Author:
Yan Yu-Fei,Zhou Lan,Zhong Wei,Sheng Yu-Bo
Publisher
Springer Science and Business Media LLC
Subject
Physics and Astronomy (miscellaneous)
Reference82 articles.
1. C. H. Bennett and G. Brassard, in: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India IEEE, New York, 175 (1984)
2. A. K. Ekert, Quantum cryptography based on Bell’s theorem, Phys. Rev. Lett. 67(6), 661 (1991)
3. H. K. Lo and H. F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science 283(5410), 2050 (1999)
4. N. J. Cerf, M. Bourennane, A. Karlsson, and N. Gisin, Security of quantum key distribution using d-level systems, Phys. Rev. Lett. 88(12), 127902 (2002)
5. D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, Quantum key distribution over 67 km with a plug play system, New J. Phys. 4, 41 (2002)
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献