Author:
Smania Massimiliano,Elhassan Ashraf M,Tavakoli Armin,Bourennane Mohamed
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Statistical and Nonlinear Physics,Computer Science (miscellaneous)
Reference23 articles.
1. Bell, J. S. On the Einstein-Podolsky-Rosen paradox. Physics 1, 195–200 (1966).
2. Bennett, C. H. & Brassard, G. in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing 175–179 (Bangalore, India, 1984).
3. Ekert, A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991).
4. Żukowski, M., Zeilinger, A., Horne, M. A. & Weinfurter, H. Quest for GHZ states. Acta Phys. Pol. 93, 187–195 (1998).
5. Hillery, M., Bûzek, V. & Berthiaume, A. Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999).
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献