to cite
No files have yet been downloaded.
APA style: Saleem, N., Rahman A., Rizwan M., Naseem S., & Ahmad F. (2020).  Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution. EAI Endorsed Transactions on Scalable Information Systems .
Chicago style: Saleem, Nageen, Areeba Rahman, Muhammad Rizwan, Shahid Naseem, and Fahad Ahmad. Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution In EAI Endorsed Transactions on Scalable Information Systems ., 2020.
IEEE style: Saleem, N., A. Rahman, M. Rizwan, S. Naseem, and F. Ahmad, "Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution", EAI Endorsed Transactions on Scalable Information Systems , 2020.
  • Trending
  • Latest
  • Most cited
  • Hofstede’s Power Distance Matrix: Law Enforcement Leadership Theory and Communication (2,286)
  • Leadership in Developing a Strategy for Military Human Resource Management as Part of Capabilities-Based Defense Planning (2,205)
  • Leadership Theories and Defense Reform in the People’s Republic of China (2,170)
  • Chains, Continuums, and Virtuous Cycles: Parsing Taiwan’s Strategic Narratives and Soft Power Leadership in the Indo-Pacific (2,156)
  • The Impact of Organizational Design and Leadership on Strategic Communications (2,076)
view all
  • Lessons for NATO to Be Learned from Putin's War in Ukraine: Global Health Engagement, Interoperability, and Lethality
  • Distorting Your Perception of Russia’s Aggression: How Can We Combat Information Warfare?
  • The Impact of War on the Ukraine Military Education System: Moving Forward in War and Peace
  • Excessive Brotherly Love? - 'Fraternity' of Russians and Ukrainians as a Russian Propaganda Narrative
  • Russia's Gambit to Redefine the Current World Order
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2022
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal