暂无分享,去创建一个
[1] Mostafa Azizi,et al. Security Oriented Analysis of B92 by Model Checking , 2008, 2008 New Technologies, Mobility and Security.
[2] Nikolaos Papanikolaou,et al. Model – Checking Quantum Protocols , 2006 .
[3] Mostafa Azizi,et al. Analysis of Quantum Cryptography Protocols by Model Checking , 2010 .
[4] Nick Papanikolaou,et al. Reasoning formally about quantum systems : an overview , 2005 .
[5] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[6] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[7] Rajagopal Nagarajan,et al. QMC: A Model Checker for Quantum Systems , 2007, CAV.
[8] Hoi-Kwong Lo,et al. From Quantum Cheating to Quantum Security , 2000, quant-ph/0111100.
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Liu Song-hao,et al. Plug and Play Systems for Quantum Cryptography , 2004 .
[11] Rajagopal Nagarajan,et al. An Automated Analysis of the Security of Quantum Key Distribution , 2005, ArXiv.
[12] Rajagopal Nagarajan,et al. Probabilistic Model-Checking of Quantum Protocols , 2005, ArXiv.
[13] Nikolaos Papanikolaou,et al. Techniques for design and validation of quantum protocols , 2004 .
[14] Mostafa Azizi,et al. Implementation of secure key distribution based on quantum cryptography , 2009, 2009 International Conference on Multimedia Computing and Systems.
[15] Rajagopal Nagarajan,et al. Formal Verification of Quantum Protocols , 2002 .
[16] Rajagopal Nagarajan,et al. Specification and Verification of Quantum Protocols , 2010 .