共 50 条
- [32] Quantum Cryptography - The Analysis of Security Requirements ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
- [34] Security against eavesdropping in quantum cryptography QUANTUM COMMUNICATION, COMPUTING, AND MEASUREMENT, 1997, : 89 - 98
- [36] Key Distribution Protocol on Quantum Cryptography 2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
- [37] Quantum cryptography with floating basis protocol QUANTUM INFORMATICS 2004, 2004, 5833 : 213 - 221
- [38] A note on quantum security for post-quantum cryptography Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
- [39] A Note on Quantum Security for Post-Quantum Cryptography POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
- [40] Improving Bio-Cryptography Authentication Protocol 2015 9TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2015,