This HTML5 document contains 47 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n19http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n21http://localhost/temp/predkladatel/
n15http://purl.org/net/nknouf/ns/bibtex#
n18http://linked.opendata.cz/resource/domain/vavai/projekt/
n9http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n14http://linked.opendata.cz/resource/domain/vavai/subjekt/
n10http://linked.opendata.cz/ontology/domain/vavai/
n17https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n22http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F70883521%3A28140%2F11%3A43865809%21RIV12-MSM-28140___/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n20http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n13http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n16http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F70883521%3A28140%2F11%3A43865809%21RIV12-MSM-28140___
rdf:type
n10:Vysledek skos:Concept
dcterms:description
This work is intended to be used as a brief introduction to the vast field of quantum cryptography. In the first part there is basic explanation of cryptography dividing, followed by the explanation of how Vernam cypher works, its indecipherability and usage in the quantum transfer. In the next part it is devoting to detail inscription of one of many possible protocols applicable for quantum channel transfer, so called BB84. Last part is mildly exploring quantum cryptography and its acomplishments in real world. This work is intended to be used as a brief introduction to the vast field of quantum cryptography. In the first part there is basic explanation of cryptography dividing, followed by the explanation of how Vernam cypher works, its indecipherability and usage in the quantum transfer. In the next part it is devoting to detail inscription of one of many possible protocols applicable for quantum channel transfer, so called BB84. Last part is mildly exploring quantum cryptography and its acomplishments in real world. This work is intended to be used as a brief introduction to the vast field of quantum cryptography. In the first part there is basic explanation of cryptography dividing, followed by the explanation of how Vernam cypher works, its indecipherability and usage in the quantum transfer. In the next part it is devoting to detail inscription of one of many possible protocols applicable for quantum channel transfer, so called BB84. Last part is mildly exploring quantum cryptography and its acomplishments in real world.
dcterms:title
Quantum Cryptography Kvantová Kryptografie Kvantová Kryptografie
skos:prefLabel
Kvantová Kryptografie Quantum Cryptography Kvantová Kryptografie
skos:notation
RIV/70883521:28140/11:43865809!RIV12-MSM-28140___
n10:predkladatel
n14:orjk%3A28140
n3:aktivita
n4:S n4:P
n3:aktivity
P(ED2.1.00/03.0089), S
n3:dodaniDat
n16:2012
n3:domaciTvurceVysledku
n9:6523005 n9:4684125
n3:druhVysledku
n8:D
n3:duvernostUdaju
n20:S
n3:entitaPredkladatele
n22:predkladatel
n3:idSjednocenehoVysledku
208688
n3:idVysledku
RIV/70883521:28140/11:43865809
n3:jazykVysledku
n13:cze
n3:klicovaSlova
Quantum Cryptography, BB84, Vernam’s Cypher, Foton Polarization
n3:klicoveSlovo
n12:BB84 n12:Foton%20Polarization n12:Vernam%E2%80%99s%20Cypher n12:Quantum%20Cryptography
n3:kontrolniKodProRIV
[382C44CF6FA5]
n3:mistoKonaniAkce
Zlín
n3:mistoVydani
Zlín
n3:nazevZdroje
Conference Proceedings Internet, Competitiveness and Organizational Security
n3:obor
n7:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
2
n3:projekt
n18:ED2.1.00%2F03.0089
n3:rokUplatneniVysledku
n16:2011
n3:tvurceVysledku
Malaník, David Boudná, Hana
n3:typAkce
n19:EUR
n3:zahajeniAkce
2011-03-16+01:00
s:numberOfPages
6
n15:hasPublisher
Fakulta aplikované informatiky Univerzity Tomáše Bati ve Zlíně
n17:isbn
978-80-7454-012-7
n21:organizacniJednotka
28140