Author:
Wei Kejin,Yang Xiuqing,Zhu Changhua,Yin Zhen-Qiang
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Modeling and Simulation,Signal Processing,Theoretical Computer Science,Statistical and Nonlinear Physics,Electronic, Optical and Magnetic Materials
Reference55 articles.
1. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, 1979, vol. 48, No. 313 (1979).
http://ci.nii.ac.jp/naid/20001635303/en/
2. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612 (1979).
https://doi.org/10.1145/359168.359176
3. Bennet, C.H.: Proceedings of IEEE International Conference on Computer Systems and Signal Processing, Bangalore, India, December 10–12, 1984 (1984)
4. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145 (2002)
5. Lo, H.K., Curty, M., Tamaki, K.: Secure quantum key distribution. Nat. Photonics 8(8), 595 (2014).
https://doi.org/10.1038/nphoton.2014.149
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献