Learn More
— Aeronautical Telecommunication Network (ATN) is the network used by the Air Traffic Authorities, the Air Traffic Controllers (ATCo), the aircrafts and all Ground Stations (GS) to communicate voice and data. This paper describes how the ATN can be secured by using Quantum Cryptography (QC), either fiber-based QC or free-space QC, instead of classical PKI.(More)
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKD-based network framework and we show that the key transmission problem on such a framework can be considered as a variant of the classical percolation problem. We also present an(More)
In this paper we present a recent study on video sharing websites. This study aims to understand their content characteristics. This could be useful to understand Internet users' behaviour and manage web resources in order to provide a better video sharing service. In our work, we improved an existing graph-sampling algorithm so that it could be more(More)
— In this work we present the principles and experimental demonstration of a BB84 Quantum Key Distribution (QKD) one way system using fainted pulses and a Quadrature Phase-Shift-Keying (QPSK) format including a time-multiplexed unmodulated carrier reference at Alice's end, and a differential homodyne reception at Bob's end. We also describe the secure(More)
—Quantum Key Distribution (QKD) principles and software implementations are now well-known. Focussing on CASCADE algorithm, a major step of the key distillsation algorithm (BB84), we show that the mathematical optimality may not mean practical efficiency because of the design of computers and their processors. As pointed out by John Backus [1], the father(More)
We introduce a new overlay network named ROSA<sup>1</sup>. Overlay networks offer a way to bypass the routing constraints of the underlying network. ROSA used this overlay network property to offer a resilient routing to critical applications. Unlike other overlay networks dealing with the routing resilience issue, we oriented our research towards building(More)
We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance between them exceeds the limited range of QKD. Carol is a intermediate node that could share QKD links with Alice and Bob. Carol is assumed to be quasi-trusted: she correctly follows the(More)