暂无分享,去创建一个
Peng Zhang | Walter O. Krawec | Zefan Tang | Yanyuan Qin | Zimin Jiang | Peng Zhang | Zefan Tang | Yanyuan Qin | Zimin Jiang
[1] Jino Heo,et al. Quantum digital signature in a network , 2019, Quantum Information Processing.
[2] Marco Liserre,et al. Microgrid Stability Definitions, Analysis, and Examples , 2020, IEEE Transactions on Power Systems.
[3] Song Y. Yan,et al. Logarithm Based Cryptography , 2018, Cybercryptography: Applicable Cryptography for Cyberspace Security.
[4] Nzimako Onyinyechi. Real tIme simulation of a microgrid system with distributed energy resources , 2015 .
[5] Aditya Ashok,et al. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[6] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[7] Tsuyoshi Murata,et al. {m , 1934, ACML.
[8] Do Ngoc Diep,et al. No-Cloning Theorem, Kochen-Specker Theorem, and Quantum Measurement Theories , 2019, International Journal of Theoretical Physics.
[9] M. Kasevich,et al. Quantum superposition at the half-metre scale , 2015, Nature.
[10] Joshua D. Guttman,et al. Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version) , 2019, Foundations of Security, Protocols, and Equational Reasoning.
[11] Feihu Xu,et al. Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.
[12] Peng Zhang,et al. Software-Defined Microgrid Control: The Genesis of Decoupled Cyber-Physical Microgrids , 2020, IEEE Open Access Journal of Power and Energy.
[13] J. D. Wong-Campos,et al. Benchmarking an 11-qubit quantum computer , 2019, Nature Communications.
[14] René Schoof,et al. The Discrete Logarithm Problem , 2016, Open Problems in Mathematics.
[15] Rodney Van Meter,et al. Quantum Networking , 2019, Cryptography Apocalypse.
[16] Nicolas Gisin,et al. Quantum key distribution and 1 Gbps data encryption over a single fibre , 2009, 0912.1798.
[17] G. Burkard,et al. Spin qubits in graphene quantum dots , 2006, cond-mat/0611252.
[18] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[19] S. C. Coutinho. The Mathematics of Ciphers: Number Theory and RSA Cryptography , 1999 .
[20] Peter B. Luh,et al. Enabling Resilient Microgrid Through Programmable Network , 2017, IEEE Transactions on Smart Grid.
[21] Danna Zhou,et al. d. , 1840, Microbial pathogenesis.
[22] Daniel Smith-Tone,et al. Report on Post-Quantum Cryptography , 2016 .
[23] Andrey Bogdanov,et al. Compact circuits for combined AES encryption/decryption , 2017, Journal of Cryptographic Engineering.
[24] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[25] Hugo Zbinden,et al. Finite-key analysis for the 1-decoy state QKD protocol , 2018, 1801.03443.
[26] Anoud Bani-Hani,et al. Online Authentication Methods Used in Banks and Attacks Against These Methods , 2019, ANT/EDI40.
[27] Sheila Cobourne,et al. Quantum Key Distribution Protocols and Applications , 2011 .
[28] Colin P. Williams. Quantum Chemistry with a Quantum Computer , 2011 .
[29] C. Cobeli,et al. ON THE DISCRETE LOGARITHM PROBLEM , 2008, 0811.4182.
[30] Roman Orus,et al. Quantum computing for finance: Overview and prospects , 2018, Reviews in Physics.
[31] V. Makarov. Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.
[32] Lorena Isabel Barona López,et al. Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection , 2019, ArXiv.
[33] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[34] Peng Zhang,et al. Enhanced Microgrid Power Flow Incorporating Hierarchical Control , 2020, IEEE Transactions on Power Systems.
[35] J. S. Shaari,et al. Advances in Quantum Cryptography , 2019, 1906.01645.
[36] Xiongfeng Ma,et al. Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.