Quantum cryptography - The analysis of security requirements
暂无分享,去创建一个
[1] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[2] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[3] Neil A. M. Maiden. User Requirements and System Requirements , 2008, IEEE Software.
[4] Xuejia Lai,et al. A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.
[5] Moshe Oron,et al. An Introduction to PON Technologies , 2007 .
[6] Chip Elliott,et al. Quantum Cryptography , 2004, IEEE Secur. Priv..
[7] ITU-T Rec. X.805 (10/2003) Security architecture for systems providing end-to-end communications , 2004 .
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Thomas Pfeiffer,et al. An introduction to PON technologies [Topics in Optical Communications] , 2007, IEEE Communications Magazine.
[10] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[11] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[12] Peter W. Shor,et al. Quantum Information Theory , 1998, IEEE Trans. Inf. Theory.
[13] L. Adleman,et al. The use of public key cryptography in communication system design , 1978, IEEE Communications Society Magazine.