Author:
Adhikari S.,Home Dipankar,Majumdar A. S.,Pan A. K.,Shenoy H. Akshata,Srikanth R.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Modelling and Simulation,Signal Processing,Theoretical Computer Science,Statistical and Nonlinear Physics,Electronic, Optical and Magnetic Materials
Reference49 articles.
1. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)
2. Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature (London) 299, 802 (1982)
3. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, vol. 175. IEEE, New York (1984)
4. Bell, J.S.: On the Einstein–Podolsky–Rosen paradox. Physics 1 (Long Island City, N.Y.). 195 (1964)
5. Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880 (1969)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献