Author:
Lari B.,Hossientabar M.,Hassanabadi H.
Publisher
Springer Science and Business Media LLC
Subject
Atomic and Molecular Physics, and Optics
Reference33 articles.
1. C.H. Bennett, G. Brassard, Quantum Cryptography: Public Key Distribution and Coin Tossing. Theoretical Computer Science 560(2014) pp. 7–11
2. A. Farouk, M. Zakaria, A. Megahed, F.A. Omara, A generalized architecture of quantum secure direct communication for disjointed users with authentication. Sci. Rep. 5, 16080 (2015)
3. K. Bartkiewicz, A. Cernoch, K. Lemr, Using quantum routers to implement quantum message authentication and Bell-state manipulatio. Phys. Rev. A. 90, 022335 (2014)
4. M. Alizadeh, Some notes on th k-normal elements an k-normal polynomials over finite fields. J. Algebra Appl. 16(01), 1750006 (2017)
5. X. Li, D. Zhang, E-commerce security model construction based on Mobile Agent, in International Conference on Networking and Digital Society, 978-1-4244-5161-6/10, IEEE (2010)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Distance Based Security using Quantum Entanglement:a survey;2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT);2022-10-03
2. Quantum Secure Communication Between Service Provider and Sim;IEEE Access;2022