Shirantha Wijesekera

Learn More
It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely Quantum Key Distribution (QKD), offers the promise of unconditional security. In this paper, we have extended our(More)
It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely Quantum Key Distribution (QKD), offers the promise of unconditional security.(More)
It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely Quantum Key Distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our(More)
It is the fact that wireless networks have become one of the most widely used communication systems in the world due to the wireless network's natures. However, at the same time providing secure communication for wireless networks has become one of the prime concerns. There are many ways to improve security issues, one of them, titled quantum cryptography,(More)
It is the fact that wireless local area networks are increasingly deployed by businesses, government and SOHO users as they offer many advantages to its customers with mobility, flexibility, convenience etc. It opened a wide range of new commercial areas for hardware vendors, at low cost. This justifies why wireless networks have become one of the most(More)
In cryptography, quantum key distribution (QKD) is a highly secure transmission method used to send secret keys from sender to receiver. This paper discusses about the software implementation of the first two phases of QKD: (1) raw key extraction and (2) error estimation. This paper also discusses about future work proposed to enhance these two phases. A(More)
Wireless technology is rapidly evolving, and is playing an important role in the lives of people throughout the world. Due to the nature of wireless communications, it is possible for an adversary to snoop on confidential communications or modify them to gain access to the wireless networks more easily than with wired networks. Out of many wireless(More)