Author:
Chou Yao-Hsin,Zeng Guo-Jyun,Lin Fang-Jhu,Chen Chi-Yuan,Chao Han-Chieh
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference40 articles.
1. Chang L-P, Wu T-C, Hsu C-L, Lu C-F (2010) Two level authenticated group key agreement protocol with privacy-preservation for resource-limited mobile devices. J Internet Technol 11(4):519–528
2. del Álamo JM, Fernández AM, Trapero R, Yelmo JC, Monjas MA (2011) A privacy-considerate framework for identity management in mobile services. Mob Netw Appl 15(4):446–459
3. Chou YH, Chen C-Y, Chao H-C, Park JH, Fan R-K (2011) Quantum entanglement and non-locality based secure computation for future communication. IET Inf Secur 5(1):69–79
4. Bennett CH, Brassard G (1984) Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, p 175
5. Ekert AK (1991) Quantum cryptography based on Bell’s theorem. Phys Rev Lett 67:661–663
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献