Quantum security in wireless sensor networks
From MaRDI portal
Publication:609030
DOI10.1007/S11047-010-9190-4zbMATH Open1207.68152OpenAlexW1983248889MaRDI QIDQ609030FDOQ609030
Authors: Naya Nagy, Marius Nagy, Selim G. Akl
Publication date: 30 November 2010
Published in: Natural Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11047-010-9190-4
Recommendations
Quantum algorithms and complexity in the theory of computing (68Q12) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- SPINS: Security protocols for sensor networks
- Quantum cryptography based on Bell’s theorem
- Title not available (Why is that?)
- A single quantum cannot be cloned
- Quantum cryptography without Bell’s theorem
- Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
- Quantum key distribution and quantum authentication based on entangled state
- Quantum Authenticated Key Distribution
Cited In (4)
Uses Software
This page was built for publication: Quantum security in wireless sensor networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q609030)