Author:
Sundar K.,Sasikumar S.,Jayakumar C.,Nagarajan D.,karthick S.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference40 articles.
1. Alan M, Sheila F, Ray P (2009) Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration. Int J Netw Secur Appl 1(2):1–12
2. Avesani M, Tebyanian H, Villoresi P, Vallone G (2020) Semi-device-independent heterodyne-based quantum random number generator. Phys Rev Appl 15:034034
3. Ayad F Barsoum, Anwar Hasan M (2012) “Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers,” In the Proceedings of 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID 2012), pp. 829–834
4. Bennett CH, Brassard G, C. Cr´epeau, R. Jozsa, A. Peres, and W. K. Wootters (1993) Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys Rev Lett 70(13):1895–1899
5. Bennett CH, Hayden P, Leung DW, Shor PW, Winter A (2005) Remote preparation of quantum states. Inf Theory, IEEE Trans Inf Theory 51(1):56–74
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献