Two Channel Quantum Security Modelling Focusing on Quantum Key Distribution Technique
暂无分享,去创建一个
[1] Karolin Papst. Principles Of Quantum Computation And Information , 2016 .
[2] H. Weinfurter,et al. The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.
[3] Masahito Hayashi,et al. Quantum computation and information : from theory to experiment , 2006 .
[4] Pedram Khalili Amiri,et al. Quantum computers , 2003 .
[5] Gui-Lu Long,et al. Duality quantum information processing , 2010, 2010 Sixth International Conference on Natural Computation.
[6] Scott Aaronson,et al. The Limits of Quantum Computers , 2007, CSR.
[7] C. Anghel,et al. Development and Simulation of Quantum Cryptographic Protocols , 2013 .
[8] Zhang Xiao,et al. An Improved Method of Quantum Key Distribution Protocol , 2009, 2009 International Forum on Computer Science-Technology and Applications.
[9] Michael B. Mensky,et al. Everett Interpretation and Quantum Concept of Consciousness , 2013 .
[10] David McMahon. Quantum Computing Explained , 2007 .
[11] Giuliano Benenti,et al. Principles of Quantum Computation And Information: Basic Tools And Special Topics , 2007 .
[12] Anand Sharma,et al. Security of entanglement based version of BB84 protocol for Quantum Cryptography , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[13] Masahito Hayashi,et al. Quantum Computation and Information , 2006 .
[14] Giuliano Benenti,et al. Principles of Quantum Computation and Information:Volume II: Basic Tools and Special Topics , 2007 .
[15] Moses Garuba,et al. Research Directions in Quantum Cryptography , 2007, Fourth International Conference on Information Technology (ITNG'07).
[16] Pramode K. Verma,et al. A QKD protocol with a two-way quantum channel , 2011, 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS).
[17] William Stallings,et al. Cryptography and network security , 1998 .
[18] Stamatios V. Kartalopoulos,et al. Fast convergent key distribution algorithms using a dual quantum channel , 2009, Secur. Commun. Networks.
[19] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[20] Stamatios V. Kartalopoulos,et al. Key Distribution Using Dual Quantum Channels , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[21] Jie Xu,et al. Enhancing Grid Security using Quantum Key Distribution , 2012 .
[22] Giuliano Benenti,et al. Principles of Quantum Computation and Information - Volume I: Basic Concepts , 2004 .
[23] Thomas Baignères. Quantum Cryptography : On the Security of the BB84 Key-Exchange Protocol , 2003 .
[24] Archil Avaliani,et al. Quantum Computers , 2004, ArXiv.
[25] Mihnea Dulea,et al. Classical and quantum communications in grid computing , 2010 .
[26] C. Anghel. Research, Development and Simulation of Quantum Cryptographic Protocols , 2013 .
[27] Ronald I. Frank,et al. A feasibility study: secure public key infrastructure with quantum key distributions in grid computing , 2007 .