Author:
Verma Pramode K.,El Rifai Mayssaa,Chan Kam Wai Clifford
Reference21 articles.
1. El Rifai, M., & Verma, P. K. (2013). An algorithmic approach to securing the three-stage quantum cryptography protocol. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2013 (pp. 1803–1807).
2. Punekar, N. V. (2013). Implementation of the three-stage protocol over optical fiber (Masters thesis). University of oklahoma Tulsa.
3. El Rifai, M., Chan, K. W. C., & Verma, P. K. (2015). Multi-stage quantum secure communication using polarization hoppng. Security and Communication Networks.
4. Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21), 3121.
5. Jin, D., Verma, P. K., & Kartalopoulos, S. V. (2009). Fast convergent key distribution algorithms using a dual quantum channel. Security and Communication Networks, 2(6), 519–530.