Sign in

A Remote Security Computational Ghost Imaging Method Based on Quantum Key Distribution Technology.

Jianan WuYun ChenCheng ZhouZhongyang ChenChengqian XuLijun Song
Published in: IEEE Access (2022)
Keyphrases
  • cost effective
  • key management
  • digital libraries
  • network security
  • security policies