802.11i Encryption Key Distribution Using Quantum Cryptography
暂无分享,去创建一个
Solange Ghernaouti-Helie | Thi Mai Trang Nguyen | Mohamed Ali Sfaxi | T. Nguyen | M. Sfaxi | S. Ghernaouti-Helie
[1] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[2] Richard J. Hughes,et al. FREE-SPACE QUANTUM-KEY DISTRIBUTION , 1998, quant-ph/9801006.
[3] S. Inoue,et al. Quantum key distribution over an installed multimode optical fiber local area network , 2006, 2006 Conference on Lasers and Electro-Optics and 2006 Quantum Electronics and Laser Science Conference.
[4] Richard J. Hughes,et al. Practical free-space quantum key distribution over 10 km in daylight and at night , 2002, quant-ph/0206092.
[5] N. Cerf,et al. Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.
[6] H. Weinfurter,et al. Distributing entanglement and single photons through an intra-city, free-space quantum channel , 2005, EQEC '05. European Quantum Electronics Conference, 2005..
[7] Solange Ghernaouti-Helie,et al. Integration of quantum cryptography in 802.11 networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[8] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[9] A. Tomita,et al. Single-photon interference experiment over 100 km for quantum cryptography system using balanced gated-mode photon detector , 2003, quant-ph/0306066.
[10] D. Bethune,et al. Autocompensating quantum cryptography , 2002, quant-ph/0204144.
[11] N. Gisin,et al. Quantum key distribution over 67 km with a plug , 2002 .
[12] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[13] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[14] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[15] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[16] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[17] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[18] Lars Richter,et al. Untersuchung und Bewertung von Netzzugangssteuerungen auf Basis des Standards 802.1x (Port-Based Network Access Control) , 2005 .
[19] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[20] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[21] Jane E. Nordholt,et al. Free space quantum key distribution over 10km in daylight and at night , 2002 .
[22] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[23] Kenneth G. Paterson,et al. Why Quantum Cryptography , 2004 .
[24] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[25] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[26] Harald Weinfurter,et al. Long-distance free-space quantum cryptography , 2002, SPIE/COS Photonics Asia.
[27] A. Zeilinger,et al. Long-distance quantum communication with entangled photons using satellites , 2003, quant-ph/0305105.
[28] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[29] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[30] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[31] N. Gisin,et al. Quantum cryptography , 1998 .
[32] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[33] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.