Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
暂无分享,去创建一个
[1] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[2] Daruri Venugopal,et al. Network Security and Cryptography , 2015 .
[3] Mosa Ali Abu-Rgheff. Fundamentals of Spread-Spectrum Techniques , 2007 .
[4] Tzonelih Hwang,et al. Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols , 2007, IEEE Transactions on Dependable and Secure Computing.
[5] Dharmendra Sharma,et al. Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network , 2009 .
[6] John T. Kohl,et al. The Evolution of the Kerberos Authentication Service , 1992 .
[7] Li-Hua Gong,et al. Quantum deterministic key distribution protocols based on teleportation and entanglement swapping , 2011 .
[8] P. Townsend. Secure key distribution system based on quantum cryptography , 1994 .
[9] Li Gong,et al. Efficient network authentication protocols: Lower bounds and optimal implementations , 1995, Distributed Computing.
[10] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[11] Solange Ghernaouti-Helie,et al. Integration of quantum cryptography in 802.11 networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[12] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[13] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[14] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[15] Guihua Zeng,et al. Identity verification in quantum key distribution , 2000 .
[16] Vijey Thayananthan. Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks , 2011 .
[17] Tzonelih Hwang,et al. Provably secure three-party password-based authenticated key exchange protocol using Weil pairing , 2005 .
[18] Alan Mink,et al. Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration , 2010, ArXiv.
[19] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[20] G. L. Morgan,et al. Quantum Cryptography over Underground Optical Fibers , 1996, CRYPTO.
[21] Li-Hua Gong,et al. Quantum deterministic key distribution protocols based on the authenticated entanglement channel , 2010 .
[22] Jürgen Schönwälder,et al. A nonce-based protocol for multiple authentications , 1992, OPSR.
[23] Won Young Hwang,et al. Quantum cryptography without public announcement of bases , 1997 .
[24] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .
[25] Dongho Won,et al. Simple and Efficient Group Key Agreement Based on Factoring , 2004, ICCSA.
[26] Li-Hua Gong,et al. A continuous variable quantum deterministic key distribution based on two-mode squeezed states , 2014 .
[27] Fibirova Jana,et al. Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .
[28] Li-Hua Gong,et al. Novel Quantum Deterministic Key Distribution Protocols with Entangled States , 2010 .
[29] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[30] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.