1. Goorden, S.A., Horstmann, M., Mosk, A.P., Škori, B., Pinkse, P.W.H.: Quantum-secure authentication of a physical unclonable key. Optica. 1(6), (Dec. 2014)
2. Thayananthan, V., Alzahrani, A., Qureshi, M.S.: Efficient techniques of key management and quantum cryptography in RFID networks. Secur. commun. netw. USA, (2014) Published online in Wiley Online Library (wileyonlinelibrary.com).
https://doi.org/10.1002/sec.1005
3. Thayananthan, V., Alzahrani, A.: Analysis of key management and quantum cryptography in wireless sensors networks. IJCA Spec. Issue Netw. Secur. Cryptograph (NSC 2011), Int. J. Compu. Appl. (IJCA). USA, pp. 45–49 (2011)
4. Chubb, C., Yellott, J.I.: Dipole statistics of discrete finite images: two visually motivated representation theorems. J. Opt. Soc. Am. A. (May 2002)
5. Cao, J., Li, H., Ma, M., et al.: A simple and robust handover authentication between HeNB and eNB in LTE networks. J. Comput. Netw. Int. J. Comput. Telecommun. Netw. 56, pp. 2119–2131 (2012)