-
1
-
-
0003259517
-
Quantum cryptography: Publickey distribution and coin tossing
-
Bangalore, India
-
Bennett, C., and Brassard, G.:'Quantum cryptography: publickey distribution and coin tossing', Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, Bangalore, India, 1984, p. 175-179
-
(1984)
Proc. IEEE Int. Conf. Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.1
Brassard, G.2
-
2
-
-
72149109264
-
New efficient three-party quantum key distribution protocols
-
1077-260X
-
Shih, H.-C., Lee, K.-C., and Hwang, T.:'New efficient three-party quantum key distribution protocols', IEEE J. Sel. Top. Quantum Electron., 2009, 15, (6), p. 1602-1606 1077-260X
-
(2009)
IEEE J. Sel. Top. Quantum Electron.
, vol.15
, Issue.6
, pp. 1602-1606
-
-
Shih, H.-C.1
Lee, K.-C.2
Hwang, T.3
-
3
-
-
34547248279
-
Quantum cryptography: A survey
-
Article 6 0360-0300
-
Bruss, D., Erdelyi, G., Meyer, T., Riege, T., and Rothe, J.:'Quantum cryptography: a survey', ACM Comput. Surv., 2007, 39, (2), Article 6 0360-0300
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.2
-
-
Bruss, D.1
Erdelyi, G.2
Meyer, T.3
Riege, T.4
Rothe, J.5
-
5
-
-
41149094650
-
Ubiquitous wireless telemedicine
-
DOI 10.1049/iet-com:20070361
-
Rashvand, H.F., Salcedo, V.T., Sanchez, E.M., and Iliescu, D.:'Ubiquitous wireless telemedicine', IET Commun., 2008, 2, (2), p. 237-254 10.1049/iet-com:20070361 (Pubitemid 351432521)
-
(2008)
IET Communications
, vol.2
, Issue.2
, pp. 237-254
-
-
Rashvand, H.F.1
Traver Salcedo, V.2
Monton Sanchez, E.3
Iliescu, D.4
-
6
-
-
41149175630
-
Quality labels for e-health
-
DOI 10.1049/iet-com:20060596
-
Ferrer-Roca, O., Marcano, F., and Diaz-Cardama, A.:'Quality labels for e-health', IET Commun., 2008, 2, (2), p. 202-207 10.1049/iet-com:20060596 (Pubitemid 351432516)
-
(2008)
IET Communications
, vol.2
, Issue.2
, pp. 202-207
-
-
Ferrer-Roca, O.1
Marcano, F.2
Diaz-Cardama, A.3
-
7
-
-
0033361961
-
Using public-key infrastructures for security and risk management
-
DOI 10.1109/35.790867
-
Wing, P., and O'Higgins, B.:'Using public-key infrastructures for security and risk management', IEEE Commun. Mag., 1999, 37, (9), p. 71-73 10.1109/35.790867 0163-6804 (Pubitemid 30501435)
-
(1999)
IEEE Communications Magazine
, vol.37
, Issue.9
, pp. 71-73
-
-
Wing, P.1
O'Higgins, B.2
-
8
-
-
33846890639
-
A mathematic application on secure electronic transaction: Elliptic curve cryptography
-
1607-9264
-
Huang, P.-H.:'A mathematic application on secure electronic transaction: elliptic curve cryptography', J. Internet Technol., 2007, 8, (1), p. 87-99 1607-9264
-
(2007)
J. Internet Technol.
, vol.8
, Issue.1
, pp. 87-99
-
-
Huang, P.-H.1
-
9
-
-
67649480613
-
Quantum entanglement
-
10.1103/RevModPhys.81.865 0034-6861
-
Horodecki, R., Horodecki, P., Horodecki, M., and Horodecki, K.:'Quantum entanglement', Rev. Mod. Phys., 2009, 81, p. 865-942 10.1103/RevModPhys.81.865 0034-6861
-
(2009)
Rev. Mod. Phys.
, vol.81
, pp. 865-942
-
-
Horodecki, R.1
Horodecki, P.2
Horodecki, M.3
Horodecki, K.4
-
10
-
-
4243059985
-
Teleporting an unknown quantum state via dual classical and epr channels
-
10.1103/PhysRevLett.70.1895 0031-9007
-
Bennett, C., Brassard, G., Crepeau, C., Jozsa, R., Peres, A., and Wootters, W.:'Teleporting an unknown quantum state via dual classical and epr channels', Phys. Rev. Lett., 1993, 70, p. 1895-1899 10.1103/PhysRevLett.70.1895 0031-9007
-
(1993)
Phys. Rev. Lett.
, vol.70
, pp. 1895-1899
-
-
Bennett, C.1
Brassard, G.2
Crepeau, C.3
Jozsa, R.4
Peres, A.5
Wootters, W.6
-
11
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
10.1103/PhysRevLett.23.880 0031-9007
-
Clauser, J., Horne, M., Shimony, A., and Holt, R.:'Proposed experiment to test local hidden-variable theories', Phys. Rev. Lett., 1969, 23, p. 880-884 10.1103/PhysRevLett.23.880 0031-9007
-
(1969)
Phys. Rev. Lett.
, vol.23
, pp. 880-884
-
-
Clauser, J.1
Horne, M.2
Shimony, A.3
Holt, R.4
-
12
-
-
0000486090
-
On the Einstein-Podolsky-Rosen paradox
-
10.1142/9789812795854-0072
-
Bell, J.S.:'On the Einstein-Podolsky-Rosen paradox', Physics, 1964, 1, p. 195-200 10.1142/9789812795854-0072
-
(1964)
Physics
, vol.1
, pp. 195-200
-
-
Bell, J.S.1
-
13
-
-
34547172365
-
Open questions and possible solutions
-
Toronto, Canada
-
Popescu, S., and Rohrlich, D.:'Open questions and possible solutions', Proc. Causality and Locality in Modern Physics and Astronomy, a Symp. to Honor Jean-Pierre Vigier, Toronto, Canada, 1997
-
(1997)
Proc. Causality and Locality in Modern Physics and Astronomy, A Symp. to Honor Jean-Pierre Vigier
-
-
Popescu, S.1
Rohrlich, D.2
-
14
-
-
77951134661
-
Non-locality and communication complexity
-
10.1103/RevModPhys.82.665 0034-6861
-
Buhrman, H., Cleve, R., Massar, S., and de Wolf, R.:'Non-locality and communication complexity', Rev. Mod. Phys., 2010, 82, p. 665-698 10.1103/RevModPhys.82.665 0034-6861
-
(2010)
Rev. Mod. Phys.
, vol.82
, pp. 665-698
-
-
Buhrman, H.1
Cleve, R.2
Massar, S.3
De Wolf, R.4
-
16
-
-
42549130867
-
Quantum entanglement and its applications on secure computation
-
1717250, 2006 6th IEEE Conference on Nanotechnology, IEEE-NANO 2006
-
Chou, Y.-H., Tsai, I.-M., and Kuo, S.-Y.:'Quantum entanglement and its applications on secure computation', Proc. Sixth IEEE Conf. on Nanotechnology, Cincinnati, Ohio, 2006, p. 878-881 (Pubitemid 351576564)
-
(2006)
2006 6th IEEE Conference on Nanotechnology, IEEE-NANO 2006
, vol.2
, pp. 878-881
-
-
Chou, Y.-H.1
Tsai, I.-M.2
Kuo, S.-Y.3
-
17
-
-
34547201577
-
Quantum entanglement, non-locality and secure computation
-
Guadeloupe City
-
Chou, Y.-H., Tsai, I.-M., Fahn, C.-S., Horng, S.-J., and Kuo, S.-Y.:'Quantum entanglement, non-locality and secure computation', Proc. First Int. Conf. on Quantum, Nano, and Micro Technologies, Guadeloupe City, 2007, p. 15
-
(2007)
Proc. First Int. Conf. on Quantum, Nano, and Micro Technologies
, pp. 15
-
-
Chou, Y.-H.1
Tsai, I.-M.2
Fahn, C.-S.3
Horng, S.-J.4
Kuo, S.-Y.5
-
18
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Aiken Computation Laboratory, Harvard University
-
'How to exchange secrets by oblivious transfer', Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981
-
(1981)
Technical Memo TR-81
-
-
-
20
-
-
0022080529
-
A randomized protocol for signing contracts
-
DOI 10.1145/3812.3818
-
Even, S., Goldreich, O., and Lempel, A.:'A randomized protocol for signing contracts', Commun. ACM, 1985, 28, (6), p. 637-647 10.1145/3812.3818 0001-0782 (Pubitemid 15569164)
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
21
-
-
0023545076
-
How to play any mental game
-
New York
-
Goldreich, O., Micali, S., and Wigderson, A.:'How to play any mental game', Proc. 19th Annual ACM Conf. on Theory of Computing, New York, 1987, p. 218-229
-
(1987)
Proc. 19th Annual ACM Conf. on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
33749440437
-
Oblivious transfer and quantum non-locality
-
DOI 10.1109/ISIT.2005.1523644, 1523644, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
Wolf, S., and Wullschleger, J.:'Oblivious transfer and quantum non-locality', Proc. Int. Symp. on Information Theory, 2005, p. 1745-1748 (Pubitemid 44508343)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 1745-1748
-
-
Wolf, S.1
Wullschleger, J.2
-
23
-
-
0034497243
-
Relationship between public key encryption and oblivious transfer
-
Gertner, Y., Kannan, S., Malkin, T., Reingold, O., and Viswanathan, M.:'The relationship between public key encryption and oblivious transfer', Proc. 41st Annual Symp. on Foundations of Computer Science, 2000, p. 325-335 (Pubitemid 32075902)
-
(2000)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 325-335
-
-
Gertner Yael1
Kannan Sampath2
Malkin Tal3
Reingold Omer4
Viswanathan Mahesh5
-
24
-
-
40349102244
-
Quantum oblivious transfer and fair digital transactions
-
Riverside, CA, 2006
-
Chou, Y.-H., Tsai, I.-M., Ko, C.-M., Kuo, S.-Y., and Chen, I.-Y.:'Quantum oblivious transfer and fair digital transactions', Proc. 12th IEEE Int. Symp. on Pacific Rim Dependable Computing, Riverside, CA, 2006, p. 121-128
-
Proc. 12th IEEE Int. Symp. on Pacific Rim Dependable Computing
, pp. 121-128
-
-
Chou, Y.-H.1
Tsai, I.-M.2
Ko, C.-M.3
Kuo, S.-Y.4
Chen, I.-Y.5
-
25
-
-
0003851399
-
-
2nd (John Wiley and Sons, Inc.)
-
Schneier, B.:'Applied cryptography: protocols, algorithms, and source code in C', 2nd (John Wiley and Sons, Inc., 1996)
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
26
-
-
0013099162
-
Quantum oblivious transfer is secure against all individual measurements
-
Mayers, D., and Salvail, L.:'Quantum oblivious transfer is secure against all individual measurements', Proc. Workshop on Physics and Computation, 1994, p. 69-77
-
(1994)
Proc. Workshop on Physics and Computation
, pp. 69-77
-
-
Mayers, D.1
Salvail, L.2
|