Author: Lütkenhaus N.
Publisher: Springer Publishing Company
ISSN: 0178-3564
Source: Informatik - Forschung und Entwicklung, Vol.21, Iss.1-2, 2006-10, pp. : 29-37
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Protecting secret keys with personal entropy
By Ellison C. Hall C. Milbert R. Schneier B.
Future Generation Computer Systems, Vol. 16, Iss. 4, 2000-02 ,pp. :
Sharing a quantum secret without a trusted party
By Li Qin
Quantum Information Processing, Vol. 10, Iss. 1, 2011-02 ,pp. :