Game-Theoretic Security Analysis of Quantum Networks
暂无分享,去创建一个
[1] Christian P. Robert,et al. The Bayesian choice , 1994 .
[2] Ulrich Berger,et al. Brown's original fictitious play , 2007, J. Econ. Theory.
[3] L. C. Thomas. Games, theory, and applications , 1984 .
[4] K. Srinathan,et al. Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary , 2007, CANS.
[5] Stefan Rass,et al. Application framework for high security requirements in R&D environments based on quantum cryptography , 2008, 2008 Third International Conference on Risks and Security of Internet and Systems.
[6] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2008, IEEE Trans. Inf. Theory.
[7] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[8] K. Srinathan,et al. On perfectly secure communication over arbitrary networks , 2002, PODC '02.
[9] Kaoru Kurosawa,et al. MDS secret-sharing scheme secure against cheaters , 2000, IEEE Trans. Inf. Theory.
[10] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[11] C. Elliott. Building the quantum network* , 2002 .
[12] Tsan-Sheng Hsu,et al. Graph augmentation and related problems: theory and practice , 1993 .