Login / Signup
Double C-NOT attack and counterattack on 'Three-step semi-quantum secure direct communication protocol'.
Jun Gu
Po-hua Lin
Tzonelih Hwang
Published in:
Quantum Inf. Process. (2018)
Keyphrases
</>
communication protocol
wifi
key exchange protocol
authentication mechanism
authentication protocol
communication protocols
countermeasures
artificial neural networks
computer simulation
augmented reality
activity recognition
security issues
security measures