Login / Signup
On the security of αη: response to 'some attacks on quantum-based cryptographic protocols'.
Horace P. Yuen
Ranjith Nair
Eric Corndorf
Gregory S. Kanter
Prem Kumar
Published in:
Quantum Inf. Comput. (2006)
Keyphrases
</>
cryptographic protocols
security protocols
security properties
standard model
authentication protocol
insider attacks
real time
wireless sensor networks
low cost
privacy preserving
formal verification
encryption decryption