共 50 条
- [34] Man-in-the-middle Attack on BB84 Protocol and its Defence 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434
- [35] Security of Entanglement Based Version of BB84 protocol for Quantum Cryptography PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 615 - 619
- [37] Optimizing the decoy-state BB84 QKD protocol parameters Quantum Information Processing, 2021, 20
- [38] The FPGA Implementation of Quantum Key Distribution Based on BB84 protocol PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 1571 - 1574
- [40] BB84 Protocol Simulation with Applying of Cascade Error Correction Method 2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,