共 50 条
- [31] Modification of B92 protocol and the proof of its unconditional security Wuli Xuebao/Acta Physica Sinica, 2002, 51 (07): : 1446 - 1447
- [32] Shor-Preskill method is inapplicable to B92 protocol Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2001, 23 (06):
- [33] B92 Protocol Analysis Related to the Same Basis Eavesdropping PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016), 2016, : 189 - 192
- [37] Implementation of Plug & Play Quantum Key Distribution Protocol 2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 47 - 49
- [40] Authenticated B92 QKD protocol employing synchronized optical chaotic systems Optical and Quantum Electronics, 2016, 48