Author:
Thind Sonia,Shukla Anand Kumar
Publisher
Springer Nature Singapore
Reference21 articles.
1. Marwaha P, Marwaha P (2010) Visual cryptographic steganography in images. In: Second international conference on computing, communication and networking technologies, 978-1-4244-6589-7/10. IEEE
2. Deng FG, Li XH, Long GL (2016) Quantum secure direct communication. J Beijing Normal Univ Natural Sci 52(6):790–799
3. Du J et al. (2002) Experimental realization of quantum games on a quantum computer. Phys Rev Lett 88(13). Art. no. 137902
4. Li J, Chen XB, Xu G, Yang YX, Li ZP (2015) Perfect quantum network coding independent of classical network solutions. IEEE Commun Lett 19(2):115–118
5. Chen XB, Dou Z, Xu G, Wang C, Yang YX (2014) A class of protocols for quantum private comparison based on the symmetry of states. Quantum Inf Process 13(1):85–100